Secure Caching with Non-Uniform Demands

被引:0
作者
Sengupta, Avik [1 ]
Tandon, Ravi
Clancy, T. Charles
机构
[1] Virginia Tech, Hume Ctr, Blacksburg, VA 24061 USA
来源
2014 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS (VITAE) | 2014年
关键词
ALGORITHMS; SYSTEMS;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Caching helps in reducing network load at times of heavy traffic by utilizing content duplication, local file storage and multicast content delivery. The multicast delivery could be prone to information leakage if a user becomes malicious or if the multicast link is tapped by an external adversary. In this paper, we introduce the concept of information-theoretically secure file delivery when the files have a non-uniform popularity distribution. For this scenario, the cache memory of each user is split into two parts: one part is used to store data (some function of the files), whereas the other part is used to store keys. A novel algorithm for storing data and keys in the users' cache while accounting for the non-uniform file popularities is presented. This design is then exploited to simultaneously reduce the delivery rate while keeping the multicast communication secure. We show that the proposed scheme can guarantee information theoretic security at a negligible cost compared to insecure schemes, especially for large number of files and users. The secure-rate-vs-memory trade-off of the proposed scheme is analyzed and shown to be close to the information theoretic optimal for all feasible values of problem parameters.
引用
收藏
页数:5
相关论文
共 11 条
  • [1] The use of multicast delivery to provide a scalable and interactive video-on-demand service
    Almeroth, KC
    Ammar, MH
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1996, 14 (06) : 1110 - 1122
  • [2] APPROXIMATION ALGORITHMS FOR DATA PLACEMENT PROBLEMS
    Baev, Ivan
    Rajaraman, Rajmohan
    Swamy, Chaitanya
    [J]. SIAM JOURNAL ON COMPUTING, 2008, 38 (04) : 1411 - 1429
  • [3] Traffic Modeling and Proportional Partial Caching for Peer-to-Peer Systems
    Hefeeda, Mohamed
    Saleh, Osama
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (06) : 1447 - 1460
  • [4] Placement algorithms for hierarchical cooperative caching
    Korupolu, MR
    Plaxton, CG
    Rajaraman, R
    [J]. JOURNAL OF ALGORITHMS-COGNITION INFORMATICS AND LOGIC, 2001, 38 (01): : 260 - 302
  • [5] Maddah-Ali M. A., 2012, ARXIV12095807
  • [6] Maddah-Ali M. A., 2013, ARXIV13015848
  • [7] Niesen U., 2013, ARXIV13080178
  • [8] Sengupta A., 2014, SECURE CACHING NONUN
  • [9] Sengupta A., 2013, ARXIV13123961
  • [10] Sengupta A., 2014, ICC 14