TY - GEN
T1 - Coded caching for resolvable networks with security requirements
AU - Zewail, Ahmed A.
AU - Yener, Aylin
PY - 2017/2/21
Y1 - 2017/2/21
N2 - We consider networks where a set of end users, equipped with cache memories, are connected to a single server via a set of relay nodes. We further consider a special class of such networks that satisfy the so called resolvability property and study centralized coded caching scenarios under three security requirements. Under the first scenario, i.e., secure delivery, the wiretapper should not gain any information about the database files from the transmitted signals over the network links. In the second scenario, i.e., secure coded caching, we consider the case where users should not be able to obtain any information about files that they did not request. In the third scenario, the system requires both secure delivery and secure coded caching. We provide achievable schemes by jointly optimizing the cache placement and delivery phases, utilizing secret sharing and one-time pads. We provide numerical results to compare performance under these different requirements.
AB - We consider networks where a set of end users, equipped with cache memories, are connected to a single server via a set of relay nodes. We further consider a special class of such networks that satisfy the so called resolvability property and study centralized coded caching scenarios under three security requirements. Under the first scenario, i.e., secure delivery, the wiretapper should not gain any information about the database files from the transmitted signals over the network links. In the second scenario, i.e., secure coded caching, we consider the case where users should not be able to obtain any information about files that they did not request. In the third scenario, the system requires both secure delivery and secure coded caching. We provide achievable schemes by jointly optimizing the cache placement and delivery phases, utilizing secret sharing and one-time pads. We provide numerical results to compare performance under these different requirements.
UR - http://www.scopus.com/inward/record.url?scp=85015993878&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85015993878&partnerID=8YFLogxK
U2 - 10.1109/CNS.2016.7860560
DO - 10.1109/CNS.2016.7860560
M3 - Conference contribution
AN - SCOPUS:85015993878
T3 - 2016 IEEE Conference on Communications and Network Security, CNS 2016
SP - 621
EP - 625
BT - 2016 IEEE Conference on Communications and Network Security, CNS 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2016 IEEE Conference on Communications and Network Security, CNS 2016
Y2 - 17 October 2016 through 19 October 2016
ER -