TY - JOUR
T1 - Combination Networks with or Without Secrecy Constraints
T2 - The Impact of Caching Relays
AU - Zewail, Ahmed A.
AU - Yener, Aylin
N1 - Funding Information:
Manuscript received December 11, 2017; revised April 17, 2018; accepted April 18, 2018. Date of publication June 7, 2018; date of current version September 12, 2018. This work was supported by the National Science Foundation under Grant CNS 13-14719 and Grant CCF 17-49665. This paper was presented in part at the IEEE International Symposium of Information Theory 2017 and the IEEE Conference on Information Sciences and Systems 2018. (Corresponding author: Ahmed A. Zewail.) The authors are with the School of Electrical Engineering and Computer Science, Pennsylvania State University at University Park, State College, PA 16802 USA (e-mail: zewail@psu.edu; yener@ee.psu.edu).
Publisher Copyright:
© 1983-2012 IEEE.
PY - 2018/6
Y1 - 2018/6
N2 - This paper considers a two-hop network architecture known as a combination network, where a layer of relay nodes connects a server to a set of end users. In particular, a new model is investigated, where the intermediate relays employ caches in addition to the end users. First, a new centralized coded caching scheme is developed that utilizes maximum distance separable coding, jointly optimizes cache placement and delivery phase, and enables decomposing the combination network into a set virtual multicast sub-network. It is shown that if the sum of the memory of an end user and its connected relay nodes is sufficient to store the database, then the server can disengage in the delivery phase and all the end users' requests can be satisfied by the caches in the network. Lower bounds on the normalized delivery load using genie-aided cut-set arguments are presented along with second hop optimality. Next, recognizing the information security concerns of coded caching, this new model is studied under three different secrecy settings: 1) secure delivery where we require an external entity that must not gain any information about the database files by observing the transmitted signals over the network links; 2) secure caching, where we impose the constraint that end users must not be able to obtain any information about files that they did not request; and 3) both secure delivery and secure caching, simultaneously. We demonstrate how network topology affects the system performance under these secrecy requirements. Finally, we provide numerical results demonstrating the system performance in each of the settings considered.
AB - This paper considers a two-hop network architecture known as a combination network, where a layer of relay nodes connects a server to a set of end users. In particular, a new model is investigated, where the intermediate relays employ caches in addition to the end users. First, a new centralized coded caching scheme is developed that utilizes maximum distance separable coding, jointly optimizes cache placement and delivery phase, and enables decomposing the combination network into a set virtual multicast sub-network. It is shown that if the sum of the memory of an end user and its connected relay nodes is sufficient to store the database, then the server can disengage in the delivery phase and all the end users' requests can be satisfied by the caches in the network. Lower bounds on the normalized delivery load using genie-aided cut-set arguments are presented along with second hop optimality. Next, recognizing the information security concerns of coded caching, this new model is studied under three different secrecy settings: 1) secure delivery where we require an external entity that must not gain any information about the database files by observing the transmitted signals over the network links; 2) secure caching, where we impose the constraint that end users must not be able to obtain any information about files that they did not request; and 3) both secure delivery and secure caching, simultaneously. We demonstrate how network topology affects the system performance under these secrecy requirements. Finally, we provide numerical results demonstrating the system performance in each of the settings considered.
UR - http://www.scopus.com/inward/record.url?scp=85048203424&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85048203424&partnerID=8YFLogxK
U2 - 10.1109/JSAC.2018.2844941
DO - 10.1109/JSAC.2018.2844941
M3 - Article
AN - SCOPUS:85048203424
SN - 0733-8716
VL - 36
SP - 1140
EP - 1152
JO - IEEE Journal on Selected Areas in Communications
JF - IEEE Journal on Selected Areas in Communications
IS - 6
M1 - 8374866
ER -