TY - JOUR
T1 - Device-to-Device Secure Coded Caching
AU - Zewail, Ahmed A.
AU - Yener, Aylin
N1 - Funding Information:
Manuscript received August 21, 2018; revised May 1, 2019 and July 21, 2019; accepted August 21, 2019. Date of publication September 11, 2019; date of current version December 19, 2019. This research was supported in part by the National Science Foundation under Grant CNS 13-14719 and Grant CCF 17-49665. This work was presented in part at the Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, November 2016. This research was performed when the first author was with the Pennsylvania State University as a Ph.D. student. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Lejla Batina. (Corresponding author: Ahmed A. Zewail.) A. A. Zewail was with the Department of Electrical Engineering, Pennsylvania State University, State College, PA 16802 USA. He is now with Wireless R&D, Qualcomm, Inc., San Diego, CA 92121 USA (e-mail: azewail@qti.qualcomm.com).
Publisher Copyright:
© 2005-2012 IEEE.
PY - 2020
Y1 - 2020
N2 - This paper studies device to device (D2D) coded-caching with information theoretic security guarantees. A broadcast network consisting of a server, which has a library of files, and end users equipped with cache memories, is considered. Information theoretic security guarantees for confidentiality are imposed upon the files. The server populates the end user caches, after which D2D communications enable the delivery of the requested files. Accordingly, we require that a user must not have access to files it did not request, i.e., secure caching. First, a centralized coded caching scheme is provided by jointly optimizing the cache placement and delivery policies. Next, a decentralized coded caching scheme is developed that does not require the knowledge of the number of active users during the caching phase. Both schemes utilize non-perfect secret sharing and one-time pad keying, to guarantee secure caching. Furthermore, the proposed schemes provide secure delivery as a side benefit, i.e., any external entity which overhears the transmitted signals during the delivery phase cannot obtain any information about the database files. The proposed schemes provide the achievable upper bound on the minimum delivery sum rate. Lower bounds on the required transmission sum rate are also derived using cut-set arguments indicating the multiplicative gap between the lower and upper bounds. Numerical results indicate that the gap vanishes with increasing memory size. Overall, the work demonstrates the effectiveness of D2D communications in cache-aided systems even when confidentiality constraints are imposed at the participating nodes and against external eavesdroppers.
AB - This paper studies device to device (D2D) coded-caching with information theoretic security guarantees. A broadcast network consisting of a server, which has a library of files, and end users equipped with cache memories, is considered. Information theoretic security guarantees for confidentiality are imposed upon the files. The server populates the end user caches, after which D2D communications enable the delivery of the requested files. Accordingly, we require that a user must not have access to files it did not request, i.e., secure caching. First, a centralized coded caching scheme is provided by jointly optimizing the cache placement and delivery policies. Next, a decentralized coded caching scheme is developed that does not require the knowledge of the number of active users during the caching phase. Both schemes utilize non-perfect secret sharing and one-time pad keying, to guarantee secure caching. Furthermore, the proposed schemes provide secure delivery as a side benefit, i.e., any external entity which overhears the transmitted signals during the delivery phase cannot obtain any information about the database files. The proposed schemes provide the achievable upper bound on the minimum delivery sum rate. Lower bounds on the required transmission sum rate are also derived using cut-set arguments indicating the multiplicative gap between the lower and upper bounds. Numerical results indicate that the gap vanishes with increasing memory size. Overall, the work demonstrates the effectiveness of D2D communications in cache-aided systems even when confidentiality constraints are imposed at the participating nodes and against external eavesdroppers.
UR - http://www.scopus.com/inward/record.url?scp=85072180079&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85072180079&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2019.2940885
DO - 10.1109/TIFS.2019.2940885
M3 - Article
AN - SCOPUS:85072180079
SN - 1556-6013
VL - 15
SP - 1513
EP - 1524
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
M1 - 8832245
ER -