On the Fundamental Limits of Device-to-Device Private Caching Under Uncoded Cache Placement and User Collusion

In the coded caching problem, as originally formulated by Maddah-Ali and Niesen, a server communicates via a noiseless shared broadcast link to multiple users that have local storage capability. In order for a user to decode its demanded file from the coded multicast transmission, the demands of all the users must be globally known, which may violate the privacy of the users. To overcome this privacy problem, Wan and Caire recently proposed several schemes that attain coded multicasting gain while simultaneously guarantee information theoretic privacy of the users’ demands. In Device-to-Device (D2D) networks, the demand privacy problem is further exacerbated by the fact that each user is also a transmitter, which appears to be needing the knowledge of the files demanded by the remaining users in order to form its coded multicast transmission. This paper shows how to solve this seemingly infeasible problem. The main contribution of this paper is the development of new achievable and converse bounds for D2D coded caching that are to within a constant factor of one another when privacy of the users’ demands must be guaranteed even in the presence of colluding users (i.e., when some users share cached contents and demanded file indices). First, a D2D private caching scheme is proposed, whose key feature is the addition of virtual users in the system in order to “hide” the demands of the real users. By comparing the achievable D2D private load with an existing converse bound for the shared-link model without demand privacy constraint, the proposed scheme is shown to be order optimal, except for the very low memory size regime with more files than users. Second, in order to shed light into the open parameter regime, a new achievable scheme and a new converse bound under the constraint of uncoded cache placement (i.e., when each user stores directly a subset of the bits of the library) are developed for the case of two users, and shown to be to within a constant factor of one another for all system parameters. Finally, the two-user converse bound is extended to any number of users by a cut-set type argument. With this new converse bound, the virtual users scheme is shown to be order optimal in all parameter regimes under the constraint of uncoded cache placement and user collusion.

[1]  G. Caire,et al.  Coded Caching With Private Demands and Caches , 2022, 2022 IEEE International Symposium on Information Theory (ISIT).

[2]  G. Caire,et al.  On the Optimal Load-Memory Tradeoff of Cache-Aided Scalar Linear Function Retrieval , 2021, IEEE Transactions on Information Theory.

[3]  B. Sundar Rajan,et al.  Optimal Demand Private Coded Caching for Users with Small Buffers , 2021, 2021 IEEE International Symposium on Information Theory (ISIT).

[4]  Kai Wan,et al.  On Coded Caching With Private Demands , 2021, IEEE Transactions on Information Theory.

[5]  Daniela Tuninetti,et al.  Fundamental Limits of Caching for Demand Privacy Against Colluding Users , 2020, IEEE Journal on Selected Areas in Information Theory.

[6]  A. Thangaraj,et al.  Lifting Constructions of PDAs for Coded Caching With Linear Subpacketization , 2020, IEEE Transactions on Communications.

[7]  Pradeep Kiran Sarvepalli,et al.  Coded Caching with Demand Privacy: Constructions for Lower Subpacketization and Generalizations , 2020, ArXiv.

[8]  Giuseppe Caire,et al.  Novel Converse for Device-to-Device Demand-Private Caching with a Trusted Server , 2020, 2020 IEEE International Symposium on Information Theory (ISIT).

[9]  Giuseppe Caire,et al.  Cache-Aided Scalar Linear Function Retrieval , 2020, 2020 IEEE International Symposium on Information Theory (ISIT).

[10]  Daniela Tuninetti,et al.  An Index Coding Approach to Caching With Uncoded Cache Placement , 2020, IEEE Transactions on Information Theory.

[11]  B. Dey,et al.  Demand-Private Coded Caching and the Exact Trade-off for N=K=2 , 2019, National Conference on Communications.

[12]  Giuseppe Caire,et al.  Device-to-Device Private Caching with Trusted Server , 2019, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).

[13]  Sneha Kamath,et al.  Demand Private Coded Caching , 2019, ArXiv.

[14]  Giuseppe Caire,et al.  On Coded Caching With Private Demands , 2019, IEEE Transactions on Information Theory.

[15]  Daniela Tuninetti,et al.  Private Pliable Index Coding , 2019, 2019 IEEE Information Theory Workshop (ITW).

[16]  Mary Wootters,et al.  Embedded Index Coding , 2019, 2019 IEEE Information Theory Workshop (ITW).

[17]  Giuseppe Caire,et al.  On the Optimality of D2D Coded Caching With Uncoded Cache Placement and One-Shot Delivery , 2019, IEEE Transactions on Communications.

[18]  Camilla Hollanti,et al.  Private Information Retrieval From Coded Storage Systems With Colluding, Byzantine, and Unresponsive Servers , 2018, IEEE Transactions on Information Theory.

[19]  Sennur Ulukus,et al.  The Capacity of Private Information Retrieval from Byzantine and Colluding Databases , 2017, IEEE Transactions on Information Theory.

[20]  Mohammad Ali Maddah-Ali,et al.  The exact rate-memory tradeoff for caching with uncoded prefetching , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[21]  Petros Elia,et al.  A content-delivery protocol, exploiting the privacy benefits of coded caching , 2017, 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

[22]  Gennian Ge,et al.  Private Information Retrieval from MDS Coded Databases with Colluding Servers under Several Variant Models , 2017, 1705.03186.

[23]  Mohammad Ali Maddah-Ali,et al.  Characterizing the rate-memory tradeoff in cache networks within a factor of 2 , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[24]  Camilla Hollanti,et al.  Private information retrieval schemes for codec data with arbitrary collusion patterns , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[25]  Chao Tian,et al.  Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching , 2016, 2017 IEEE International Symposium on Information Theory (ISIT).

[26]  A. Salman Avestimehr,et al.  The Exact Rate-Memory Tradeoff for Caching With Uncoded Prefetching , 2016, IEEE Transactions on Information Theory.

[27]  Hua Sun,et al.  The Capacity of Robust Private Information Retrieval With Colluding Databases , 2016, IEEE Transactions on Information Theory.

[28]  S. Jafar,et al.  The Capacity of Private Information Retrieval , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[29]  Daniela Tuninetti,et al.  On the optimality of uncoded cache placement , 2015, 2016 IEEE Information Theory Workshop (ITW).

[30]  Hooshang Ghasemi,et al.  Improved lower bounds for coded caching , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[31]  Mehdi Bennis,et al.  Living on the edge: The role of proactive caching in 5G wireless networks , 2014, IEEE Communications Magazine.

[32]  Giuseppe Caire,et al.  Fundamental Limits of Caching in Wireless D2D Networks , 2014, IEEE Transactions on Information Theory.

[33]  Lele Wang,et al.  On the capacity region for index coding , 2013, 2013 IEEE International Symposium on Information Theory.

[34]  Urs Niesen,et al.  Fundamental Limits of Caching , 2012, IEEE Transactions on Information Theory.

[35]  Syed Ali Jafar,et al.  Interference Alignment and Degrees of Freedom of the $K$-User Interference Channel , 2008, IEEE Transactions on Information Theory.

[36]  Hua Wang,et al.  Gaussian Interference Channel Capacity to Within One Bit , 2007, IEEE Transactions on Information Theory.

[37]  Yuval Ishai,et al.  General constructions for information-theoretic private information retrieval , 2005, J. Comput. Syst. Sci..

[38]  Thomas M. Cover,et al.  Network Information Theory , 2001 .

[39]  Eyal Kushilevitz,et al.  Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[40]  János Körner,et al.  General broadcast channels with degraded message sets , 1977, IEEE Trans. Inf. Theory.