Device-to-Device Secure Coded Caching

This paper studies device to device (D2D) coded-caching with information theoretic security guarantees. A broadcast network consisting of a server, which has a library of files, and end users equipped with cache memories, is considered. Information theoretic security guarantees for confidentiality are imposed upon the files. The server populates the end user caches, after which D2D communications enable the delivery of the requested files. Accordingly, we require that a user must not have access to files it did not request, i.e., secure caching. First, a centralized coded caching scheme is provided by jointly optimizing the cache placement and delivery policies. Next, a decentralized coded caching scheme is developed that does not require the knowledge of the number of active users during the caching phase. Both schemes utilize non-perfect secret sharing and one-time pad keying, to guarantee secure caching. Furthermore, the proposed schemes provide secure delivery as a side benefit, i.e., any external entity which overhears the transmitted signals during the delivery phase cannot obtain any information about the database files. The proposed schemes provide the achievable upper bound on the minimum delivery sum rate. Lower bounds on the required transmission sum rate are also derived using cut-set arguments indicating the multiplicative gap between the lower and upper bounds. Numerical results indicate that the gap vanishes with increasing memory size. Overall, the work demonstrates the effectiveness of D2D communications in cache-aided systems even when confidentiality constraints are imposed at the participating nodes and against external eavesdroppers.

[1]  Urs Niesen,et al.  Coded Caching With Nonuniform Demands , 2017, IEEE Transactions on Information Theory.

[2]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[3]  Aylin Yener,et al.  Optimization of heterogeneous caching systems with rate limited links , 2017, 2017 IEEE International Conference on Communications (ICC).

[4]  Urs Niesen,et al.  Coding for caching: fundamental limits and practical challenges , 2016, IEEE Communications Magazine.

[5]  Chi Wan Sung,et al.  Coded caching in partially cooperative D2D communication networks , 2017, 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).

[6]  Lawrence W. Dowdy,et al.  Comparative Models of the File Assignment Problem , 1982, CSUR.

[7]  Hirosuke Yamamoto,et al.  Secret sharing system using (k, L, n) threshold scheme , 1986 .

[8]  Hui Liu,et al.  A New Order-Optimal Decentralized Coded Caching Scheme With Good Performance in the Finite File Size Regime , 2016, IEEE Transactions on Communications.

[9]  Giuseppe Caire,et al.  Wireless Device-to-Device Caching Networks: Basic Principles and System Performance , 2013, IEEE Journal on Selected Areas in Communications.

[10]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[11]  Vinod M. Prabhakaran,et al.  Private Coded Caching , 2016, IEEE Transactions on Information Forensics and Security.

[12]  Hui Liu,et al.  Order-Optimal Decentralized Coded Caching Schemes with Good Performance in Finite File Size Regime , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[13]  Ivan Damgård,et al.  Secure Multiparty Computation and Secret Sharing , 2015 .

[14]  Mitsuru Ito,et al.  Secret sharing scheme realizing general access structure , 1989 .

[15]  Kefei Chen,et al.  Optimal assignment schemes for general access structures based on linear programming , 2013, Designs, Codes and Cryptography.

[16]  Ravi Tandon,et al.  Beyond cut-set bounds - the approximate capacity of D2D networks , 2015, 2015 Information Theory and Applications Workshop (ITA).

[17]  Seyed Pooya Shariatpanahi,et al.  Multi-Server Coded Caching , 2015, IEEE Transactions on Information Theory.

[18]  Halim Yanikomeroglu,et al.  Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.

[19]  Aylin Yener,et al.  Coded caching for resolvable networks with security requirements , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[20]  Giuseppe Caire,et al.  Fundamental Limits of Caching in Wireless D2D Networks , 2014, IEEE Transactions on Information Theory.

[21]  T. Charles Clancy,et al.  Fundamental Limits of Caching With Secure Delivery , 2013, IEEE Transactions on Information Forensics and Security.

[22]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[23]  Aylin Yener,et al.  Benefits of cache assignment on degraded broadcast channels , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[24]  Urs Niesen,et al.  Decentralized coded caching attains order-optimal memory-rate tradeoff , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[25]  Rudolf Mathar,et al.  Bounds on Caching D2D Networks With Secure Delivery , 2018, 2018 15th International Symposium on Wireless Communication Systems (ISWCS).

[26]  Aylin Yener,et al.  Centralized Coded Caching with Heterogeneous Cache Sizes , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[27]  Catherine A. Meadows,et al.  Security of Ramp Schemes , 1985, CRYPTO.

[28]  Aylin Yener,et al.  Fundamental limits of secure device-to-device coded caching , 2016, 2016 50th Asilomar Conference on Signals, Systems and Computers.

[29]  Aydin Sezgin,et al.  Fundamental limits of caching in D2D networks with secure delivery , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[30]  Deniz Gündüz,et al.  Coded Caching and Content Delivery With Heterogeneous Distortion Requirements , 2016, IEEE Transactions on Information Theory.

[31]  Urs Niesen,et al.  Fundamental limits of caching , 2012, 2013 IEEE International Symposium on Information Theory.

[32]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[33]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[34]  Giuseppe Caire,et al.  Fundamental limits of distributed caching in multihop D2D wireless networks , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[35]  Kevin C. Almeroth,et al.  The Use of Multicast Delivery to Provide a Scalable and Interactive Video-on-Demand Service , 1996, IEEE J. Sel. Areas Commun..

[36]  Seyed Pooya Shariatpanahi,et al.  Mobility increases throughput of wireless device-to-device networks with coded caching , 2016, 2016 IEEE International Conference on Communications (ICC).

[37]  Aylin Yener,et al.  Combination Networks With or Without Secrecy Constraints: The Impact of Caching Relays , 2017, IEEE Journal on Selected Areas in Communications.