On Coded Caching With Private Demands

Caching is an efficient way to reduce network traffic congestion during peak hours by storing some content at the user’s local cache memory without knowledge of later demands. For the shared-link caching model, Maddah-Ali and Niesen (MAN) proposed a two-phase (<italic>placement</italic> and <italic>delivery</italic>) coded caching strategy, which is order optimal within a constant factor. However, in the MAN coded caching scheme, each user can obtain the information about the demands of other users, i.e., the MAN coded caching scheme is inherently prone to tampering and spying the activity/demands of other users. In this paper, we formulate an information-theoretic shared-link caching model with private demands, where there are <inline-formula> <tex-math notation="LaTeX">${\mathsf K}$ </tex-math></inline-formula> cache-aided users (which can cache up to <inline-formula> <tex-math notation="LaTeX">${\mathsf M}$ </tex-math></inline-formula> files) connected to a central server with access to <inline-formula> <tex-math notation="LaTeX">${\mathsf N}$ </tex-math></inline-formula> files. Each user requests <inline-formula> <tex-math notation="LaTeX">${\mathsf L}$ </tex-math></inline-formula> files. Our objective is to design a two-phase private caching scheme with minimum load while preserving the information-theoretic privacy of the demands of each user with respect to other users. A trivial solution is the uncoded caching scheme which lets each user recover all the <inline-formula> <tex-math notation="LaTeX">${\mathsf N}$ </tex-math></inline-formula> files, referred to as <italic>baseline scheme</italic>. For this problem we propose two novel schemes which achieve the information-theoretic privacy of the users’ demands while also achieving a non-trivial caching gain over the baseline scheme. The general underlying idea is to satisfy the users’ requests by generating a set of coded multicast messages that is symmetric with respect to the library files, such that for each user k, the mutual information between these messages and the demands of all other users given the cache content and the demand of user k is zero. In the first scheme, referred to as virtual-user scheme, we introduce a number of virtual users such that each <inline-formula> <tex-math notation="LaTeX">${\mathsf L}$ </tex-math></inline-formula>-subset of files is demanded by <inline-formula> <tex-math notation="LaTeX">${\mathsf K}$ </tex-math></inline-formula> real or virtual (effective) users and use the MAN delivery to generate multicast messages. From the viewpoint of each user, the set of multicast messages is symmetric over all files even if each single multicast message is not. This scheme incurs in an extremely large sub-packetization. Then, we propose a second scheme, referred to as MDS-based scheme, based on a novel MDS-coded cache placement. In this case, we generate multicast messages where each multicast message contains one MDS-coded symbol from each file in the library and thus is again symmetric over all the files from the viewpoint of each user. The sub-packetization level of the MDS-based scheme is exponentially smaller than that needed by the virtual-user scheme. Compared with the existing shared-link coded caching converse bounds without privacy, the virtual-user scheme is proved to be order optimal with a constant factor when <inline-formula> <tex-math notation="LaTeX">${\mathsf N}\leq {\mathsf L} {\mathsf K} $ </tex-math></inline-formula>, or when <inline-formula> <tex-math notation="LaTeX">${\mathsf N}\geq {\mathsf L} {\mathsf K} $ </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">${\mathsf M}\geq {\mathsf N}/ {\mathsf K}$ </tex-math></inline-formula>. In addition, when <inline-formula> <tex-math notation="LaTeX">${\mathsf M}\geq {\mathsf N}/2$ </tex-math></inline-formula>, both of the virtual-user scheme and the MDS-based scheme are order optimal within a factor of 2.

[1]  Ravi Tandon,et al.  Improved Approximation of Storage-Rate Tradeoff for Caching With Multiple Demands , 2016, IEEE Transactions on Communications.

[2]  Michèle Wigger,et al.  Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels , 2018, IEEE Transactions on Information Theory.

[3]  Hooshang Ghasemi,et al.  Improved lower bounds for coded caching , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[4]  Jaime Llorca,et al.  Caching in combination networks , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.

[5]  Ravi Tandon,et al.  The capacity of cache aided private information retrieval , 2017, 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[6]  Mohammad Ali Maddah-Ali,et al.  Characterizing the rate-memory tradeoff in cache networks within a factor of 2 , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[7]  Hua Sun,et al.  The Capacity of Private Information Retrieval , 2017, IEEE Transactions on Information Theory.

[8]  Aylin Yener,et al.  Device-to-Device Secure Coded Caching , 2018, IEEE Transactions on Information Forensics and Security.

[9]  T. Charles Clancy,et al.  Fundamental Limits of Caching With Secure Delivery , 2013, IEEE Transactions on Information Forensics and Security.

[10]  Sennur Ulukus,et al.  Cache-Aided Private Information Retrieval With Partially Known Uncoded Prefetching: Fundamental Limits , 2017, IEEE Journal on Selected Areas in Communications.

[11]  Daniela Tuninetti,et al.  On caching with more users than files , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[12]  Giuseppe Caire,et al.  Fundamental Limits of Caching in Wireless D2D Networks , 2014, IEEE Transactions on Information Theory.

[13]  Daniela Tuninetti,et al.  Caching in Combination Networks: Novel Multicast Message Generation and Delivery by Leveraging the Network Topology , 2018, 2018 IEEE International Conference on Communications (ICC).

[14]  Syed Ali Jafar,et al.  The Capacity of Private Information Retrieval with Private Side Information , 2017, ArXiv.

[15]  A. Salman Avestimehr,et al.  The Exact Rate-Memory Tradeoff for Caching With Uncoded Prefetching , 2016, IEEE Transactions on Information Theory.

[16]  Daniela Tuninetti,et al.  An Index Coding Approach to Caching With Uncoded Cache Placement , 2020, IEEE Transactions on Information Theory.

[17]  Mehdi Bennis,et al.  Living on the edge: The role of proactive caching in 5G wireless networks , 2014, IEEE Communications Magazine.

[18]  Giuseppe Caire,et al.  On the Fundamental Limits of Fog-RAN Cache-Aided Networks With Downlink and Sidelink Communications , 2018, IEEE Transactions on Information Theory.

[19]  Hua Sun,et al.  The Capacity of Private Computation , 2018, 2018 IEEE International Conference on Communications (ICC).

[20]  Daniela Tuninetti,et al.  On the optimality of uncoded cache placement , 2015, 2016 IEEE Information Theory Workshop (ITW).

[21]  Seyed Pooya Shariatpanahi,et al.  Multi-Server Coded Caching , 2015, IEEE Transactions on Information Theory.

[22]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[23]  Sennur Ulukus,et al.  Fundamental Limits of Cache-Aided Private Information Retrieval With Unknown and Uncoded Prefetching , 2017, IEEE Transactions on Information Theory.

[24]  Vinod M. Prabhakaran,et al.  Private Coded Caching , 2016, IEEE Transactions on Information Forensics and Security.

[25]  Deepak Kumar,et al.  The Capacity of Private Information Retrieval From Uncoded Storage Constrained Databases , 2018, IEEE Transactions on Information Theory.

[26]  Michael Gastpar,et al.  Single-server Multi-user Private Information Retrieval with Side Information , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).

[27]  Eyal Kushilevitz,et al.  Private information retrieval , 1998, JACM.

[28]  Jaime Llorca,et al.  Caching-aided coded multicasting with multiple random requests , 2015, 2015 IEEE Information Theory Workshop (ITW).

[29]  Petros Elia,et al.  A content-delivery protocol, exploiting the privacy benefits of coded caching , 2017, 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

[30]  Rudolf Mathar,et al.  Bounds on Caching D2D Networks With Secure Delivery , 2018, 2018 15th International Symposium on Wireless Communication Systems (ISWCS).

[31]  Urs Niesen,et al.  Decentralized coded caching attains order-optimal memory-rate tradeoff , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[32]  Bane V. Vasic,et al.  Towards the exact rate-memory trade-off for uncoded caching with secure delivery , 2017, 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[33]  Urs Niesen,et al.  Fundamental limits of caching , 2012, 2013 IEEE International Symposium on Information Theory.

[34]  Aylin Yener,et al.  Combination Networks With or Without Secrecy Constraints: The Impact of Caching Relays , 2017, IEEE Journal on Selected Areas in Communications.