Coded caching for resolvable networks with security requirements

We consider networks where a set of end users, equipped with cache memories, are connected to a single server via a set of relay nodes. We further consider a special class of such networks that satisfy the so called resolvability property and study centralized coded caching scenarios under three security requirements. Under the first scenario, i.e., secure delivery, the wiretapper should not gain any information about the database files from the transmitted signals over the network links. In the second scenario, i.e., secure coded caching, we consider the case where users should not be able to obtain any information about files that they did not request. In the third scenario, the system requires both secure delivery and secure coded caching. We provide achievable schemes by jointly optimizing the cache placement and delivery phases, utilizing secret sharing and one-time pads. We provide numerical results to compare performance under these different requirements.

[1]  Li Tang,et al.  Coded caching for networks with the resolvability property , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[2]  Jaime Llorca,et al.  Caching in combination networks , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.

[3]  Aylin Yener,et al.  Multi-terminal networks with an untrusted relay , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[4]  Vinod M. Prabhakaran,et al.  Fundamental limits of secretive coded caching , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[5]  T. Charles Clancy,et al.  Fundamental Limits of Caching With Secure Delivery , 2013, IEEE Transactions on Information Forensics and Security.

[6]  Urs Niesen,et al.  Decentralized coded caching attains order-optimal memory-rate tradeoff , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[7]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[8]  Jaime Llorca,et al.  On the fundamental limits of caching in combination networks , 2015, 2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[9]  Ivan Damgård,et al.  Secure Multiparty Computation and Secret Sharing , 2015 .

[10]  Urs Niesen,et al.  Fundamental limits of caching , 2012, 2013 IEEE International Symposium on Information Theory.

[11]  Suhas N. Diggavi,et al.  Hierarchical coded caching , 2014, 2014 IEEE International Symposium on Information Theory.