Context-Aware Privacy Preservation in Network Caching: An Information Theoretic Approach

Caching has been recognized as a viable solution to surmount the limited capability of backhaul links in handling abundant network traffic. Although optimal approaches for minimizing the average delivery load do exist, current caching strategies fail to avert intelligent adversaries from obtaining invaluable contextual information by inspecting the wireless communication links and thus, violating users’ privacy. Grounded in information theory, in this letter, we propose a mathematical model for preserving privacy in a network caching system involving a server and a cache-aided end user. We then present an efficient content caching method that maximizes the degree of privacy preservation while maintaining the average delivery load at a given level. Given the Pareto optimal nature of the proposed $\epsilon $ -constraint optimization approach, we also obtain the maximum privacy degree achievable under any given average delivery load. Numerical results and comparisons validate the correctness of our context-oriented privacy model.

[1]  Xun Cao,et al.  In-Network Caching: An Efficient Content Distribution Strategy for Mobile Networks , 2019, IEEE Wireless Communications.

[2]  Gan Zheng,et al.  Optimization of Hybrid Cache Placement for Collaborative Relaying , 2017, IEEE Communications Letters.

[3]  Rick S. Blum,et al.  A Survey of Caching Techniques in Cellular Networks: Research Issues and Challenges in Content Placement and Delivery Strategies , 2018, IEEE Communications Surveys & Tutorials.

[4]  Neri Merhav,et al.  Relations between entropy and error probability , 1994, IEEE Trans. Inf. Theory.

[5]  Zhenyu Na,et al.  Probabilistic Caching Placement in the Presence of Multiple Eavesdroppers , 2018, Wirel. Commun. Mob. Comput..

[6]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[7]  Seyed Pooya Shariatpanahi,et al.  A Dummy-Based Approach for Preserving Source Rate Privacy , 2016, IEEE Transactions on Information Forensics and Security.

[8]  Giacomo Verticale,et al.  An Open Privacy-Preserving and Scalable Protocol for a Network-Neutrality Compliant Caching , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[9]  Aylin Yener,et al.  Device-to-Device Secure Coded Caching , 2018, IEEE Transactions on Information Forensics and Security.

[10]  Seyed Pooya Shariatpanahi,et al.  Hybrid Coded Caching in Cellular Networks with D2D-Enabled Mobile Users , 2019, 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC).

[11]  Zheng Chen,et al.  Probabilistic Caching in Wireless D2D Networks: Cache Hit Optimal Versus Throughput Optimal , 2016, IEEE Communications Letters.

[12]  Xiaojiang Du,et al.  Preserving Location Privacy in Mobile Edge Computing , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[13]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[14]  Bing Chen,et al.  Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.