Fundamental Limits of Secure Device-to-Device Coded Caching

被引:0
|
作者
Zewail, Ahmed A. [1 ]
Yener, Aylin [1 ]
机构
[1] Penn State Univ, Sch Elect Engn & Comp Sci, Wireless Commun & Networking Lab WCAN, University Pk, PA 16802 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a device-to-device coded caching system, where each user is guaranteed recover its requested file and is simultaneously prevented from recovering any file it did not request. We jointly optimize the cache placement and delivery policies such that a set of end users are able to satisfy their requests while preserving the confidentiality constraints. We develop an upper bound utilizing secret sharing schemes and one-time pad keying as well as a lower bound on the required transmission rate. Numerical results indicate that the gap between the bounds vanishes with increasing memory size.
引用
收藏
页码:1414 / 1418
页数:5
相关论文
共 50 条
  • [41] Simple and efficient transmission strategies for Device-to-Device caching networks
    Jeong, Moo-Woong
    Ryu, Jong Yeol
    Ban, Tae-Won
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 67 : 85 - 95
  • [42] Optimizing The Spatial Content Caching Distribution for Device-to-Device Communications
    Malak, Derya
    Al-Shalash, Mazin
    Andrews, Jeffrey G.
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 280 - 284
  • [43] Distributed Caching in Device-to-Device Networks: A Stochastic Geometry Perspective
    Krishnan, Shankar
    Dhillon, Harpreet S.
    2015 49TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, 2015, : 1280 - 1284
  • [44] Socially Aware Distributed Caching in Device-to-Device Communication Networks
    Ma, Chuan
    Ding, Ming
    Chen, He
    Lin, Zihuai
    Mao, Guoqiang
    Li, Xu
    2016 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2016,
  • [45] On the Analysis of Cellular Networks with Caching and Coordinated Device-to-Device Communication
    Afzal, Asma
    Zaidi, Syed Ali Raza
    McLernon, Des
    Ghogho, Mounir
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, : 223 - 229
  • [46] SECURE SOCIAL NETWORKS IN 5G SYSTEMS WITH MOBILE EDGE COMPUTING, CACHING, AND DEVICE-TO-DEVICE COMMUNICATIONS
    He, Ying
    Yu, F. Richard
    Zhao, Nan
    Yin, Hongxi
    IEEE WIRELESS COMMUNICATIONS, 2018, 25 (03) : 103 - 109
  • [47] Secure Message Delivery Games for Device-to-Device Communications
    Panaousis, Emmanouil
    Alpcan, Tansu
    Fereidooni, Hossein
    Conti, Mauro
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 195 - 215
  • [48] A Secure Device-to-Device Link Establishment Scheme for LoRaWAN
    Kim, Jaehyu
    Song, JooSeok
    IEEE SENSORS JOURNAL, 2018, 18 (05) : 2153 - 2160
  • [49] Secure Device-to-Device Communications over WiFi Direct
    Shen, Wenlong
    Yin, Bo
    Cao, Xianghui
    Cai, Lin X.
    Cheng, Yu
    IEEE NETWORK, 2016, 30 (05): : 4 - 9
  • [50] Secure Full-Duplex Device-to-Device Communication
    Khandaker, Muhammad R. A.
    Masouros, Christos
    Wong, Kai-Kit
    2017 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2017,