Fundamental limits of secure device-to-device coded caching

Ahmed A. Zewail, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations

    Abstract

    We consider a device-to-device coded caching system, where each user is guaranteed recover its requested file and is simultaneously prevented from recovering any file it did not request. We jointly optimize the cache placement and delivery policies such that a set of end users are able to satisfy their requests while preserving the confidentiality constraints. We develop an upper bound utilizing secret sharing schemes and one-time pad keying as well as a lower bound on the required transmission rate. Numerical results indicate that the gap between the bounds vanishes with increasing memory size.

    Original languageEnglish (US)
    Title of host publicationConference Record of the 50th Asilomar Conference on Signals, Systems and Computers, ACSSC 2016
    EditorsMichael B. Matthews
    PublisherIEEE Computer Society
    Pages1414-1418
    Number of pages5
    ISBN (Electronic)9781538639542
    DOIs
    StatePublished - Mar 1 2017
    Event50th Asilomar Conference on Signals, Systems and Computers, ACSSC 2016 - Pacific Grove, United States
    Duration: Nov 6 2016Nov 9 2016

    Publication series

    NameConference Record - Asilomar Conference on Signals, Systems and Computers
    ISSN (Print)1058-6393

    Other

    Other50th Asilomar Conference on Signals, Systems and Computers, ACSSC 2016
    CountryUnited States
    CityPacific Grove
    Period11/6/1611/9/16

    All Science Journal Classification (ASJC) codes

    • Signal Processing
    • Computer Networks and Communications

    Fingerprint Dive into the research topics of 'Fundamental limits of secure device-to-device coded caching'. Together they form a unique fingerprint.

    Cite this