Untrusted Caches in Two-layer Networks

Ahmed A. Zewail, Aylin Yener

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This work considers a network consisting of a server and a layer of relay nodes equipped with cache memories which aim to deliver content to end nodes that also have cache memories. The server and the end nodes consider the intermediate relay caches to be untrusted with the content. As a result, the server must design strategies to place content in relay caches not only to serve end users, but also to ensure that any a subset of them, even when colluding, cannot gain any information about the contents of the server database. The end users randomly connect to a subset of these untrusted caches at the beginning of the delivery phase via multicast links. For this network model, a coded caching scheme is developed by jointly optimizing the cache placement and delivery phases using secure regenerating codes. In addition, the scheme is extended to the setup of combination networks with untrusted relays, where the untrusted relays are connected to the end users via unicast links. The study highlights the benefits of cooperating with untrusted caches by designing the end users' caches to provide multicast opportunities in order to minimize the delivery load.

Original languageEnglish (US)
Title of host publication2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-5
Number of pages5
ISBN (Electronic)9781538692912
DOIs
StatePublished - Jul 2019
Event2019 IEEE International Symposium on Information Theory, ISIT 2019 - Paris, France
Duration: Jul 7 2019Jul 12 2019

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
Volume2019-July
ISSN (Print)2157-8095

Conference

Conference2019 IEEE International Symposium on Information Theory, ISIT 2019
CountryFrance
CityParis
Period7/7/197/12/19

Fingerprint

Network layers
Cache
Servers
Relay
Cache memory
Server
Multicast
Vertex of a graph
Subset
Caching
Network Model
Placement
Minimise

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Cite this

Zewail, A. A., & Yener, A. (2019). Untrusted Caches in Two-layer Networks. In 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings (pp. 1-5). [8849365] (IEEE International Symposium on Information Theory - Proceedings; Vol. 2019-July). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ISIT.2019.8849365
Zewail, Ahmed A. ; Yener, Aylin. / Untrusted Caches in Two-layer Networks. 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2019. pp. 1-5 (IEEE International Symposium on Information Theory - Proceedings).
@inproceedings{bb47ccc2ec344dd1bf7e8d9ae05cd550,
title = "Untrusted Caches in Two-layer Networks",
abstract = "This work considers a network consisting of a server and a layer of relay nodes equipped with cache memories which aim to deliver content to end nodes that also have cache memories. The server and the end nodes consider the intermediate relay caches to be untrusted with the content. As a result, the server must design strategies to place content in relay caches not only to serve end users, but also to ensure that any a subset of them, even when colluding, cannot gain any information about the contents of the server database. The end users randomly connect to a subset of these untrusted caches at the beginning of the delivery phase via multicast links. For this network model, a coded caching scheme is developed by jointly optimizing the cache placement and delivery phases using secure regenerating codes. In addition, the scheme is extended to the setup of combination networks with untrusted relays, where the untrusted relays are connected to the end users via unicast links. The study highlights the benefits of cooperating with untrusted caches by designing the end users' caches to provide multicast opportunities in order to minimize the delivery load.",
author = "Zewail, {Ahmed A.} and Aylin Yener",
year = "2019",
month = "7",
doi = "10.1109/ISIT.2019.8849365",
language = "English (US)",
series = "IEEE International Symposium on Information Theory - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "1--5",
booktitle = "2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings",
address = "United States",

}

Zewail, AA & Yener, A 2019, Untrusted Caches in Two-layer Networks. in 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings., 8849365, IEEE International Symposium on Information Theory - Proceedings, vol. 2019-July, Institute of Electrical and Electronics Engineers Inc., pp. 1-5, 2019 IEEE International Symposium on Information Theory, ISIT 2019, Paris, France, 7/7/19. https://doi.org/10.1109/ISIT.2019.8849365

Untrusted Caches in Two-layer Networks. / Zewail, Ahmed A.; Yener, Aylin.

2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2019. p. 1-5 8849365 (IEEE International Symposium on Information Theory - Proceedings; Vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Untrusted Caches in Two-layer Networks

AU - Zewail, Ahmed A.

AU - Yener, Aylin

PY - 2019/7

Y1 - 2019/7

N2 - This work considers a network consisting of a server and a layer of relay nodes equipped with cache memories which aim to deliver content to end nodes that also have cache memories. The server and the end nodes consider the intermediate relay caches to be untrusted with the content. As a result, the server must design strategies to place content in relay caches not only to serve end users, but also to ensure that any a subset of them, even when colluding, cannot gain any information about the contents of the server database. The end users randomly connect to a subset of these untrusted caches at the beginning of the delivery phase via multicast links. For this network model, a coded caching scheme is developed by jointly optimizing the cache placement and delivery phases using secure regenerating codes. In addition, the scheme is extended to the setup of combination networks with untrusted relays, where the untrusted relays are connected to the end users via unicast links. The study highlights the benefits of cooperating with untrusted caches by designing the end users' caches to provide multicast opportunities in order to minimize the delivery load.

AB - This work considers a network consisting of a server and a layer of relay nodes equipped with cache memories which aim to deliver content to end nodes that also have cache memories. The server and the end nodes consider the intermediate relay caches to be untrusted with the content. As a result, the server must design strategies to place content in relay caches not only to serve end users, but also to ensure that any a subset of them, even when colluding, cannot gain any information about the contents of the server database. The end users randomly connect to a subset of these untrusted caches at the beginning of the delivery phase via multicast links. For this network model, a coded caching scheme is developed by jointly optimizing the cache placement and delivery phases using secure regenerating codes. In addition, the scheme is extended to the setup of combination networks with untrusted relays, where the untrusted relays are connected to the end users via unicast links. The study highlights the benefits of cooperating with untrusted caches by designing the end users' caches to provide multicast opportunities in order to minimize the delivery load.

UR - http://www.scopus.com/inward/record.url?scp=85073167211&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85073167211&partnerID=8YFLogxK

U2 - 10.1109/ISIT.2019.8849365

DO - 10.1109/ISIT.2019.8849365

M3 - Conference contribution

AN - SCOPUS:85073167211

T3 - IEEE International Symposium on Information Theory - Proceedings

SP - 1

EP - 5

BT - 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Zewail AA, Yener A. Untrusted Caches in Two-layer Networks. In 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2019. p. 1-5. 8849365. (IEEE International Symposium on Information Theory - Proceedings). https://doi.org/10.1109/ISIT.2019.8849365