Secure Coded Caching with Colluding Users

10/18/2019
by   Kangning Ma, et al.
0

In a secure coded caching system, a central server balances the traffic flow between peak and off-peak periods by distributing some public data to the users' caches in advance. Meanwhile, these data are securely protected against the possible colluding users, who might share their cache. We model the system as a flow network and study its capacity region via a network information-theoretic approach. Due to the difficulty of characterizing the capacity region straightforwardly, our approach is two folded from the perspective of network information theory. On one hand, we identify the inner bound of capacity region by proposing a coded caching scheme to achieve a low load secure data transmission. On the other hand, we also establish outer outer bounds on the capacity region, which show that our proposed scheme is order optimal in general under specific circumstance.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/12/2021

Multi-Access Coded Caching with Secure Delivery

The multi-access variant of the coded caching problem in the presence of...
research
03/16/2018

On Combination Networks with Cache-aided Relays and Users

Caching is an efficient way to reduce peak hour network traffic congesti...
research
01/09/2019

On Secure Network Coding for Multiple Unicast Traffic

This paper investigates the problem of secure communication in a wirelin...
research
09/11/2023

Beamforming in Wireless Coded-Caching Systems

Increased capacity in the access network poses capacity challenges on th...
research
03/12/2021

Coded-Caching using Adaptive Transmission

Coded-caching is a promising technique to reduce the peak rate requireme...
research
06/30/2020

On the Fundamental Limits of Coded Caching Systems with Restricted Demand Types

Caching is a technique to reduce the communication load in peak hours by...
research
01/10/2019

On Secure Capacity of Multiple Unicast Traffic over Two-Layer Networks

This paper studies the problem of secure communication over two-layer ne...

Please sign up or login with your details

Forgot password? Click here to reset