Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior Knowledge

Coded caching is a promising method for solving caching problems in content-centric wireless networks. To enhance the security of coded caching for practical purposes, this paper investigates a secure coded caching scheme for defending against an eavesdropper who may possess prior knowledge before e...

Full description

Bibliographic Details
Main Authors: Nan Wang, Hai Zhao, Haibo Jin, Long Hai
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8962042/
id doaj-66552ae0bed748d599102ec5eb7df2ad
record_format Article
spelling doaj-66552ae0bed748d599102ec5eb7df2ad2021-03-30T03:05:43ZengIEEEIEEE Access2169-35362020-01-018155651557510.1109/ACCESS.2020.29674278962042Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior KnowledgeNan Wang0https://orcid.org/0000-0001-5256-4551Hai Zhao1https://orcid.org/0000-0001-9796-054XHaibo Jin2https://orcid.org/0000-0002-3893-4090Long Hai3https://orcid.org/0000-0001-8945-4153Computer Science and Engineering, Northeastern University, Shenyang, ChinaComputer Science and Engineering, Northeastern University, Shenyang, ChinaCollege of Software Engineering, Liaoning Technical University–Huludao, Huludao, ChinaSchool of Computer Engineering, Shenzhen Polytechnic, Shenzhen, ChinaCoded caching is a promising method for solving caching problems in content-centric wireless networks. To enhance the security of coded caching for practical purposes, this paper investigates a secure coded caching scheme for defending against an eavesdropper who may possess prior knowledge before eavesdropping on content delivery. A novel key-based solution is proposed to minimize the leakage of meaningful information to the eavesdropper during the delivery phase. In the proposed solution, the central server observes the strength of the eavesdropper and introduces several keys to dynamically encrypt the broadcast signals within a weak security constraint. The amount of cache memory occupied by the keys is carefully designed to achieve the highest possible cache gain in terms of the rate of content delivery. The tradeoff between the cache memory usage and the transmission rate with varying eavesdropper strength is characterized. For a given size of the total cache memory, the tradeoff between the amounts of memory used for data and key storage is also presented. We report simulation results to support our analytical findings and show that no keys are needed to achieve weak security against a low-strength eavesdropper. Even for an eavesdropper of high strength, weak security can be introduced at a negligible cost given a large cache size.https://ieeexplore.ieee.org/document/8962042/Network securitycommunication networksnetwork codingcooperative caching
collection DOAJ
language English
format Article
sources DOAJ
author Nan Wang
Hai Zhao
Haibo Jin
Long Hai
spellingShingle Nan Wang
Hai Zhao
Haibo Jin
Long Hai
Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior Knowledge
IEEE Access
Network security
communication networks
network coding
cooperative caching
author_facet Nan Wang
Hai Zhao
Haibo Jin
Long Hai
author_sort Nan Wang
title Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior Knowledge
title_short Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior Knowledge
title_full Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior Knowledge
title_fullStr Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior Knowledge
title_full_unstemmed Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior Knowledge
title_sort weakly secure coded caching scheme for an eavesdropper having prior knowledge
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description Coded caching is a promising method for solving caching problems in content-centric wireless networks. To enhance the security of coded caching for practical purposes, this paper investigates a secure coded caching scheme for defending against an eavesdropper who may possess prior knowledge before eavesdropping on content delivery. A novel key-based solution is proposed to minimize the leakage of meaningful information to the eavesdropper during the delivery phase. In the proposed solution, the central server observes the strength of the eavesdropper and introduces several keys to dynamically encrypt the broadcast signals within a weak security constraint. The amount of cache memory occupied by the keys is carefully designed to achieve the highest possible cache gain in terms of the rate of content delivery. The tradeoff between the cache memory usage and the transmission rate with varying eavesdropper strength is characterized. For a given size of the total cache memory, the tradeoff between the amounts of memory used for data and key storage is also presented. We report simulation results to support our analytical findings and show that no keys are needed to achieve weak security against a low-strength eavesdropper. Even for an eavesdropper of high strength, weak security can be introduced at a negligible cost given a large cache size.
topic Network security
communication networks
network coding
cooperative caching
url https://ieeexplore.ieee.org/document/8962042/
work_keys_str_mv AT nanwang weaklysecurecodedcachingschemeforaneavesdropperhavingpriorknowledge
AT haizhao weaklysecurecodedcachingschemeforaneavesdropperhavingpriorknowledge
AT haibojin weaklysecurecodedcachingschemeforaneavesdropperhavingpriorknowledge
AT longhai weaklysecurecodedcachingschemeforaneavesdropperhavingpriorknowledge
_version_ 1724184089271992320