Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior Knowledge
Coded caching is a promising method for solving caching problems in content-centric wireless networks. To enhance the security of coded caching for practical purposes, this paper investigates a secure coded caching scheme for defending against an eavesdropper who may possess prior knowledge before e...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8962042/ |
id |
doaj-66552ae0bed748d599102ec5eb7df2ad |
---|---|
record_format |
Article |
spelling |
doaj-66552ae0bed748d599102ec5eb7df2ad2021-03-30T03:05:43ZengIEEEIEEE Access2169-35362020-01-018155651557510.1109/ACCESS.2020.29674278962042Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior KnowledgeNan Wang0https://orcid.org/0000-0001-5256-4551Hai Zhao1https://orcid.org/0000-0001-9796-054XHaibo Jin2https://orcid.org/0000-0002-3893-4090Long Hai3https://orcid.org/0000-0001-8945-4153Computer Science and Engineering, Northeastern University, Shenyang, ChinaComputer Science and Engineering, Northeastern University, Shenyang, ChinaCollege of Software Engineering, Liaoning Technical University–Huludao, Huludao, ChinaSchool of Computer Engineering, Shenzhen Polytechnic, Shenzhen, ChinaCoded caching is a promising method for solving caching problems in content-centric wireless networks. To enhance the security of coded caching for practical purposes, this paper investigates a secure coded caching scheme for defending against an eavesdropper who may possess prior knowledge before eavesdropping on content delivery. A novel key-based solution is proposed to minimize the leakage of meaningful information to the eavesdropper during the delivery phase. In the proposed solution, the central server observes the strength of the eavesdropper and introduces several keys to dynamically encrypt the broadcast signals within a weak security constraint. The amount of cache memory occupied by the keys is carefully designed to achieve the highest possible cache gain in terms of the rate of content delivery. The tradeoff between the cache memory usage and the transmission rate with varying eavesdropper strength is characterized. For a given size of the total cache memory, the tradeoff between the amounts of memory used for data and key storage is also presented. We report simulation results to support our analytical findings and show that no keys are needed to achieve weak security against a low-strength eavesdropper. Even for an eavesdropper of high strength, weak security can be introduced at a negligible cost given a large cache size.https://ieeexplore.ieee.org/document/8962042/Network securitycommunication networksnetwork codingcooperative caching |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Nan Wang Hai Zhao Haibo Jin Long Hai |
spellingShingle |
Nan Wang Hai Zhao Haibo Jin Long Hai Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior Knowledge IEEE Access Network security communication networks network coding cooperative caching |
author_facet |
Nan Wang Hai Zhao Haibo Jin Long Hai |
author_sort |
Nan Wang |
title |
Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior Knowledge |
title_short |
Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior Knowledge |
title_full |
Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior Knowledge |
title_fullStr |
Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior Knowledge |
title_full_unstemmed |
Weakly Secure Coded Caching Scheme for an Eavesdropper Having Prior Knowledge |
title_sort |
weakly secure coded caching scheme for an eavesdropper having prior knowledge |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2020-01-01 |
description |
Coded caching is a promising method for solving caching problems in content-centric wireless networks. To enhance the security of coded caching for practical purposes, this paper investigates a secure coded caching scheme for defending against an eavesdropper who may possess prior knowledge before eavesdropping on content delivery. A novel key-based solution is proposed to minimize the leakage of meaningful information to the eavesdropper during the delivery phase. In the proposed solution, the central server observes the strength of the eavesdropper and introduces several keys to dynamically encrypt the broadcast signals within a weak security constraint. The amount of cache memory occupied by the keys is carefully designed to achieve the highest possible cache gain in terms of the rate of content delivery. The tradeoff between the cache memory usage and the transmission rate with varying eavesdropper strength is characterized. For a given size of the total cache memory, the tradeoff between the amounts of memory used for data and key storage is also presented. We report simulation results to support our analytical findings and show that no keys are needed to achieve weak security against a low-strength eavesdropper. Even for an eavesdropper of high strength, weak security can be introduced at a negligible cost given a large cache size. |
topic |
Network security communication networks network coding cooperative caching |
url |
https://ieeexplore.ieee.org/document/8962042/ |
work_keys_str_mv |
AT nanwang weaklysecurecodedcachingschemeforaneavesdropperhavingpriorknowledge AT haizhao weaklysecurecodedcachingschemeforaneavesdropperhavingpriorknowledge AT haibojin weaklysecurecodedcachingschemeforaneavesdropperhavingpriorknowledge AT longhai weaklysecurecodedcachingschemeforaneavesdropperhavingpriorknowledge |
_version_ |
1724184089271992320 |