On the Fundamental Limits of Device-to-Device Private Caching under Uncoded Cache Placement and User Collusion

In the coded caching problem, as originally formulated by Maddah-Ali and Niesen, a server communicates via a noiseless shared broadcast link to multiple users that have local storage capability. In order for a user to decode its demanded file from the coded multicast transmission, the demands of all...

Full description

Bibliographic Details
Main Authors: Caire, G. (Author), Ji, M. (Author), Sun, H. (Author), Tuninetti, D. (Author), Wan, K. (Author)
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2022
Subjects:
Sun
Online Access:View Fulltext in Publisher
LEADER 03693nam a2200445Ia 4500
001 10.1109-TIT.2022.3173581
008 220630s2022 CNT 000 0 und d
020 |a 00189448 (ISSN) 
245 1 0 |a On the Fundamental Limits of Device-to-Device Private Caching under Uncoded Cache Placement and User Collusion 
260 0 |b Institute of Electrical and Electronics Engineers Inc.  |c 2022 
520 3 |a In the coded caching problem, as originally formulated by Maddah-Ali and Niesen, a server communicates via a noiseless shared broadcast link to multiple users that have local storage capability. In order for a user to decode its demanded file from the coded multicast transmission, the demands of all the users must be globally known, which may violate the privacy of the users. To overcome this privacy problem, Wan and Caire recently proposed several schemes that attain coded multicasting gain while simultaneously guarantee information theoretic privacy of the users’ demands. In Device-to-Device (D2D) networks, the demand privacy problem is further exacerbated by the fact that each user is also a transmitter, which appears to be needing the knowledge of the files demanded by the remaining users in order to form its coded multicast transmission. This paper shows how to solve this seemingly infeasible problem. The main contribution of this paper is the development of new achievable and converse bounds for D2D coded caching that are to within a constant factor of one another when privacy of the users’ demands must be guaranteed even in the presence of colluding users (i.e., when some users share cached contents and demanded file indices). First, a D2D private caching scheme is proposed, whose key feature is the addition of virtual users in the system in order to “hide” the demands of the real users. By comparing the achievable D2D private load with an existing converse bound for the shared-link model without demand privacy constraint, the proposed scheme is shown to be order optimal, except for the very low memory size regime with more files than users. Second, in order to shed light into the open parameter regime, a new achievable scheme and a new converse bound under the constraint of uncoded cache placement (i.e., when each user stores directly a subset of the bits of the library) are developed for the case of two users, and shown to be to within a constant factor of one another for all system parameters. Finally, the two-user converse bound is extended to any number of users by a cut-set type argument. With this new converse bound, the virtual users scheme is shown to be order optimal in all parameter regimes under the constraint of uncoded cache placement and user collusion. IEEE 
650 0 4 |a Cache placement 
650 0 4 |a Constant factors 
650 0 4 |a Data privacy 
650 0 4 |a Device-to-device communication 
650 0 4 |a Device-to-Device communications 
650 0 4 |a Information theory 
650 0 4 |a Libraries 
650 0 4 |a Libraries 
650 0 4 |a Load modeling 
650 0 4 |a Load modeling 
650 0 4 |a Metadata 
650 0 4 |a Metadata 
650 0 4 |a Multicast transmissions 
650 0 4 |a Multicasting 
650 0 4 |a Parameter regimes 
650 0 4 |a Privacy 
650 0 4 |a Privacy 
650 0 4 |a Privacy problems 
650 0 4 |a Servers 
650 0 4 |a Sun 
650 0 4 |a UNCODED 
650 0 4 |a Virtual users 
700 1 0 |a Caire, G.  |e author 
700 1 0 |a Ji, M.  |e author 
700 1 0 |a Sun, H.  |e author 
700 1 0 |a Tuninetti, D.  |e author 
700 1 0 |a Wan, K.  |e author 
773 |t IEEE Transactions on Information Theory 
856 |z View Fulltext in Publisher  |u https://doi.org/10.1109/TIT.2022.3173581