计算机科学 ›› 2019, Vol. 46 ›› Issue (10): 167-172.doi: 10.11896/jsjkx.180901776

• 信息安全 • 上一篇    下一篇

社交感知的D2D内容安全缓存算法

张灿, 史鑫, 王萌   

  1. (中国人民解放军陆军工程大学通信工程学院 南京210007)
  • 收稿日期:2018-09-20 修回日期:2019-01-26 出版日期:2019-10-15 发布日期:2019-10-21
  • 通讯作者: 张灿(1994-),女,硕士生,主要研究方向为D2D通信、内容缓存,E-mail:xiliecan@163.com。
  • 作者简介:史鑫(1995-),男,硕士生,主要研究方向为D2D通信、安全缓存;王萌(1983-),男,硕士,讲师,主要研究方向为D2D通信。
  • 基金资助:
    本文受国家自然科学基金(61671474),江苏省优秀青年基金(BK20170089)资助。

Social-aware D2D Secure Caching Algorithm

ZHANG Can, SHI Xin, WANG Meng   

  1. (College of Communications Engineering,Army Engineering University of PLA,Nanjing 210007,China)
  • Received:2018-09-20 Revised:2019-01-26 Online:2019-10-15 Published:2019-10-21

摘要: Device-to-Device(D2D)内容共享技术在使用户能够更加便捷、高效地获取内容的同时,也面临着更为严峻的安全挑战。针对窃听用户存在的D2D内容共享场景,通过设计基于最大距离可分(Maximum Distance Separable,MDS)码的D2D内容安全缓存机制,在提高缓存性能的同时实现内容共享的信息安全。首先,为了避开窃听用户并选择能够带来更好传输性能的内容提供者,提出了基于用户距离和社交信任度的内容提供者选择方案,以明确进行预缓存的用户。在此基础上,为了保证内容在D2D链路上的传输性能,并促使内容更多地缓存在用户更信任的内容提供者中,基于社交信任度和能效提出了社交相关能效的性能度量指标。然后,以最大化社交相关能效为目的,设计缓存内容布设方案,其核心优势在于:利用MDS编码特性提出安全缓存条件,从而在优化社交相关能效的基础上确保窃听用户无法获取足以恢复出原内容的编码块。最后,提出社交感知的基于MDS编码的D2D内容安全缓存算法。仿真分析表明,相比内容提供者随机选择的D2D内容安全缓存算法,所提算法的最优性能提升了15%;相比没有安全缓存条件的D2D内容缓存算法,所提算法虽然需要以42%的性能损失来确保信息安全,但其能够在内容提供者的缓存容量相对更小时实现性能最优。

关键词: D2D内容共享, 安全缓存, 编码缓存, 窃听, 社交信任度

Abstract: Device-to-Device (D2D) content sharing technology is faced with some serious security challenges,which can be adopted to make users more conveniently and efficiently obtain contents.For D2D content sharing scenarios with eavesdroppers,secure caching mechanism based on Maximum Distance Separable (MDS) coding was designed to improve caching performance and meet security requirement.Firstly,content provider selection scheme based on users’ distance and social trust was designed to avoid that the eavesdroppers were selected to cache contents,and select content providers who could obtain higher transmission performance.Based on this,social-related energy efficiency was proposed to ensure the transmission performance and make contents be cached in the content providers that users believed in by using social trust and energy efficiency.Further,content caching placement was designed by maximizing social-related energy efficiency,whose core advantage is that secrecy constraints based on MDS coding was proposed to achieve that eavesdroppers could not obtain enough encoded packets to recover original contents.Finally,social-aware D2D secure caching algorithm based on MDS coding was proposed.Simulation results show that compared with the D2D content secure caching algorithm that content providers are selected randomly,the optimal performance of the proposed algorithm is improved by 15%.Compared with the D2D content caching algorithm without secrecy constraints,the proposed algorithm needs to achieve information security with a performance loss of 42%,but it can achieve its optimal performance when the content provider’s cache capacity is lower.

Key words: Coded caching, Device-to-Device content sharing, Eavesdropping, Secure caching, Social trust

中图分类号: 

  • TN929.5
[1]LIN P,SONG Q,YU Y,et al.Extensive Cooperative Caching in D2D Integrated Cellular Networks[J].IEEE Communications Letters,2017,21(9):2101-2104.
[2]WU D,ZHOU L,CAI Y,et al.Physical-Social-Aware D2D Con-tent Sharing Networks:A Provider-Demander Matching Game[J].IEEE Transactions on Vehicular Technology,2018,67(8):7538-7549.
[3]YUAN X L,WANG X Y,WANG J F,et al.Enabling Secure and Efficient Video Delivery Through Encrypted in-Network Caching[J].IEEE Journal on Selected Areas in Communications,2016,34(8):1-1
[4]SENGUPTA A,TANDON R,CLANCYl T.Fundamental Li-mits of Caching with Secure Delivery[C]//IEEE International Conference on Communications Workshops.IEEE,2013.
[5]AWAN Z H,SEZGIN A.Fundamental Limits of Caching in D2D Networks With Secure Delivery[C]//Proceedings of IEEE International Conference on Communication Workshop.London:IEEE Press,2015:464-469.
[6]ZEWAIL A A,YENER A.Fundamental Limits of Secure Device-to-Device Coded Caching[C]//Proceedings of 50th Asilomar Conference on Signals,Systems and Computers.Pacific Grove:IEEE Press,2016:1414-1418
[7]ZEWAIL A A,YENER A.Coded Caching for Resolvable Networks with Security Requirements[C]//Proceedings of IEEE Conference on Communications and Network Security.Philadelphia:IEEE Press,2016:621-625
[8]RAVINDRAKUMAR V,PANDA P,KARAMCHANDANI N,et al.Private Coded Caching[J].IEEE Transactions on Information Forensics and Security,2018,13(3):685-694.
[9]SU Z,XU Q C.Security-Aware Resource Allocation for Mobile Social Big Data:A Matching-Coalitional Game Solution[J].IEEE Transactions on Big Data,2017:PP(5):1-1.
[10]WYNER A D.The Wire-Tap Channe[J].Bell System Technical Journal,1975,54(8):1355-1387.
[11]CHEN Y J,JI X S,HUANG K Z,et al.Secrecy Outage Probability Based Access Strategy for Device-to-Device Communication Underlaying Cellular Networks[J].Chinese Journal on Communications,2016,37(8):86-94.(in Chinese)
陈亚军,季新生,黄开枝,等.基于安全中断概率的D2D安全接入策略[J].通信学报,2016,37(8):86-94.
[12]LUO Y,CUI L,YANG Y.Research on Physical Layer Security in D2D Enabled Cellular Networks with an Active Eavesdropper[J].Chinese Journal of Signal Processing,2018,34(1):119-125.(in Chinese)
罗屹洁,崔丽,杨旸.D2D使能蜂窝网络中存在主动窃听者的物理层安全研究[J].信号处理,2018,34(1):119-125.
[13]WANG L,WU H,LIU L,et al.Secrecy-Oriented Partner Selection Based on Social Trust in Device-to-Device Communications[C]//Proceedings of IEEE International Conference on Communications.London:IEEE Press,2015:7275-7279.
[14]QU J,CAI Y,WU D,et al.Stackelberg Game Based Power Allocation for Physical Layer Security of Device-to-Device Communication underlaying Cellular Networks[J].Frequenz,2014,68(5/6):285-295.
[15]GABRY F,BIOGLIO V,LAND I.On Edge Caching with Secrecy Constraints[C]//Proceedings of IEEE International Confe-rence on Communications.New Jersey:IEEE Press,2016:1-6.
[16]WANG L,WU H.Jamming Partner Selection for Maximizing the Worst D2D Secrecy Rate Based on Social Trust[J].IEEE Transactions on Emerging Telecommunications Technologies,2017,28(2):1-11.
[17]ZHANG G,YANG K,CHEN H H.Socially Aware Cluster Formation and Radio Resource Allocation in D2D Networks[J].IEEE Wireless Communications,2016,23(4):68-73.
[18]ZHAO P,FENG L,YU P,et al.A Social-Aware Resource Allocation for 5G Device-to-Device Multicast Communication[J].IEEE Access,2017,5:15717-15730.
[19]FENG L,ZHAO P,ZHOU F,et al.Resource Allocation for 5G D2D Multicast Content Sharing in Social-Aware Cellular Networks[J].IEEE Communications Magazine,2018,56(3):112-118.
[20]JI M,CAIRE G,MOLISCH A.Wireless Device-to-Device Caching Networks:Basic Principles and System Performance[J].IEEE Journal on Selected Areas in Communications,2016,34(1):176-189.
[1] 徐光宪, 崔俊杰.
一种基于量子GHZ态的防窃听网络编码
Anti-eavesdropping Network Coding Based on Quantum GHZ State
计算机科学, 2020, 47(7): 314-321. https://doi.org/10.11896/jsjkx.190500168
[2] 刘宴涛,王雪冰.
窃听攻击下子空间码的安全性
Security of Subspace Code against Wiretap Attacks
计算机科学, 2017, 44(Z6): 372-376. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.084
[3] 黄静,席博,李鹏,张帆,赵新杰.
一种基于量子密码的卫星网络窃听攻击检测方法
Method for Detecting Wiretapping Attack in Satellite Network Based on Quantum Cryptography
计算机科学, 2016, 43(7): 157-161. https://doi.org/10.11896/j.issn.1002-137X.2016.07.028
[4] 赵佳佳,任平安.
基于抗窃听和拜占庭攻击的随机网络编码
Random Network Coding Based on Anti-eavesdropping and Byzantine Adversaries
计算机科学, 2014, 41(9): 174-177. https://doi.org/10.11896/j.issn.1002-137X.2014.09.033
[5] 曹张华,吉晓东,刘敏.
网络编码在窃听网络中的应用
Application of Network Coding in Wiretap Network
计算机科学, 2013, 40(10): 144-147.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!