Computer Science ›› 2019, Vol. 46 ›› Issue (10): 167-172.doi: 10.11896/jsjkx.180901776

• Information Security • Previous Articles     Next Articles

Social-aware D2D Secure Caching Algorithm

ZHANG Can, SHI Xin, WANG Meng   

  1. (College of Communications Engineering,Army Engineering University of PLA,Nanjing 210007,China)
  • Received:2018-09-20 Revised:2019-01-26 Online:2019-10-15 Published:2019-10-21

Abstract: Device-to-Device (D2D) content sharing technology is faced with some serious security challenges,which can be adopted to make users more conveniently and efficiently obtain contents.For D2D content sharing scenarios with eavesdroppers,secure caching mechanism based on Maximum Distance Separable (MDS) coding was designed to improve caching performance and meet security requirement.Firstly,content provider selection scheme based on users’ distance and social trust was designed to avoid that the eavesdroppers were selected to cache contents,and select content providers who could obtain higher transmission performance.Based on this,social-related energy efficiency was proposed to ensure the transmission performance and make contents be cached in the content providers that users believed in by using social trust and energy efficiency.Further,content caching placement was designed by maximizing social-related energy efficiency,whose core advantage is that secrecy constraints based on MDS coding was proposed to achieve that eavesdroppers could not obtain enough encoded packets to recover original contents.Finally,social-aware D2D secure caching algorithm based on MDS coding was proposed.Simulation results show that compared with the D2D content secure caching algorithm that content providers are selected randomly,the optimal performance of the proposed algorithm is improved by 15%.Compared with the D2D content caching algorithm without secrecy constraints,the proposed algorithm needs to achieve information security with a performance loss of 42%,but it can achieve its optimal performance when the content provider’s cache capacity is lower.

Key words: Coded caching, Device-to-Device content sharing, Eavesdropping, Secure caching, Social trust

CLC Number: 

  • TN929.5
[1]LIN P,SONG Q,YU Y,et al.Extensive Cooperative Caching in D2D Integrated Cellular Networks[J].IEEE Communications Letters,2017,21(9):2101-2104.
[2]WU D,ZHOU L,CAI Y,et al.Physical-Social-Aware D2D Con-tent Sharing Networks:A Provider-Demander Matching Game[J].IEEE Transactions on Vehicular Technology,2018,67(8):7538-7549.
[3]YUAN X L,WANG X Y,WANG J F,et al.Enabling Secure and Efficient Video Delivery Through Encrypted in-Network Caching[J].IEEE Journal on Selected Areas in Communications,2016,34(8):1-1
[4]SENGUPTA A,TANDON R,CLANCYl T.Fundamental Li-mits of Caching with Secure Delivery[C]//IEEE International Conference on Communications Workshops.IEEE,2013.
[5]AWAN Z H,SEZGIN A.Fundamental Limits of Caching in D2D Networks With Secure Delivery[C]//Proceedings of IEEE International Conference on Communication Workshop.London:IEEE Press,2015:464-469.
[6]ZEWAIL A A,YENER A.Fundamental Limits of Secure Device-to-Device Coded Caching[C]//Proceedings of 50th Asilomar Conference on Signals,Systems and Computers.Pacific Grove:IEEE Press,2016:1414-1418
[7]ZEWAIL A A,YENER A.Coded Caching for Resolvable Networks with Security Requirements[C]//Proceedings of IEEE Conference on Communications and Network Security.Philadelphia:IEEE Press,2016:621-625
[8]RAVINDRAKUMAR V,PANDA P,KARAMCHANDANI N,et al.Private Coded Caching[J].IEEE Transactions on Information Forensics and Security,2018,13(3):685-694.
[9]SU Z,XU Q C.Security-Aware Resource Allocation for Mobile Social Big Data:A Matching-Coalitional Game Solution[J].IEEE Transactions on Big Data,2017:PP(5):1-1.
[10]WYNER A D.The Wire-Tap Channe[J].Bell System Technical Journal,1975,54(8):1355-1387.
[11]CHEN Y J,JI X S,HUANG K Z,et al.Secrecy Outage Probability Based Access Strategy for Device-to-Device Communication Underlaying Cellular Networks[J].Chinese Journal on Communications,2016,37(8):86-94.(in Chinese)
陈亚军,季新生,黄开枝,等.基于安全中断概率的D2D安全接入策略[J].通信学报,2016,37(8):86-94.
[12]LUO Y,CUI L,YANG Y.Research on Physical Layer Security in D2D Enabled Cellular Networks with an Active Eavesdropper[J].Chinese Journal of Signal Processing,2018,34(1):119-125.(in Chinese)
罗屹洁,崔丽,杨旸.D2D使能蜂窝网络中存在主动窃听者的物理层安全研究[J].信号处理,2018,34(1):119-125.
[13]WANG L,WU H,LIU L,et al.Secrecy-Oriented Partner Selection Based on Social Trust in Device-to-Device Communications[C]//Proceedings of IEEE International Conference on Communications.London:IEEE Press,2015:7275-7279.
[14]QU J,CAI Y,WU D,et al.Stackelberg Game Based Power Allocation for Physical Layer Security of Device-to-Device Communication underlaying Cellular Networks[J].Frequenz,2014,68(5/6):285-295.
[15]GABRY F,BIOGLIO V,LAND I.On Edge Caching with Secrecy Constraints[C]//Proceedings of IEEE International Confe-rence on Communications.New Jersey:IEEE Press,2016:1-6.
[16]WANG L,WU H.Jamming Partner Selection for Maximizing the Worst D2D Secrecy Rate Based on Social Trust[J].IEEE Transactions on Emerging Telecommunications Technologies,2017,28(2):1-11.
[17]ZHANG G,YANG K,CHEN H H.Socially Aware Cluster Formation and Radio Resource Allocation in D2D Networks[J].IEEE Wireless Communications,2016,23(4):68-73.
[18]ZHAO P,FENG L,YU P,et al.A Social-Aware Resource Allocation for 5G Device-to-Device Multicast Communication[J].IEEE Access,2017,5:15717-15730.
[19]FENG L,ZHAO P,ZHOU F,et al.Resource Allocation for 5G D2D Multicast Content Sharing in Social-Aware Cellular Networks[J].IEEE Communications Magazine,2018,56(3):112-118.
[20]JI M,CAIRE G,MOLISCH A.Wireless Device-to-Device Caching Networks:Basic Principles and System Performance[J].IEEE Journal on Selected Areas in Communications,2016,34(1):176-189.
[1] XU Guang-xian, CUI Jun-jie. Anti-eavesdropping Network Coding Based on Quantum GHZ State [J]. Computer Science, 2020, 47(7): 314-321.
[2] ZHAO Jia-jia and REN Ping-an. Random Network Coding Based on Anti-eavesdropping and Byzantine Adversaries [J]. Computer Science, 2014, 41(9): 174-177.
[3] XING Xing,ZHANG Wei-shi and JIA Zhi-chun. TBLFM:Trust Based Latent Factor Model for Social Recommendation [J]. Computer Science, 2014, 41(1): 163-167.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!