Proactive Coded Caching Scheme for D2D Networks

📅 2026-01-20
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses a critical gap in existing device-to-device (D2D) coded caching schemes, which typically overlook the risk of file privacy leakage due to adversarial access to cached content and struggle to simultaneously ensure cache privacy and transmission security. To resolve this, the paper proposes a secure coded caching scheme tailored for D2D networks that jointly guarantees information-theoretic file privacy during the caching phase and communication security during delivery. Notably, this is the first scheme in D2D coded caching to achieve both cache privacy and secure transmission concurrently. Under the assumptions of large file sizes and sufficient cache capacity, the proposed approach attains order-optimal communication load performance, thereby offering a robust and efficient solution for privacy-preserving and secure content delivery in D2D systems.

Technology Category

Application Category

📝 Abstract
Coded caching and device-to-device (D2D) communication are two effective techniques for alleviating network traffic. Secure transmission and file privacy have also become critical concerns in these domains. However, prevailing coded caching schemes typically assume that a user's cached content is inaccessible to others, overlooking the risk of file privacy leakage due to attacks targeting the cache itself. In this paper, we propose a secure coded caching scheme for D2D networks that guarantees both file privacy and secure delivery. We demonstrate that the proposed scheme achieves order-optimal performance when the file size is sufficiently large and the cache memory is ample.
Problem

Research questions and friction points this paper is trying to address.

coded caching
device-to-device communication
file privacy
secure transmission
cache security
Innovation

Methods, ideas, or system contributions that make the work stand out.

secure coded caching
device-to-device networks
file privacy
secure delivery
order-optimal performance
🔎 Similar Papers
No similar papers found.
Q
Qiaoling Zhang
School of Mathematics and Statistics, Key Laboratory of Analytical Mathematics and Applications (Ministry of Education), Fujian Key Laboratory of Analytical Mathematics and Applications (FJKLAMA), Center for Applied Mathematics of Fujian Province (FJNU), Fujian Normal University, Fuzhou 350117, China
C
Changlu Lin
School of Mathematics and Statistics, Key Laboratory of Analytical Mathematics and Applications (Ministry of Education), Fujian Key Laboratory of Analytical Mathematics and Applications (FJKLAMA), Center for Applied Mathematics of Fujian Province (FJNU), Fujian Normal University, Fuzhou 350117, China
Minquan Cheng
Minquan Cheng
Guangxi Normal University
Coding TheoryCombinatoricsInformation Theory