In this paper we investigate the problem of optimal cache placement under secrecy constraints in heterogeneous networks, where small-cell base stations are equipped with caches to reduce the overall backhaul load. For two models for eavesdropping attacks, we formally derive the necessary conditions for secrecy and we derive the corresponding achievable backhaul rate. In particular we formulate the optimal caching schemes with secrecy constraints as a convex optimization problem. We then thoroughly investigate the backhaul rate performance of the heterogeneous network with secrecy constraints using numerical simulations. We compare the system performance with and without secrecy constraints and we analyze the influence of the system parameters, such as the file popularity, size of the library files and the capabilities of the small-cell base stations, on the overall performance of our optimal caching strategy. Our results highlight the considerable impact of the secrecy requirements on the overall caching performance of the network.
On edge caching with secrecy constraints
Bioglio VCo-first
;
2016-01-01
Abstract
In this paper we investigate the problem of optimal cache placement under secrecy constraints in heterogeneous networks, where small-cell base stations are equipped with caches to reduce the overall backhaul load. For two models for eavesdropping attacks, we formally derive the necessary conditions for secrecy and we derive the corresponding achievable backhaul rate. In particular we formulate the optimal caching schemes with secrecy constraints as a convex optimization problem. We then thoroughly investigate the backhaul rate performance of the heterogeneous network with secrecy constraints using numerical simulations. We compare the system performance with and without secrecy constraints and we analyze the influence of the system parameters, such as the file popularity, size of the library files and the capabilities of the small-cell base stations, on the overall performance of our optimal caching strategy. Our results highlight the considerable impact of the secrecy requirements on the overall caching performance of the network.File | Dimensione | Formato | |
---|---|---|---|
2016-on_edge_caching_with_secrecy_constraints.pdf
Accesso riservato
Dimensione
524.7 kB
Formato
Adobe PDF
|
524.7 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.