D2D Private Caching and User Collusion
D2D Privacy Is Harder
The Wan-Caire result (Β§12.2) holds for shared-link caching β server-to-users broadcast with a single trusted server. In D2D caching (Ch 10), the setting is more delicate: users are themselves transmitters, so privacy-preserving delivery means users must not learn other users' demands from their cached content or from the D2D transmissions they observe.
Moreover, users can collude: of them could pool their caches and observed messages to infer non-colluding users' demands. The Wan-Sun-Ji-Tuninetti-Caire CommIT result characterizes the fundamental limits of D2D private caching under collusion of any size .
This section presents the model and main theorem.
Definition: D2D Private Caching with -Collusion
D2D Private Caching with -Collusion
A -private D2D caching scheme ensures that any coalition of colluding users cannot learn the demands of non-colluding users: Here is the colluding coalition, and are the messages received/observed by coalition members.
For : single-user privacy (Wan-Caire result). For : trivial (everyone knows everything). Interesting regime: moderate (1-5 users colluding) β the "large adversarial fraction" case.
Theorem: Wan-Sun-Ji-Tuninetti-Caire -Private Rate
For the D2D private caching problem with users, files, per-user cache , and colluding coalition of size , the achievable rate under -privacy is That is, the effective user count reduces from to . Privacy against -collusion costs caching gain: the effective group size is smaller, and replaces the original .
Each colluding user contributes to the coalition's information. The non-colluding users' demands must be protected against any coalition of size . By the union-bound-like argument, the effective number of users "helping" the coded multicast reduces by .
Privacy against the full coalition () is impossible at positive rate β then everyone knows all demands, no privacy guarantee can be provided.
Reduce to (K-z) users
Any coalition of users is visible; privacy is guaranteed relative to the remaining . Treat the non-colluding users as a smaller MAN-style problem.
Apply Wan-Caire on $(K - z)$ users
The Wan-Caire scheme extended to D2D achieves rate on the non-colluding population.
Coalition's effect
Colluding users can still receive their own files via D2D β they just don't help in the coded multicast for non-colluding users. Effective .
Privacy argument
The coalition's collective cache + observed messages reveals nothing about non-colluding users' demands due to the masking permutations (extended to D2D with user-specific shared randomness).
D2D Private Caching under User Collusion
The Wan-Sun-Ji-Tuninetti-Caire CommIT result extends demand privacy to D2D networks with user collusion. Key contributions:
- Coalition model. Characterizes privacy against any coalition of size .
- Achievable rate. Effective in the MAN rate formula. Privacy against larger coalitions costs caching gain.
- Converse. Shows the reduction is tight β no scheme achieves higher rate under -privacy.
- Tradeoff curve. At : small privacy cost. At : privacy vanishes (trivial).
The result characterizes the "price of privacy" in D2D coded caching. For practical (say 1-5 curious users), the rate penalty is modest; for adversarial settings where half the users might collude, the price is substantial.
Private Rate vs Colluding Coalition Size
Achievable private rate under -collusion as a function of . At (no collusion): full MAN rate. At : rate 0 (everyone colludes; no privacy possible). Smooth decrease in between.
Parameters
Example: Cost of Privacy Against 20% Collusion
For a network of users, cache ratio , allowing up to (20% of users) to collude: compute the rate penalty vs no collusion.
No collusion ($z = 0$)
files/round.
$z = 10$
files/round.
Ratio
. Only 4% rate penalty to protect against 20% collusion β very modest price.
Conclusion
For practical levels of collusion (1-20% of users), the rate penalty is small. The CommIT result says privacy in D2D is nearly free up to substantial adversarial fractions.
Key Takeaway
D2D privacy costs rate proportional to coalition size. Effective users . For small (typical threat model): rate penalty is negligible. For (all- colluding): rate . The graceful degradation is a Wan-Sun- Ji-Tuninetti-Caire CommIT result and provides the theoretical justification for privacy-preserving D2D deployments.
Privacy in Cooperative Settings
There is a subtle tension between cooperation (Chapters 5, 9) and privacy (Chapter 12). Cooperation among servers / APs requires them to know user demands to coordinate precoding; this is fundamentally at odds with demand privacy.
Resolution in practice:
- Privacy at user level, not server. The server coordinates delivery knowing demands; privacy is enforced against other users. The server is trusted.
- Encrypted aggregates. Servers compute precoders from encrypted demand aggregates without learning individual demands. Homomorphic encryption / MPC β expensive in practice.
- Distributed randomization. Users inject noise into reported demands; server sees only aggregates. Statistical privacy, weaker than IT privacy.
The CommIT group's work focuses on (1) β server is trusted but other users are adversaries. For pure D2D without any trusted server, (2) or (3) may be needed.