D2D Private Caching and User Collusion

D2D Privacy Is Harder

The Wan-Caire result (Β§12.2) holds for shared-link caching β€” server-to-users broadcast with a single trusted server. In D2D caching (Ch 10), the setting is more delicate: users are themselves transmitters, so privacy-preserving delivery means users must not learn other users' demands from their cached content or from the D2D transmissions they observe.

Moreover, users can collude: zz of them could pool their caches and observed messages to infer non-colluding users' demands. The Wan-Sun-Ji-Tuninetti-Caire CommIT result characterizes the fundamental limits of D2D private caching under collusion of any size zz.

This section presents the model and main theorem.

Definition:

D2D Private Caching with zz-Collusion

A zz-private D2D caching scheme ensures that any coalition of zz colluding users cannot learn the demands of non-colluding users: I ⁣(d[K]βˆ–Z;β€…β€Š{Xi}i∈Z,{Zi}i∈Z,{di}i∈Z)β€…β€Š=β€…β€Š0,βˆ€ZβŠ†[K],∣Zβˆ£β‰€z.I\!\left(\mathbf{d}_{[K] \setminus \mathcal{Z}};\; \{X_{i}\}_{i \in \mathcal{Z}}, \{\mathcal{Z}_i\}_{i \in \mathcal{Z}}, \{d_i\}_{i \in \mathcal{Z}} \right) \;=\; 0, \quad \forall \mathcal{Z} \subseteq [K], |\mathcal{Z}| \leq z. Here Z\mathcal{Z} is the colluding coalition, and {Xi}i∈Z\{X_i\}_{i \in \mathcal{Z}} are the messages received/observed by coalition members.

For z=1z = 1: single-user privacy (Wan-Caire result). For z=Kz = K: trivial (everyone knows everything). Interesting regime: moderate zz (1-5 users colluding) β€” the "large adversarial fraction" case.

Theorem: Wan-Sun-Ji-Tuninetti-Caire zz-Private Rate

For the D2D private caching problem with KK users, NN files, per-user cache MM, and colluding coalition of size zz, the achievable rate under zz-privacy is Rpriv,z(M)β€…β€Š=β€…β€Š(Kβˆ’z)β‹…1βˆ’ΞΌ1+(Kβˆ’z)ΞΌ.R_{\text{priv}, z}(M) \;=\; (K - z) \cdot \frac{1 - \mu}{1 + (K - z) \mu}. That is, the effective user count reduces from KK to Kβˆ’zK - z. Privacy against zz-collusion costs caching gain: the effective group size is smaller, and teff=(Kβˆ’z)M/Nt_{\text{eff}} = (K-z) M/N replaces the original tt.

Each colluding user contributes to the coalition's information. The non-colluding users' demands must be protected against any coalition of size zz. By the union-bound-like argument, the effective number of users "helping" the coded multicast reduces by zz.

Privacy against the full coalition (z=Kz = K) is impossible at positive rate β€” then everyone knows all demands, no privacy guarantee can be provided.

πŸŽ“CommIT Contribution(2022)

D2D Private Caching under User Collusion

K. Wan, L. Sun, M. Ji, D. Tuninetti, G. Caire β€” IEEE Transactions on Information Theory

The Wan-Sun-Ji-Tuninetti-Caire CommIT result extends demand privacy to D2D networks with user collusion. Key contributions:

  1. Coalition model. Characterizes privacy against any coalition of size z∈[1,Kβˆ’1]z \in [1, K-1].
  2. Achievable rate. Effective Keff=Kβˆ’zK_{\text{eff}} = K - z in the MAN rate formula. Privacy against larger coalitions costs caching gain.
  3. Converse. Shows the (Kβˆ’z)(K-z) reduction is tight β€” no scheme achieves higher rate under zz-privacy.
  4. Tradeoff curve. At zβ‰ͺKz \ll K: small privacy cost. At zβ†’Kz \to K: privacy vanishes (trivial).

The result characterizes the "price of privacy" in D2D coded caching. For practical zz (say 1-5 curious users), the rate penalty is modest; for adversarial settings where half the users might collude, the price is substantial.

coded-cachingprivacycommitd2dcollusionView Paper β†’

Private Rate vs Colluding Coalition Size

Achievable private rate under zz-collusion as a function of zz. At z=0z = 0 (no collusion): full MAN rate. At z=Kz = K: rate 0 (everyone colludes; no privacy possible). Smooth decrease in between.

Parameters
10
0.3

Example: Cost of Privacy Against 20% Collusion

For a network of K=50K = 50 users, cache ratio ΞΌ=0.1\mu = 0.1, allowing up to z=10z = 10 (20% of users) to collude: compute the rate penalty vs no collusion.

Key Takeaway

D2D privacy costs rate proportional to coalition size. Effective users Keff=Kβˆ’zK_{\text{eff}} = K - z. For small zz (typical threat model): rate penalty is negligible. For zβ†’Kz \to K (all- colluding): rate β†’0\to 0. The graceful degradation is a Wan-Sun- Ji-Tuninetti-Caire CommIT result and provides the theoretical justification for privacy-preserving D2D deployments.

Privacy in Cooperative Settings

There is a subtle tension between cooperation (Chapters 5, 9) and privacy (Chapter 12). Cooperation among servers / APs requires them to know user demands to coordinate precoding; this is fundamentally at odds with demand privacy.

Resolution in practice:

  1. Privacy at user level, not server. The server coordinates delivery knowing demands; privacy is enforced against other users. The server is trusted.
  2. Encrypted aggregates. Servers compute precoders from encrypted demand aggregates without learning individual demands. Homomorphic encryption / MPC β€” expensive in practice.
  3. Distributed randomization. Users inject noise into reported demands; server sees only aggregates. Statistical privacy, weaker than IT privacy.

The CommIT group's work focuses on (1) β€” server is trusted but other users are adversaries. For pure D2D without any trusted server, (2) or (3) may be needed.