{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:14Z","timestamp":1740149054653,"version":"3.37.3"},"reference-count":25,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,2,6]],"date-time":"2021-02-06T00:00:00Z","timestamp":1612569600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002072","GZHKJXM20170117"],"award-info":[{"award-number":["62002072","GZHKJXM20170117"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004000","name":"Guangzhou Science and Technology Program key projects","doi-asserted-by":"publisher","award":["62002072","GZHKJXM20170117"],"award-info":[{"award-number":["62002072","GZHKJXM20170117"]}],"id":[{"id":"10.13039\/501100004000","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,2,6]]},"abstract":"<jats:p>With device-to-device (D2D) communication, user equipment can share data with each other without the involvement of network infrastructures. In order to maintain the Quality of Service (QoS) and Quality of Experience (QoE) for user applications in D2D communications, most existing schemes use proactive content caching that needs to predict content popularity before making caching decisions which may result in privacy leakage, since the information of users is collected to train a deep learning-based model to predict content popularity. Therefore, it is crucial to guarantee secure data collection in machine learning-based framework. In this paper, we propose a privacy-preserving D2D caching scheme with a passive content caching strategy based on node importance, which can deliver more efficient caching and prevent the potential leakage of user privacy. The scheme is based on softwaredefined networking (SDN), in which the controller is responsible for calculating node importance of devices according to the information of requests and encounters collected by SDN switches. Base station will decide which device can establish reliable and secure communication with content requester based on historical information. The simulation results show that the proposed strategy can outperform other D2D caching strategies in terms of cache hit rate and data rate.<\/jats:p>","DOI":"10.1155\/2021\/6696149","type":"journal-article","created":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T04:03:12Z","timestamp":1612843392000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["A Privacy-Preserving Caching Scheme for Device-to-Device Communications"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6256-8214","authenticated-orcid":true,"given":"Yuqing","family":"Zhong","sequence":"first","affiliation":[{"name":"Communication Research Center, Guangzhou Power Supply Bureau, Guangzhou 510600, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9436-9498","authenticated-orcid":true,"given":"Zhaohua","family":"Li","sequence":"additional","affiliation":[{"name":"Guangdong Electric Power Design and Research Institute, China Energy Construction Group, Guangzhou 510600, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1188-3123","authenticated-orcid":true,"given":"Liping","family":"Liao","sequence":"additional","affiliation":[{"name":"Guangdong Polytechnic Normal University, Guangzhou, China"}]}],"member":"311","reference":[{"volume-title":"Visual Networking Index: Global Mobile Data Traffic Forecast Update","year":"2017","author":"C. Cisco","key":"1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2019.2892419"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/tmm.2015.2447277"},{"issue":"4","key":"4","doi-asserted-by":"crossref","first-page":"3098","DOI":"10.1109\/COMST.2018.2841349","article-title":"A survey on low latency towards 5G: RAN, core network and caching solutions","volume":"20","author":"I. Parvez","year":"2018","journal-title":"IEEE Communications Surveys and Tutorials"},{"first-page":"1","article-title":"Caching in base station with recommendation via Q-learning","author":"K. Guo","key":"5"},{"first-page":"1897","article-title":"Learning-based optimization of cache content in a small cell base station","author":"P. Blasco","key":"6"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736753"},{"first-page":"1","article-title":"A learning-based approach for proactive caching in wireless communication networks","author":"Y. Wang","key":"8"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7553029"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2016.2554547"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2018.1700291"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.08.004"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2014.2316817"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6495773"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2705038"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2699631"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2762661"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2867471"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2894403"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2951509"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2014.6871674"},{"first-page":"1","article-title":"Caching policy optimization for D2D communications by learning user preference","author":"B. Chen","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2014.2334661"},{"issue":"4","key":"25","doi-asserted-by":"crossref","first-page":"1801","DOI":"10.1109\/COMST.2014.2319555","article-title":"A survey on device-to-device communication in cellular networks","volume":"16","author":"A. Asadi","year":"2014","journal-title":"IEEE Communications Surveys & Tutorials"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6696149.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6696149.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6696149.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T04:03:16Z","timestamp":1612843396000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6696149\/"}},"subtitle":[],"editor":[{"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,2,6]]},"references-count":25,"alternative-id":["6696149","6696149"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6696149","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,2,6]]}}}