期刊文献+

内容中心网络缓存隐私保护策略 被引量:4

Cache privacy protection strategy in content centric networking
下载PDF
导出
摘要 缓存隐私泄露是内容中心网络中的重要安全威胁之一,攻击者通过探测缓存可以获取合法用户的隐私信息。针对该安全问题,在隐私与非隐私内容区分的基础上,提出一种基于最近访问信息与回退机制的缓存隐私保护策略(CPPS-RVI&ECP),并与现有典型防御策略-随机k延迟(RFKD)对比,围绕隐私泄露率与网络命中率开展理论性能分析。该策略通过设置隐私标识,实现最近访问者的识别;通过随机缓存位置存入以及移出回退机制,降低了隐私泄露概率,且提升了网络性能。设定实验条件进行数值分析,结果表明,虽然RFKD有理想的隐私保护能力,但是它是以完全牺牲缓存的内容分发能力为代价的,而CPPS-RVI&ECP则通过合理设置回退概率,可以在保持较低隐私泄露率的同时,获得较高的网络命中率。 Cache privacy leak was one of the important security threats of CCN, the adversary could obtain the legitimate user's privacy information through probing cache visiting time. Aiming at this security problem, the privacy and non-privacy contents were dealt separately, then a cache privacy protection strategy based on recent visiting information and evicted copy up(CPPS-RVIECP) was proposed. In order to compare with the current typical defense strategy-random first k delay(RFKD), the theoretical analysis of privacy leak probability and network hit probability are further given. The CPPS-RVIECP identifies the recent visitor by setting privacy mark in interest packet, decreases the privacy leak probability by selecting replacing position randomly, and promotes the network performance by the mechanism of shifting evicted copy upstream. The numeric analysis results under the prescribed experimental conditions show that, whereas the ideal privacy protection ability of RFKD is obtained at the expense of sacrifice of cache contents delivery capability, the proposed CPPS-RVIECP can obtain low privacy leak probability and in the meantime maintain high network hit probability by setting reasonable upstream shifting probability.
出处 《通信学报》 EI CSCD 北大核心 2015年第12期139-150,共12页 Journal on Communications
基金 江苏省科技支撑计划(工业)基金资助项目(BE2013019)~~
关键词 内容中心网络 缓存隐私探测 隐私保护策略 隐私泄露率 网络命中率 content centric networking cache privacy probe privacy protection strategy privacy leak probability network hit probability
  • 相关文献

参考文献22

  • 1KOPONEN T, CHAWLA M, GON C B, et al. A data-oriented (and beyond) network architecture[A]. Proceedings of the ACM SIG- COMM 2007 Conference[C]. Kyoto, Japan, 2007. 181-192.
  • 2European Union. Project FP7 4WARD[EB/OL]. http://www.4ward- project.eu, 2010.
  • 3European Union. Project PSIRP[EB/OL]. http://www.psirp.org, 2010.
  • 4JACOBSON V, SMETTERS D K, THORNTON J D, et al. Network- ing named content[A]. Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies[C]. Rome, Italy, 2009. 1-12.
  • 5VASILAKOS A V, LI Z, SIMON G, et al, Information centric net- work: research challenges and opportunities[J]. Journal of Network and Computer Applications, 2015, (52): 1-10.
  • 6FOTIOU N, POLYZOS G C. ICN privacy and name based security[A]. Proceedings of the 1st International Conference on Informa- tion-Centric Networking[C]. ACM, 2014.5-6.
  • 7LAUINGER T. Security & Scalability of Content-Centric Network- ing[D]. TU Darmstadt, 2010.
  • 8ACS G, CONTI M, GASTI P, et al. Cache privacy in named-data networking[A]. Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference[C]. IEEE, 2013.41-51.
  • 9CHAABANE A, DE CRISTOFARO E, KAAFAR M A, et al. Privacy in content-oriented networking: threats and countermeasures[J]. ACM SIGCOMM Computer Communication Review, 2013, 43(3): 25-33.
  • 10MOHAISEN A, ZHANG X, SCHUCHARD M, et al. Protecting ac- cess privacy of cached contents in information centric networks[A]. Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications security[C]. ACM, 2013.173-178.

二级参考文献27

  • 1Jokela P, Zahemszky A, Rothenberg C E, et al. LIPSIN: line speed publish/subscribe inter-networking. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'09), Aug 17-21, 2009, Barcelona, Spain. New York, NY, USA: ACM, 2009: 195-206.
  • 2Ahlgren B, D'Ambrosio M, Dannewitz C, et al. D-6.2 second NetInf architecture description. The FP7 4WARD Project. 2010.
  • 3Ahlgren B, D'Ambrosio M, Marchisio M, et al. Design considerations for a network of information. Proceedings of the 4th ACM International Conference on Emerging Networking Experiments and Technologies (CoNext'08), Dec 9- 12,2008, Madrid, Spain. New York, NY, USA: ACM, 2008.
  • 4Jacobson V, Smelters D K, Thornton J D, et al. Networking named content. Proceedings of the 5th ACM International Conference on Emerging Networking Experiments and Technologies (CoNEXT'09), Dec 1-4,2009, Rome, Italy. New York, NY, USA: ACM, 2009.
  • 5Koponen T, Chawla M, Chun B G, et al. A data-oriented (and beyond) network architecture. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'07), Aug 27-31, 2007, Kyoto, Japan. New York, NY, USA: ACM, 2007: 181-192.
  • 6Ahlgren B, Dannewitz C, Imbrenda C, et al. A survey of information-centric networking (draft). Ahlgren B, Karl H, Kutscher D, et al. Information?centric Networking. Dagstuhl, German: Schloss Dagstuhl, 2011.
  • 7Jelenkovic P R. Asymptotic approximation of the move-to-front search cost distribution and least recently-used caching fault probabilities. The Annals of Applied Probability, 1999, 9(2): 430-464.
  • 8Jelenkovic P R, Kang X. Characterizing the miss sequence of the LRU cache. ACM SIGMETRlCS, 2008, 36(2): 119-121.
  • 9Tofis Y, Psaras I, Pavlou G. Modeling queuing delays in content-centric networks. London, UK: Univerity College London, 2011.
  • 10Carofiglio G, Gallo M, Muscariello L, et al. Modeling data transfer in content-centric networking (extended version). Technical Report. http://perso.rd.francetelecom.fr/muscariello/report\\-itc- transport.pdf.

共引文献16

同被引文献15

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部