A Privacy-Preserving Scheme Based on Fragments Storage and Fragments Recombination in CCN

被引:1
作者
Li, Ting [1 ,2 ]
Liang, Jie [1 ,2 ]
Geng, Liru [1 ]
Liu, Yinlong [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
来源
2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC) | 2019年
关键词
CCN; Privacy Protection; Timing Attack; Round-trip Delays; Fragments; NETWORKS; ATTACKS;
D O I
10.1109/iscc47284.2019.8969757
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Content-Centric Networking (CCN) is one of the most important next-generation Internet architectures. The in network caching mechanism in CCN can bring higher efficiency and lower traffic to the network in terms of content distribution, but it also poses a great privacy risks. In this paper, we propose a privacy-preserving scheme based on fragments storage and fragments recombination (FS&FR) to solve the user's privacy leakage problem caused by timing attack in CCN. Firstly, the content in the network can be divided into different privacy levels according to the content provider, content consumer and router. Secondly, the optimal number of content fragments can be obtained by binary linear regression model based on content popularity, node betweenness and content privacy levels. Finally, the FS&FR algorithm is proposed and applied to the private content for content distribution and achieving fine-grained privacy protection. The simulation results show that the proposed scheme is secure yet highly efficient again timing attack compared to random-K delay algorithm. More specifically, the FS&FR algorithm can make the round-trip delays obtained by the attacker requesting the same content change, and then protect users' behavior privacy without sacrificing distribution performance.
引用
收藏
页码:794 / 799
页数:6
相关论文
共 16 条
  • [1] A Survey of Security Attacks in Information-Centric Networking
    AbdAllah, Eslam G.
    Hassanein, Hossam S.
    Zulkernine, Mohammad
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) : 1441 - 1454
  • [2] Cache Privacy in Named-Data Networking
    Acs, Gergely
    Conti, Mauro
    Gasti, Paolo
    Ghali, Cesar
    Tsudik, Gene
    [J]. 2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, : 41 - 51
  • [3] Arshad S., IEEE INTERNET THINGS
  • [4] Chaabane A, 2013, ACM SIGCOMM COMP COM, V43, P26
  • [5] Cui YF, 2016, INT SYM WIRELESS COM, P286, DOI 10.1109/ISWCS.2016.7600916
  • [6] Dogruluk E, 2016, 2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P1251, DOI 10.1109/ISCC.2016.7543908
  • [7] Gao M., 2015, MATH PROBL ENG, V2015, P1
  • [8] Content-Centric Networking Management Based on Software Defined Networks: Survey
    Jmal, Rihab
    Fourati, Lamia Chaari
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2017, 14 (04): : 1128 - 1142
  • [9] A PDX1-ATF transcriptional complex governs β cell survival during stress
    Juliana, Christine A.
    Yang, Juxiang
    Cannon, Corey E.
    Good, Austin L.
    Haemmerle, Matthew W.
    Stoffers, Doris A.
    [J]. MOLECULAR METABOLISM, 2018, 17 : 39 - 48
  • [10] Lee JW, 2017, ASIA-PAC NETW OPER M, P303, DOI 10.1109/APNOMS.2017.8094134