Multi-CDN: Towards Privacy in Content Delivery Networks

被引:16
作者
Cui, Shujie [1 ]
Asghar, Muhammad Rizwan [1 ]
Russello, Giovanni [1 ]
机构
[1] Univ Auckland, Cyber Secur Foundry, Auckland 1010, New Zealand
关键词
Peer-to-peer computing; Cryptography; Routing; Privacy; Content distribution networks; Computer crime; Servers; CDN; multi-CDN; confidentiality; security; privacy; searchable encryption; access pattern; request pattern;
D O I
10.1109/TDSC.2018.2833110
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A Content Delivery Network (CDN) is a distributed system composed of a large number of nodes that allows users to request objects from nearby nodes. CDN not only reduces end-to-end latency on the user side but also offloads Content Providers (CPs), providing resilience against Distributed Denial of Service (DDoS) attacks. However, by caching objects and processing user requests, CDN providers could infer user preferences and the popularity of objects, thus resulting in information leakage. Unfortunately, such information leakage may result in loss of user privacy and reveal business-specific information to untrusted or compromised CDN providers. State-of-the-art solutions can protect the content of sensitive objects but cannot prevent CDN providers from inferring user preferences and the popularity of objects. In this work, we present a privacy-preserving encrypted CDN system to hide not only the content of objects and user requests, but also protect user preferences and the popularity of objects from curious CDN providers. We employ encryption to protect the objects and user requests in a way that both the CDNs and CPs can perform the search operations without accessing objects and requests in cleartext. Our proposed system is based on a scalable key management approach for multi-user access, where no key regeneration and data re-encryption are needed for user revocation. We have implemented a prototype of the system and show its practical efficiency.
引用
收藏
页码:984 / 999
页数:16
相关论文
共 33 条
[1]   Cache Privacy in Named-Data Networking [J].
Acs, Gergely ;
Conti, Mauro ;
Gasti, Paolo ;
Ghali, Cesar ;
Tsudik, Gene .
2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, :41-51
[2]  
[Anonymous], 2017, 2017 IEEE 26 INT C, DOI DOI 10.1109/WETICE.2017.32
[3]  
[Anonymous], 2007, APPL COMP 2007 VOL
[4]  
[Anonymous], 2017, C LOCAL COMPUT NETW, DOI DOI 10.1109/LCN.2017.27
[5]  
[Anonymous], 2006, IEEE DISTRIBUTED SYS
[6]  
Baugher M, 2012, IEEE CONF COMPUT, P274, DOI 10.1109/INFCOMW.2012.6193505
[7]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[8]  
Cai X., 2012, P ACM C COMP COMM SE, P605
[9]   Leakage-Abuse Attacks Against Searchable Encryption [J].
Cash, David ;
Grubbs, Paul ;
Perry, Jason ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :668-679
[10]   P-McDb: Privacy-preserving Search using Multi-cloud Encrypted Databases [J].
Cui, Shujie ;
Asghar, Muhammad Rizwan ;
Galbraith, Steven D. ;
Russello, Giovanni .
2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, :334-341