Evaluating Privacy Attacks in Named Data Network

被引:0
作者
Dogruluk, Ertugrul [1 ]
Costa, Antonio [1 ]
Macedo, Joaquim [1 ]
机构
[1] Univ Minho, Ctr Algoritmi, Braga, Portugal
来源
2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC) | 2016年
关键词
Named Data Networking; Privacy; Cache Attacks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The main usage pattern of the Internet is changing from end-to-end communication to content distribution and access. To support this change, the actual Internet has several add-on as Content Delivery Networks (CDNs) and Web caches. To have a native support architecture for content distribution, clean state information-centric networking is being proposed for Future Internet. The Named Data Network (NDN) is one of the most promising information-centric networking architecture. The in-network storage (aka caches) capability of ICNs and content name visibility bring more efficiency and lower traffic to the network for content distribution. However, the human-readable naming and in-network storage of data increase the opportunity and possible victims of cache privacy attacks. The most used attack type is called timing attack. Based on the hypothesis that almost all timing attacks are detectable, this work proposes a mechanism for turning on a random cache delay model only when a cache privacy attack is detected. Otherwise, there is not any additional delay. The rationale of this approach is to establish a tradeoff between the network efficiency and cache privacy guarantee. In comparison with other works proposed in the literature, the network efficiency is less affected.
引用
收藏
页码:1251 / 1256
页数:6
相关论文
共 15 条
[1]  
Abdallah Eslam H., 2015, IEEE COMMUNICATIONS, P1, DOI DOI 10.1109/COMST.2015.2406352
[2]   Cache Privacy in Named-Data Networking [J].
Acs, Gergely ;
Conti, Mauro ;
Gasti, Paolo ;
Ghali, Cesar ;
Tsudik, Gene .
2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, :41-51
[3]  
[Anonymous], 2000, P 7 ACM C COMPUTER C
[4]  
[Anonymous], 2015, CISCO VISUAL NETWORK, P1
[5]  
Bortz Andrew., 2007, INT C WORLD WIDE WEB, P621, DOI [10 .1145/1242572.1242656, DOI 10.1145/1242572.1242656]
[6]  
Burke J, 2010, TRANSPORTATION RES R, V1892, P1
[7]  
Chaabane A, 2013, ACM SIGCOMM COMP COM, V43, P26
[8]   Network-Layer Trust in Named-Data Networking [J].
Ghali, Cesar ;
Tsudik, Gene ;
Uzun, Ersin .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (05) :13-19
[9]  
Ghali Cesar., 2014, NEEDLE HAYSTACK MITI
[10]  
Hansman S., 2003, ENGINEERING, P1