Betweenness Centrality and Cache Privacy in Information-centric Networks

被引:3
作者
Abani, Noor [1 ]
Braun, Torsten [2 ]
Gerla, Mario [1 ]
机构
[1] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
[2] Univ Bern, Bern, Switzerland
来源
PROCEEDINGS OF THE 5TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN'18) | 2018年
关键词
ICN; NDN; information-centric networking; named-data networking; caching; cache privacy; timing attacks; betweenness centrality; anonymity; anonymity set;
D O I
10.1145/3267955.3267964
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In-network caching is a feature shared by all proposed Information Centric Networking (ICN) architectures as it is critical to achieving a more efficient retrieval of content. However, the default "cache everything everywhere" universal caching scheme has caused the emergence of several privacy threats. Timing attacks are one such privacy breach where attackers can probe caches and use timing analysis of data retrievals to identify if content was retrieved from the data source or from the cache, the latter case inferring that this content was requested recently. We have previously proposed a betweenness centrality based caching strategy to mitigate such attacks by increasing user anonymity. We demonstrated its efficacy in a transit-stub topology. In this paper, we further investigate the effect of betweenness centrality based caching on cache privacy and user anonymity in more general synthetic and real world Internet topologies. It was also shown that an attacker with access to multiple compromised routers can locate and track a mobile user by carrying out multiple timing analysis attacks from various parts of the network. We extend our privacy evaluation to a scenario with mobile users and show that a betweenness centrality based caching policy provides a mobile user with path privacy by increasing an attacker's difficulty in locating a moving user or identifying his/her route.
引用
收藏
页码:106 / 116
页数:11
相关论文
共 23 条
[1]  
Abani N, 2016, IEEE MILIT COMMUN C, P1249, DOI 10.1109/MILCOM.2016.7795502
[2]   A Survey of Security Attacks in Information-Centric Networking [J].
AbdAllah, Eslam G. ;
Hassanein, Hossam S. ;
Zulkernine, Mohammad .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) :1441-1454
[3]   Cache Privacy in Named-Data Networking [J].
Acs, Gergely ;
Conti, Mauro ;
Gasti, Paolo ;
Ghali, Cesar ;
Tsudik, Gene .
2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, :41-51
[4]  
Afanasyev A., 2012, NDNSIM NDN SIMULATOR
[5]  
[Anonymous], 2016, ARXIV160303409
[6]  
[Anonymous], 2015, Technical Report NDN-0028
[7]   Emergence of scaling in random networks [J].
Barabási, AL ;
Albert, R .
SCIENCE, 1999, 286 (5439) :509-512
[8]   A faster algorithm for betweenness centrality [J].
Brandes, U .
JOURNAL OF MATHEMATICAL SOCIOLOGY, 2001, 25 (02) :163-177
[9]  
Chaabane A, 2013, ACM SIGCOMM COMP COM, V43, P26
[10]  
Compagno Alberto, 2015, Applied Cryptography and Network Security. 13th International Conference, ACNS 2015. RevisedSelected Papers: LNCS 9092, P243, DOI 10.1007/978-3-319-28166-7_12