浏览全部资源
扫码关注微信
1. 南京邮电大学 通信与信息工程学院,江苏 南京 210046
2. 江苏大学 计算机科学与通信工程学院,江苏 镇江 212013
3. 南京邮电大学 宽带无线通信与传感网技术教育部重点实验室,江苏 南京 210046
[ "朱轶(1977-),男,江苏镇江人,南京邮电大学博士生,江苏大学副教授,主要研究方向为下一代互联网架构、异构网络融合、绿色通信与网络仿真等。" ]
[ "糜正琨(1946-),男,浙江上虞人,南京邮电大学教授、博士生导师,主要研究方向为未来网络理论与技术、自组网络(SON)技术、异构网络集成及业务融合。" ]
[ "王文鼐(1966-),男,江苏南京人,博士,南京邮电大学教授,主要研究方向为未来互联网体系结构、云计算与网络虚拟化、绿色通信网和网络仿真等。" ]
网络出版日期:2015-12,
纸质出版日期:2015-12-25
移动端阅览
朱轶, 糜正琨, 王文鼐. 内容中心网络缓存隐私保护策略[J]. 通信学报, 2015,36(12):139-150.
Yi ZHU, Zheng-kun MI, Wen-nai WANG. Cache privacy protection strategy in content centric networking[J]. Journal on communications, 2015, 36(12): 139-150.
朱轶, 糜正琨, 王文鼐. 内容中心网络缓存隐私保护策略[J]. 通信学报, 2015,36(12):139-150. DOI: 10.11959/j.issn.1000-436x.2015323.
Yi ZHU, Zheng-kun MI, Wen-nai WANG. Cache privacy protection strategy in content centric networking[J]. Journal on communications, 2015, 36(12): 139-150. DOI: 10.11959/j.issn.1000-436x.2015323.
缓存隐私泄露是内容中心网络中的重要安全威胁之一,攻击者通过探测缓存可以获取合法用户的隐私信息。针对该安全问题,在隐私与非隐私内容区分的基础上,提出一种基于最近访问信息与回退机制的缓存隐私保护策略(CPPS-RVI&ECP),并与现有典型防御策略-随机k延迟(RFKD)对比,围绕隐私泄露率与网络命中率开展理论性能分析。该策略通过设置隐私标识,实现最近访问者的识别;通过随机缓存位置存入以及移出回退机制,降低了隐私泄露概率,且提升了网络性能。设定实验条件进行数值分析,结果表明,虽然RFKD有理想的隐私保护能力,但是它是以完全牺牲缓存的内容分发能力为代价的,而 CPPS-RVI&ECP 则通过合理设置回退概率,可以在保持较低隐私泄露率的同时,获得较高的网络命中率。
Cache privacy leak was one of the important security threats of CCN
the adversary could obtain the legitimate user’s privacy information through probing cache visiting time.Aiming at this security problem
the privacy and non-privacy contents were dealt separately
then a cache privacy protection strategy based on recent visiting information and evicted copy up (CPPS-RVI&ECP) was proposed.In order to compare with the current typical defense strategy-random first k delay (RFKD)
the theoretical analysis of privacy leak probability and network hit probability are further given.The CPPS-RVI&ECP identifies the recent visitor by setting privacy mark in interest packet
decreases the privacy leak probability by selecting replacing position randomly
and promotes the network performance by the mechanism of shifting evicted copy upstream.The numeric analysis results under the prescribed experimental conditions show that
whereas the ideal privacy protection ability of RFKD is obtained at the expense of sacrifice of cache contents delivery capability
the proposed CPPS-RVI&ECP can obtain low privacy leak probability and in the meantime maintain high network hit probability by setting reasonable upstream shifting probability.
KOPONEN T , CHAWLA M , GON C B , et al . A data-oriented (and beyond) network architecture [A ] . Proceedings of the ACM SIGCOMM 2007 Conference [C ] . Kyoto,Japan , 2007 . 181 - 192 .
European Union . Project FP7 4WARD [EB/OL ] . http://www.4wardproject.eu http://www.4wardproject.eu , 2010 .
European Union . Project PSIRP [EB/OL ] . http://www.psirp.org http://www.psirp.org , 2010 .
JACOBSON V , SMETTERS D K , THORNTON J D , et al . Networking named content [A ] . Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies [C ] . Rome,Italy , 2009 . 1 - 12 .
VASILAKOS A V , LI Z , SIMON G , et al . Information centric network:research challenges and opportunities [J ] . Journal of Network and Computer Applications , 2015 ,( 52 ): 1 - 10 .
FOTIOU N , POLYZOS G C . ICN privacy and name based security [A ] . Proceedings of the 1st International Conference on Information-Centric Networking [C ] . ACM , 2014 . 5 - 6 .
LAUINGER T . Security & Scalability of Content-Centric Networking [D ] . TU Darmstadt , 2010 .
ACS G , CONTI M , GASTI P , et al . Cache privacy in named-data networking [A ] . Distributed Computing Systems (ICDCS),2013 IEEE 33rd International Conference [C ] . IEEE , 2013 . 41 - 51 .
CHAABANE A , DE CRISTOFARO E , KAAFAR M A , et al . Privacy in content-oriented networking:threats and countermeasures [J ] . ACM SIGCOMM Computer Communication Review , 2013 , 43 ( 3 ): 25 - 33 .
MOHAISEN A , ZHANG X , SCHUCHARD M , et al . Protecting access privacy of cached contents in information centric networks [A ] . Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications security [C ] . ACM , 2013 . 173 - 178 .
MOHAISEN A , MEKKY H , ZHANG X , et al . Timing attacks on access privacy in information centric networks and countermeasures [J ] . IEEE Transactions on Dependable and Secure Computing , 2015 ( online first ).
LAUINGER T , LAOUTARIS N , RODRIGUEZ P , et al . Privacy risks in named data networking:what is the cost of performance [J ] . ACM SIGCOMM Computer Communication Review , 2012 , 42 ( 5 ): 54 - 57 .
ARIANFAR S , KOPONEN T , RAGHAVAN B , et al . On preserving privacy in content-oriented networks [A ] . Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking [C ] . ACM , 2011 . 19 - 24 .
LAUINGER T , LAOUTARIS N , RODRIGUEZ P , et al . Privacy implications of ubiquitous caching in named data networking architectures [R ] . Technical Report TR-iSecLab-0812-001,iSecLab , 2012 .
葛国栋 , 郭云飞 , 刘彩霞 , 等 . 内容中心网络中面向隐私保护的协作缓存策略 [J ] . 电子与信息学报 , 2015 , 37 ( 5 ): 1220 - 1226 .
GE G D , GUO Y F , LIU C X , et al . A collaborative caching strategy for privacy protection in content centric networking [J ] . Journal of Electronics & In for motion Technology , 2015 , 37 ( 5 ): 1220 - 1226 .
LAOUTARIS N , CHE H , STAVRAKAKIS I . The LCD interconnection of LRU caches and its analysis [J ] . Performance Evaluation , 2006 , 63 ( 7 ): 609 - 634 .
CAROFIGLIO G , GALLO M , MUSCARIELLO L , et al . Lookout, “what is a mobile threat” [EB/OL ] . https://www.lookout.com/resources/know-your-mobile/what-is-a-mobilethreat https://www.lookout.com/resources/know-your-mobile/what-is-a-mobilethreat , 2011 .
CAROFIGLIO G , GALLO M , MUSCARIELLO L . On the performance of bandwidth and storage sharing in information-centric networks [J ] . Computer Networks:The International Journal of Computer and Telecommunications Networking , 2013 , 57 ( 17 ): 3743 - 3758 .
WANG G , HUANG T , JIANG L I U , et al . Modeling in-network caching and bandwidth sharing performance in information-centric networking [J ] . The Journal of China Universities of Posts and Telecommunications , 2013 , 20 ( 2 ): 99 - 105 .
WANG K , CHEN J , ZHOU H , et al . Modeling denial-of-service against pending interest table in named data networking [J ] . International Journal of Communication Systems , 2014 , 27 ( 12 ): 4355 - 4368 .
MANGILI M , MARTIGNON F , PARABOSCHI S . A cache-aware mechanism to enforce confidentiality,trackability and access policy evolution in content-centric networks [J ] . Computer Networks , 2015 ,( 76 ): 126 - 145 .
FRICKER C , ROBERT P , ROBERTS J , et al . Impact of traffic mix on caching performance in a content-centric network [A ] . Computer Communications Workshops (INFOCOM WKSHPS),2012 IEEE Conference [C ] . IEEE , 2012 . 310 - 315 .
0
浏览量
860
下载量
2
CSCD
关联资源
相关文章
相关作者
相关机构