Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2382196.2382305acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Protecting access privacy of cached contents in information centric networks

Published: 16 October 2012 Publication History

Abstract

In information centric network (ICN), contents are fetched by their names from caches deployed in the network or from origin servers. Once the contents are fetched from the origin server, it is replicated and cached in all routers along the routing and forwarding paths from the user that issues the interest to the origin server, thus allowing further "interests" by other users to be fulfilled quickly. However, the way ICN caching and interest fulfillment work pose a great privacy risk; the time difference between response for interest of cached and uncached contents can be used as an indicator to infer whether or not a near-by user previously requested the same contents requested by the adversary. This work introduces the extent to which the problem is applicable in ICN and provides several solutions to address it.

References

[1]
V.Jacobson, D.K.Smetters, J.D.Thornton, M.F.Plass, N.H.Briggs, and R. Braynard. Networking named content. In J. Liebeherr, G. Ventre, E. W. Biersack, and S. Keshav, editors, CoNEXT, pages 1--12. ACM, 2009.
[2]
A.Mohaisen, X.Zhang, M.Schuchard, H.Xie, and Y.Kim.Protecting access privacy of cached contents in information centric networks. TR, UMN, 2012.
[3]
T.Ristenpart, E.Tromer, H.Shacham, and S.Savage. Hey,you,get off of my cloud: exploring information leakage in third-party compute clouds. In ACM Conference on Computer and Communications Security, pages 199--212, 2009.
[4]
E.W.Felten and M.A.Schneider Timing Attacks on Web Privacy. In ACM Conference on Computer and Communications Security. 2000.

Cited By

View all
  • (2024)Advancing NDN security: Efficient identification of cache pollution attacks through rank comparisonInternet of Things10.1016/j.iot.2024.101142(101142)Online publication date: Feb-2024
  • (2019)Naming Content on the Network LayerACM Computing Surveys10.1145/331188852:3(1-28)Online publication date: 18-Jun-2019
  • (2017)A Sensitive Information Protection Scheme in Named Data Networking Using Attribute-Based Ring-Signcryption2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)10.1109/DSC.2017.67(187-194)Online publication date: Jun-2017
  • Show More Cited By

Index Terms

  1. Protecting access privacy of cached contents in information centric networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
    October 2012
    1088 pages
    ISBN:9781450316514
    DOI:10.1145/2382196

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 October 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. caching
    2. information centric networks
    3. privacy

    Qualifiers

    • Poster

    Conference

    CCS'12
    Sponsor:
    CCS'12: the ACM Conference on Computer and Communications Security
    October 16 - 18, 2012
    North Carolina, Raleigh, USA

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Advancing NDN security: Efficient identification of cache pollution attacks through rank comparisonInternet of Things10.1016/j.iot.2024.101142(101142)Online publication date: Feb-2024
    • (2019)Naming Content on the Network LayerACM Computing Surveys10.1145/331188852:3(1-28)Online publication date: 18-Jun-2019
    • (2017)A Sensitive Information Protection Scheme in Named Data Networking Using Attribute-Based Ring-Signcryption2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)10.1109/DSC.2017.67(187-194)Online publication date: Jun-2017
    • (2016)Hey, I know you are moving: producer movement status privacy in information-centric networking2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)10.1109/CCNC.2016.7444940(1080-1085)Online publication date: Jan-2016
    • (2015)Exploiting information centric networking to build an attacker-controlled content delivery network2015 14th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)10.1109/MedHocNet.2015.7173159(1-6)Online publication date: Jun-2015
    • (2014)Digital forgetting in information-centric networksThe New Review of Hypermedia and Multimedia10.1080/13614568.2013.87708820:2(169-187)Online publication date: 1-Apr-2014

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media