Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/ICDCS.2013.12guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Cache Privacy in Named-Data Networking

Published: 08 July 2013 Publication History

Abstract

Content-Centric Networking (CCN) is an alternative to host-centric networking exemplified by today's Internet. CCN emphasizes content distribution by making content directly addressable. Named-Data Networking (NDN) is an example of CCN being considered as a candidate next-generation Internet architecture. One key NDN feature is router-side content caching that optimizes bandwidth consumption, reduces congestion and provides fast fetching for popular content. Unfortunately, the same feature is also detrimental to privacy of both consumers and producers of content. As we show in this paper, simple and difficult-to-detect timing attacks can exploit NDN routers as "oracles" and allow the adversary to learn whether a nearby consumer recently requested certain content. Similarly, probing attacks that target adjacent content producers can be used to discover whether certain content has been recently fetched. After analyzing the scope and feasibility of such attacks, we propose and evaluate some efficient countermeasures that offer quantifiable privacy guarantees while retaining key features of NDN.

Cited By

View all
  • (2024)Anonymous Federated Learning via Named-Data NetworkingFuture Generation Computer Systems10.1016/j.future.2023.11.009152:C(288-303)Online publication date: 4-Mar-2024
  • (2023)Securing Scalable Real-time Multiparty Communications with Hybrid Information-centric NetworkingACM Transactions on Internet Technology10.1145/359358523:2(1-20)Online publication date: 19-May-2023
  • (2019)Naming Content on the Network LayerACM Computing Surveys10.1145/331188852:3(1-28)Online publication date: 18-Jun-2019
  • Show More Cited By

Index Terms

  1. Cache Privacy in Named-Data Networking

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ICDCS '13: Proceedings of the 2013 IEEE 33rd International Conference on Distributed Computing Systems
    July 2013
    623 pages
    ISBN:9780769550008

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 08 July 2013

    Author Tags

    1. cache privacy
    2. content-centric networking
    3. named-data networking
    4. timing attacks

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Anonymous Federated Learning via Named-Data NetworkingFuture Generation Computer Systems10.1016/j.future.2023.11.009152:C(288-303)Online publication date: 4-Mar-2024
    • (2023)Securing Scalable Real-time Multiparty Communications with Hybrid Information-centric NetworkingACM Transactions on Internet Technology10.1145/359358523:2(1-20)Online publication date: 19-May-2023
    • (2019)Naming Content on the Network LayerACM Computing Surveys10.1145/331188852:3(1-28)Online publication date: 18-Jun-2019
    • (2019)In Content We TrustIEEE/ACM Transactions on Networking10.1109/TNET.2019.292632027:5(1787-1800)Online publication date: 1-Oct-2019
    • (2018)Betweenness centrality and cache privacy in information-centric networksProceedings of the 5th ACM Conference on Information-Centric Networking10.1145/3267955.3267964(106-116)Online publication date: 21-Sep-2018
    • (2018)Securing Named Data NetworksProceedings of the 23nd ACM on Symposium on Access Control Models and Technologies10.1145/3205977.3205996(51-59)Online publication date: 7-Jun-2018
    • (2017)Preventing "bad" content dispersal in named data networkingProceedings of the ACM Turing 50th Celebration Conference - China10.1145/3063955.3063993(1-8)Online publication date: 12-May-2017
    • (2017)Side Channels in DeduplicationProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security10.1145/3052973.3053019(266-274)Online publication date: 2-Apr-2017
    • (2017)Capability-Based Security Enforcement in Named Data NetworkingIEEE/ACM Transactions on Networking10.1109/TNET.2017.271582225:5(2719-2730)Online publication date: 1-Oct-2017
    • (2016)(The Futility of) Data Privacy in Content-Centric NetworkingProceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society10.1145/2994620.2994639(143-152)Online publication date: 24-Oct-2016
    • Show More Cited By

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media