2014
DOI: 10.1007/978-3-319-06749-0_8
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Privacy Analysis of ICN Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Similarly, gathering enough content delivered to a user can be used to profile and uniquely identify her. Malicious ICN nodes could also prevent the delivery of contents related to given topics in order to censor a certain type of information [21].…”
Section: Privacy Issues In Icnmentioning
confidence: 99%
“…Similarly, gathering enough content delivered to a user can be used to profile and uniquely identify her. Malicious ICN nodes could also prevent the delivery of contents related to given topics in order to censor a certain type of information [21].…”
Section: Privacy Issues In Icnmentioning
confidence: 99%
“…To reduce privacy overhead, privacy-enhancement middleware, such as anonymous and mixing proxies, will be considered, rather than end-to-end encryption schemes. Finally, a framework for the privacy analysis of ICN architectures is being developed [16] to provide a structured analysis of the issue.…”
Section: E Privacy Support In Icnmentioning
confidence: 99%
“…Fotiou et al [18] propose the use of ICN architectures as input for a privacy analysis. An ICN network consists of data owners (which are in control of the data, and hence map to 'controller'), consumers (which correspond with 'recipients'), storage nodes (which correspond with 'data sources'), resolvers (which correspond with 'processes'), and two information containers: data flows and data pools.…”
Section: Architectural Approachesmentioning
confidence: 99%