2013 IEEE 33rd International Conference on Distributed Computing Systems 2013
DOI: 10.1109/icdcs.2013.12
|View full text |Cite
|
Sign up to set email alerts
|

Cache Privacy in Named-Data Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
94
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 82 publications
(96 citation statements)
references
References 14 publications
2
94
0
Order By: Relevance
“…When an NDN router receives an interest, it first looks up its PIT to determine whether another interest for the same name is currently outstanding. There are three possible outcomes: (1) If the same name is already in the router's PIT and the arrival interface of the present interest is already in the set of arrival-interfaces of the corresponding PIT entry, the interest is discarded. (2) If a PIT entry for the same name exists, yet the arrival interface is new, the router updates the PIT entry by adding a new interface to the set.…”
Section: Ndn Overviewmentioning
confidence: 99%
“…When an NDN router receives an interest, it first looks up its PIT to determine whether another interest for the same name is currently outstanding. There are three possible outcomes: (1) If the same name is already in the router's PIT and the arrival interface of the present interest is already in the set of arrival-interfaces of the corresponding PIT entry, the interest is discarded. (2) If a PIT entry for the same name exists, yet the arrival interface is new, the router updates the PIT entry by adding a new interface to the set.…”
Section: Ndn Overviewmentioning
confidence: 99%
“…Cache privacy is also in [7]. The authors analyze timing and probing attacks and then they propose some countermeasures.…”
Section: Related Workmentioning
confidence: 99%
“…This is because research only concentrate on improving the efficiency of such systems and neglect to incorporate the legal requirements. Researchers have attempted to improve privacy [1], [21] and security [36], [20], [18] issues of CCNs. However, the past research fails to adapt the technology to safeguard the rights of the content publisher in terms of copyright, leakage of sensitive private information, and proper monetary and non-monetary incentives.…”
Section: Related Workmentioning
confidence: 99%
“…Private sensitive state can be associated to content with respect to the circumstances it is requested in [11], [20]. Not only this, but access to router caches allows end-users (who have access to the same router cache) to obtain information about their nearby users' content access patterns [1].…”
Section: B Privacy Protectionmentioning
confidence: 99%