10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness 2014
DOI: 10.1109/qshine.2014.6928679
|View full text |Cite
|
Sign up to set email alerts
|

On information exposure through named content

Abstract: Abstract-The proposed shift from host-centric to information-centric networking (ICN) has triggered extensive research in the area of content naming. Efforts have so far focused on the scalability and security properties that can make content objects routable and self-certifying. In this paper, we argue that the information that is exposed through explicitly naming content objects has been overlooked, although several operational and performance issues depend on the information that a name holds. We therefore … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 29 publications
(53 reference statements)
0
4
0
Order By: Relevance
“…1) Name Obfuscation: The proposed name obfuscation use machine-readable naming schemes, which are generated by content digest, Bloom filter, and the use of ephemeral [105] Employing Ephemeral Names Increased Publisher Privacy Undermine Caching Overlay Network Martinez et al [106], [107] Digital Identity in an Overlay Network Privacy for Real Identities Additional Infrastructure Sollins [108] Overlay Network with Identifier Resolution Service Privacy for Real Identities Lack of Compatibility Analysis names. Cryptographic hash based naming was motivated by Baugher et al [104].…”
Section: Name and Signature Privacymentioning
confidence: 99%
See 2 more Smart Citations
“…1) Name Obfuscation: The proposed name obfuscation use machine-readable naming schemes, which are generated by content digest, Bloom filter, and the use of ephemeral [105] Employing Ephemeral Names Increased Publisher Privacy Undermine Caching Overlay Network Martinez et al [106], [107] Digital Identity in an Overlay Network Privacy for Real Identities Additional Infrastructure Sollins [108] Overlay Network with Identifier Resolution Service Privacy for Real Identities Lack of Compatibility Analysis names. Cryptographic hash based naming was motivated by Baugher et al [104].…”
Section: Name and Signature Privacymentioning
confidence: 99%
“…Name Obfuscation [6], [104], [105] Overlay Network [106]- [108] Fig. 15: Naming and signature privacy sub-classes and the stateof-the-art in censorship.…”
Section: Name and Signature Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…This problem has received scant attention in our research community. Katsaros et al [7] explored information exposure of named content and proposed using ephemeral content names to necessitate a client-provider interaction. Employing this method, content providers are able to record the statistical information they require from clients, even if the content is cached under a stale name.…”
Section: Introductionmentioning
confidence: 99%