2013
DOI: 10.1145/2500098.2500102
|View full text |Cite
|
Sign up to set email alerts
|

Privacy in content-oriented networking

Abstract: As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modern systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
93
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 108 publications
(93 citation statements)
references
References 51 publications
0
93
0
Order By: Relevance
“…Token can be viewed as a kind of encrypted interest; it can only be generated from the authorized consumers and the functionality of the token kept secret even during the name and interest match procedure. We believe AIE is a positive answer to the open question raised in [1,4]. AIE is proved to be secure based on the DBDH/CDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of 2 Security and Communication Networks only three elements.…”
Section: Introductionmentioning
confidence: 87%
See 1 more Smart Citation
“…Token can be viewed as a kind of encrypted interest; it can only be generated from the authorized consumers and the functionality of the token kept secret even during the name and interest match procedure. We believe AIE is a positive answer to the open question raised in [1,4]. AIE is proved to be secure based on the DBDH/CDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of 2 Security and Communication Networks only three elements.…”
Section: Introductionmentioning
confidence: 87%
“…However, support for name privacy is not a standard feature. Names reveal significantly more information about content than IP addresses [1].…”
Section: Introductionmentioning
confidence: 99%
“…The privacy risks of Named Data Networking are also highlighted in [Lauinger12]. Further work on privacy in ICNs can be found in [Chaabane13]. Finally, Fotiou et al define an ICN privacy evaluation framework in [Fotiou14].…”
Section: Privacymentioning
confidence: 99%
“…There is limited consideration of the threat models and potential mitigation in the various documents describing the architectures. [Lauinger10] and [Chaabane13] also consider the changed threat model. Some of the key aspects are:…”
Section: Changes To the Network Security Threat Modelmentioning
confidence: 99%
“…One of the hotspot is the security mechanism, CCN data packets carrying the contents of the publisher's signature, may expose the identity of the publisher's privacy information [3]. Because the interest package and the data itself are closely related, the attacker may obtain the interest package from the publisher to request the corresponding content, which can result in the disclosure of user privacy.…”
Section: Introductionmentioning
confidence: 99%