? 采用多路随机缓存技术保护ICN网络用户隐私
Journal of Computer Science and Technology
Quick Search in JCST
 Advanced Search 
      Home | PrePrint | SiteMap | Contact Us | Help
 
Indexed by   SCIE, EI ...
Bimonthly    Since 1986
Journal of Computer Science and Technology 2017, Vol. 32 Issue (3) :585-598    DOI: 10.1007/s11390-017-1730-2
Computer Network and Information Security << Previous Articles | Next Articles >>
采用多路随机缓存技术保护ICN网络用户隐私
Wei-Bo Chu1, Li-Fang Wang1, Ze-Jun Jiang1, Alan Chin-Chen Chang2, Fellow, IEEE
1. School of Computer Science and Technology, Northwestern Polytechnical University, Xi'an 710072, China;
2. Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan 40724, China
Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches
Wei-Bo Chu1, Li-Fang Wang1, Ze-Jun Jiang1, Alan Chin-Chen Chang2, Fellow, IEEE
1. School of Computer Science and Technology, Northwestern Polytechnical University, Xi'an 710072, China;
2. Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan 40724, China

摘要
参考文献
相关文章
Download: [PDF 600KB]  
摘要 网络节点缓存是内容中心网络提供高效内容传输的关键机制。然而,由于缓存探测攻击,这项技术同时也对用户隐私带来了巨大的风险。采用随机请求应答的随机缓存技术是应对这类攻击的有效方法。本文分析了多路径内容中心网络中随机缓存技术在保护用户隐私方面的有效性。提出了用于刻画多路径网络用户隐私的模型,同时分析了攻击者可能采用的前缀攻击和后缀攻击。在具体分析中,分别考虑了参数相同和相异的缓存算法。本文结果表明,在多路径内容中心网络中攻击者可以通过采用前缀攻击获得更多的用户隐私信息;对比两种不同的缓存算法,参数相异的算法能提供更好的保护效果。本文同时对影响随机缓存算法隐私保护效果的各个参数进行了分析,并对比了相同算法在单个路径和多个路径网络中的隐私保护效果。本文研究结果对于设计和部署用于保护大规模内容中心网络用户隐私的解决方案具有指导意义。
关键词内容中心网络   用户隐私   缓存探测   随机缓存   多路径     
Abstract: In-network caching is a fundamental mechanism advocated by information-centric networks (ICNs) for efficient content delivery. However, this new mechanism also brings serious privacy risks due to cache snooping attacks. One effective solution to this problem is random-cache, where the cache in a router randomly mimics a cache hit or a cache miss for each content request/probe. In this paper, we investigate the effectiveness of using multiple random-caches to protect cache privacy in a multi-path ICN. We propose models for characterizing the privacy of multi-path ICNs with random-caches, and analyze two different attack scenarios: 1) prefix-based attacks and 2) suffix-based attacks. Both homogeneous and heterogeneous caches are considered. Our analysis shows that in a multi-path ICN an adversary can potentially gain more privacy information by adopting prefix-based attacks. Furthermore, heterogeneous caches provide much better privacy protection than homogeneous ones under both attacks. The effect of different parameters on the privacy of multi-path random-caches is further investigated, and the comparison with its single-path counterpart is carried out based on numerical evaluations. The analysis and results in this paper provide insights in designing and evaluating multi-path ICNs when we take privacy into consideration.
Keywordsinformation-centric network(ICN)   user privacy   cache snooping   random-cache   multi-path     
Received 2016-10-03;
本文基金:

The work was supported by the Young Scientists Fund of the National Natural Science Foundation of China under Grant No. 61502393 and the Aeronautical Science Foundation of China under Grant No. 2014ZD53049.

About author: Wei-Bo Chu received his B.S. degree in software engineering in 2005 and his Ph.D. degree in control science and engineering in 2013, both from Xi'an Jiaotong University, Xi'an. From 2011~2012 he worked as a visiting researcher at Microsoft Research Asia, Beijing. Since 2013 he has been with the School of Computer Science and Technology, Northwestern Polytechnical University, Xi'an. His research interests include Internet measurement and modeling, traffic analysis, and performance evaluation.
引用本文:   
Wei-Bo Chu, Li-Fang Wang, Ze-Jun Jiang, Alan Chin-Chen Chang.采用多路随机缓存技术保护ICN网络用户隐私[J]  Journal of Computer Science and Technology , 2017,V32(3): 585-598
Wei-Bo Chu, Li-Fang Wang, Ze-Jun Jiang, Alan Chin-Chen Chang.Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches[J]  Journal of Computer Science and Technology, 2017,V32(3): 585-598
链接本文:  
http://jcst.ict.ac.cn:8080/jcst/CN/10.1007/s11390-017-1730-2
Copyright 2010 by Journal of Computer Science and Technology