Abstract
Named Data Networking (NDN) can distribute content efficiently due to its characteristics of content naming and in-network caching, but these characteristics also raise privacy concerns. However, the existing NDN privacy protection schemes cannot protect user’s privacy completely because they neglect the correlation among NDN contents, content names and content caches. To solve this problem, this paper proposes a dummy query-based privacy protection scheme. Firstly, a similarity-based privacy metric applicable to NDN is formulated to measure the dispersion between queries, and the constraints of attacker’s background knowledge in NDN, communication overhead and NDN characteristics are established. Based on the above indicators, the two-step dummy query set selection algorithms are proposed to construct dummy query set. The algorithms select the dummies that satisfy the constraint on NDN distribution. From the selected dummies, the algorithms then filter out dummies that can be identified by taking account of decentralization, anonymity and communication overheads. Security analysis shows that our privacy protection scheme can effectively resist attacks against the user privacy in NDN. Furthermore, experimental results indicate that the proposal greatly improves user privacy compared with the existing schemes.
Supported by National Natural Science Foundation of China (No. 61701058), the Key Project of State Grid of Sichuan Electric Power Company (No. 52199922005) and Yibin City Introduced High level Talents Project 2022YG05.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Conti, M., Gangwal, A., Hassan, M., et al.: The road ahead for networking: a survey on ICN-IP coexistence solutions. IEEE Commun. Surv. Tutorials 22(3), 2104–2129 (2020)
Zhang, Z., Lung, C.H., Wei, X., et al.: In-network caching for ICN-based IoT (ICN-IoT): a comprehensive survey. IEEE Internet Things J. 10(16), 14595–14620 (2023)
Tourani, R., Misra, S., Mick, T., et al.: Security, privacy, and access control in information-centric networking: a survey. IEEE Commun. Surv. Tutorials 20(1), 566–600 (2017)
Zhang, Z., Won, S. Y., Zhang, L.: Investigating the design space for name confidentiality in named data networking. In: Proceedings of MILCOM 2021 IEEE Military Communications Conference (MILCOM), pp. 570–576. IEEE (2021)
Ko, K.T., Hlaing, H.H., Mambo, M., et al.: A PEKS-based NDN strategy for name privacy. Future Internet 12(8), 130 (2020)
Guo, X., Chen, C., Zhang, M.J., et al.: Privacy-aware transmission scheme based on homomorphic proxy re-encryption for NDN. Int. J. Secure. Network. 13(1), 58–70 (2018)
He, H., Chen, B.: An elliptic curve based name privacy protection mechanism for sensory data centric named data networking. In: Proceedings of 2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), pp. 56–62. IEEE (2019)
Bernardini, C., Marchal, S., Asghar, M.R., et al.: PrivICN: privacy-preserving content retrieval in information-centric networking. Comput. Netw. 149(1), 13–28 (2019)
Yang, J., Tang, J., Li, J.: Differential defense against distributed timing attack for privacy-preserving information centric network. In: Proceedings of 2022 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1–6. IEEE (2022)
Kumar, N., Srivastava, S.: A triggered delay-based approach against cache privacy attack in NDN. In: Proceedings of 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS), pp. 22–27. IEEE (2018)
Acs, G., Conti, M., Gasti, P.: PrivICN: privacy-aware caching in information-centric networking. IEEE Trans. Dependable Secure Comput. 16(2), 313–328 (2017)
Abani, N., Braun, T., Gerla, M.: Betweenness centrality and cache privacy in information-centric networks. In: Proceedings of the 5th ACM Conference on Information-Centric Networking, pp. 106–116. IEEE (2018)
Sivaraman, V., Sikdar, B.: A defense mechanism against timing attacks on user privacy in ICN. IEEE/ACM Trans. Netw. 29(6), 2709–2722 (2021)
Jones, A., Simon, R.: A privacy-preserving collaborative caching approach in information-centric networking. In: Proceedings of 22nd International Symposium, pp. 133–150. IEEE (2020)
Arianfar, S., Koponen, T., Raghavan, B., et al.: On preserving privacy in content-oriented networks. In: Proceedings of the ACM SIGCOMM Workshop on Information Centric Networking (ICN), pp. 19–24. IEEE (2011)
Li, W., Li, C., Geng, Y.: APS: attribute-aware privacy-preserving scheme in location-based services. Inf. Sci. 527(5), 460–476 (2020)
Zhao, P., Liu, W., Zhang, G., et al.: Preserving privacy in WiFi localization with plausible dummy locations. IEEE Trans. Veh. Technol. 69(10), 11909–11925 (2020)
Jiang, H., Li, J., Zhao, P., et al.: Location privacy-preserving mechanisms in location-based services: a comprehensive survey. ACM Comput. Surv. 54(1), 2373–2395 (2021)
Fellbaum, C., et al.: WordNet: An Electronic Lexical Database. MIT press, Cambridge (1998)
Liu, H.Z., Bao, H., Xu, D.: Concept vector for similarity measurement based on hierarchical domain structure. Comput. Inform. 30(5), 881–900 (2011)
Wu, Z., Palmer, M.: Verb semantics and lexical selection. In: Proceedings of Association for Computational Linguistics, pp. 133–138. IEEE (1994)
Real, R., Vargas, J.M.: The probabilistic basis of Jaccard’s index of similarity. Syst. Biol. 45(3), 380–385 (1996)
TLC Trip Record Data, data publications (2022). https://www1.nyc.gov/site/tlc/about/tlc-trip-record-data
Niu, B., Li, Q., Zhu, X., et al.: Achieving k-anonymity in privacy-aware location-based services. In: Proceedings of IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 754–762. IEEE (2014)
Shaham, S., Ding, M., Liu, B., et al.: Privacy preservation in location-based services: a novel metric and attack model. IEEE Trans. Mob. Comput. 20(10), 3006–3019 (2020)
Yang, D., Ye, B., Chen, Y., et al.: A dummy location selection algorithm based on location semantics and physical distance. In: Proceedings of 16th International Conference of Information Security Practice and Experience, pp. 283–295. IEEE (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Duan, J., Tang, W., Sun, C., Yan, Z., Cheng, W., Li, C. (2024). A Dummy Query-Based User Privacy Protection Scheme in Named Data Networking. In: Gao, F., Wu, J., Li, Y., Gao, H., Wang, S. (eds) Communications and Networking. Chinacom 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 590. Springer, Cham. https://doi.org/10.1007/978-3-031-67162-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-67162-3_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-67161-6
Online ISBN: 978-3-031-67162-3
eBook Packages: Computer ScienceComputer Science (R0)