[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Dummy Query-Based User Privacy Protection Scheme in Named Data Networking

  • Conference paper
  • First Online:
Communications and Networking (Chinacom 2023)

Abstract

Named Data Networking (NDN) can distribute content efficiently due to its characteristics of content naming and in-network caching, but these characteristics also raise privacy concerns. However, the existing NDN privacy protection schemes cannot protect user’s privacy completely because they neglect the correlation among NDN contents, content names and content caches. To solve this problem, this paper proposes a dummy query-based privacy protection scheme. Firstly, a similarity-based privacy metric applicable to NDN is formulated to measure the dispersion between queries, and the constraints of attacker’s background knowledge in NDN, communication overhead and NDN characteristics are established. Based on the above indicators, the two-step dummy query set selection algorithms are proposed to construct dummy query set. The algorithms select the dummies that satisfy the constraint on NDN distribution. From the selected dummies, the algorithms then filter out dummies that can be identified by taking account of decentralization, anonymity and communication overheads. Security analysis shows that our privacy protection scheme can effectively resist attacks against the user privacy in NDN. Furthermore, experimental results indicate that the proposal greatly improves user privacy compared with the existing schemes.

Supported by National Natural Science Foundation of China (No. 61701058), the Key Project of State Grid of Sichuan Electric Power Company (No. 52199922005) and Yibin City Introduced High level Talents Project 2022YG05.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 99.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 129.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Conti, M., Gangwal, A., Hassan, M., et al.: The road ahead for networking: a survey on ICN-IP coexistence solutions. IEEE Commun. Surv. Tutorials 22(3), 2104–2129 (2020)

    Article  Google Scholar 

  2. Zhang, Z., Lung, C.H., Wei, X., et al.: In-network caching for ICN-based IoT (ICN-IoT): a comprehensive survey. IEEE Internet Things J. 10(16), 14595–14620 (2023)

    Article  Google Scholar 

  3. Tourani, R., Misra, S., Mick, T., et al.: Security, privacy, and access control in information-centric networking: a survey. IEEE Commun. Surv. Tutorials 20(1), 566–600 (2017)

    Article  Google Scholar 

  4. Zhang, Z., Won, S. Y., Zhang, L.: Investigating the design space for name confidentiality in named data networking. In: Proceedings of MILCOM 2021 IEEE Military Communications Conference (MILCOM), pp. 570–576. IEEE (2021)

    Google Scholar 

  5. Ko, K.T., Hlaing, H.H., Mambo, M., et al.: A PEKS-based NDN strategy for name privacy. Future Internet 12(8), 130 (2020)

    Article  Google Scholar 

  6. Guo, X., Chen, C., Zhang, M.J., et al.: Privacy-aware transmission scheme based on homomorphic proxy re-encryption for NDN. Int. J. Secure. Network. 13(1), 58–70 (2018)

    Article  Google Scholar 

  7. He, H., Chen, B.: An elliptic curve based name privacy protection mechanism for sensory data centric named data networking. In: Proceedings of 2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), pp. 56–62. IEEE (2019)

    Google Scholar 

  8. Bernardini, C., Marchal, S., Asghar, M.R., et al.: PrivICN: privacy-preserving content retrieval in information-centric networking. Comput. Netw. 149(1), 13–28 (2019)

    Article  Google Scholar 

  9. Yang, J., Tang, J., Li, J.: Differential defense against distributed timing attack for privacy-preserving information centric network. In: Proceedings of 2022 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1–6. IEEE (2022)

    Google Scholar 

  10. Kumar, N., Srivastava, S.: A triggered delay-based approach against cache privacy attack in NDN. In: Proceedings of 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS), pp. 22–27. IEEE (2018)

    Google Scholar 

  11. Acs, G., Conti, M., Gasti, P.: PrivICN: privacy-aware caching in information-centric networking. IEEE Trans. Dependable Secure Comput. 16(2), 313–328 (2017)

    Article  Google Scholar 

  12. Abani, N., Braun, T., Gerla, M.: Betweenness centrality and cache privacy in information-centric networks. In: Proceedings of the 5th ACM Conference on Information-Centric Networking, pp. 106–116. IEEE (2018)

    Google Scholar 

  13. Sivaraman, V., Sikdar, B.: A defense mechanism against timing attacks on user privacy in ICN. IEEE/ACM Trans. Netw. 29(6), 2709–2722 (2021)

    Article  Google Scholar 

  14. Jones, A., Simon, R.: A privacy-preserving collaborative caching approach in information-centric networking. In: Proceedings of 22nd International Symposium, pp. 133–150. IEEE (2020)

    Google Scholar 

  15. Arianfar, S., Koponen, T., Raghavan, B., et al.: On preserving privacy in content-oriented networks. In: Proceedings of the ACM SIGCOMM Workshop on Information Centric Networking (ICN), pp. 19–24. IEEE (2011)

    Google Scholar 

  16. Li, W., Li, C., Geng, Y.: APS: attribute-aware privacy-preserving scheme in location-based services. Inf. Sci. 527(5), 460–476 (2020)

    Article  Google Scholar 

  17. Zhao, P., Liu, W., Zhang, G., et al.: Preserving privacy in WiFi localization with plausible dummy locations. IEEE Trans. Veh. Technol. 69(10), 11909–11925 (2020)

    Article  Google Scholar 

  18. Jiang, H., Li, J., Zhao, P., et al.: Location privacy-preserving mechanisms in location-based services: a comprehensive survey. ACM Comput. Surv. 54(1), 2373–2395 (2021)

    Google Scholar 

  19. Fellbaum, C., et al.: WordNet: An Electronic Lexical Database. MIT press, Cambridge (1998)

    Book  Google Scholar 

  20. Liu, H.Z., Bao, H., Xu, D.: Concept vector for similarity measurement based on hierarchical domain structure. Comput. Inform. 30(5), 881–900 (2011)

    Google Scholar 

  21. Wu, Z., Palmer, M.: Verb semantics and lexical selection. In: Proceedings of Association for Computational Linguistics, pp. 133–138. IEEE (1994)

    Google Scholar 

  22. Real, R., Vargas, J.M.: The probabilistic basis of Jaccard’s index of similarity. Syst. Biol. 45(3), 380–385 (1996)

    Article  Google Scholar 

  23. TLC Trip Record Data, data publications (2022). https://www1.nyc.gov/site/tlc/about/tlc-trip-record-data

  24. Niu, B., Li, Q., Zhu, X., et al.: Achieving k-anonymity in privacy-aware location-based services. In: Proceedings of IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 754–762. IEEE (2014)

    Google Scholar 

  25. Shaham, S., Ding, M., Liu, B., et al.: Privacy preservation in location-based services: a novel metric and attack model. IEEE Trans. Mob. Comput. 20(10), 3006–3019 (2020)

    Article  Google Scholar 

  26. Yang, D., Ye, B., Chen, Y., et al.: A dummy location selection algorithm based on location semantics and physical distance. In: Proceedings of 16th International Conference of Information Security Practice and Experience, pp. 283–295. IEEE (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jie Duan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Duan, J., Tang, W., Sun, C., Yan, Z., Cheng, W., Li, C. (2024). A Dummy Query-Based User Privacy Protection Scheme in Named Data Networking. In: Gao, F., Wu, J., Li, Y., Gao, H., Wang, S. (eds) Communications and Networking. Chinacom 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 590. Springer, Cham. https://doi.org/10.1007/978-3-031-67162-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-67162-3_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-67161-6

  • Online ISBN: 978-3-031-67162-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics