[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2018584.2018589acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

On preserving privacy in content-oriented networks

Published: 19 August 2011 Publication History

Abstract

The recent literature has hailed the benefits of content-oriented network architectures. However, such designs pose a threat to privacy by revealing a user's content requests. In this paper, we study how to ameliorate privacy in such designs. We present an approach that does not require any special infrastructure or shared secrets between the publishers and consumers of content. In lieu of any informational asymmetry, the approach leverages computational asymmetry by forcing the adversary to perform sizable computations to reconstruct each request. This approach does not provide ideal privacy, but makes it hard for an adversary to effectively monitor the content requests of a large number of users.

References

[1]
R. Anderson. The Eternity Service. In Proc. of Pragocrypt, 1996.
[2]
Anonymizer. http://www.anonymizer.com/.
[3]
D. Asonov and J.-C. Freytag. Repudiative Information Retrieval. In Proc. of Workshop on Privacy in the Electronic Society, 2002.
[4]
J. Aspnes, J. Feigenbaum, A. Yampolskiy, and S. Zhong. Towards a Theory of Data Entanglement. Theoretical Computer Science, 389(1-2):26--43, 2007.
[5]
M. Bellare and S. Micali. Non-interactive Oblivious Transfer and Applications. In Proc. of CRYPTO, 1989.
[6]
N. Borisov, I. Goldberg, and E. Brewer. Off-the-record communication, or, why not to use PGP. In Proc. of Workshop on Privacy in the Electronic Society, pages 77--84, 2004.
[7]
C. Cachin, S. Micali, and M. Stadler. Computationally Private Information Retrieval with Polylogarithmic Communication. Lecture Notes in Computer Science, 1592, 1999.
[8]
R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky. Deniable Encryption. In Proc. of CRYPTO, 1997.
[9]
D. L. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84--90, 1981.
[10]
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private Information Retrieval. In IEEE Symposium on FOCS, 1995.
[11]
I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley. Protecting Free Expression Online with Freenet. IEEE Internet Computing, 6(1):40--49, 2002.
[12]
R. Dingledine, M. J. Freedman, and D. Molnar. The Free Haven Project: Distributed Anonymous Storage Service. LNCS, 2009, 2001.
[13]
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second-Generation Onion Router. In Proc. of USENIX Security Symposium, 2004.
[14]
N. Feamster, M. Balazinska, G. Harfst, H. Balakrishnan, and D. Karger. Infranet: Circumventing Web Censorship and Surveillance. In Proc. of USENIX Security Symposium, 2002.
[15]
A. Fiat and M. Naor. Broadcast Encryption. In Proc. CRYPTO, 1993.
[16]
M. J. Freedman and R. Morris. Tarzan: a Peer-to-Peer Anonymizing Network Layer. In Proc. of ACM CCS, 2002.
[17]
D. Goldschlag, M. Reed, and P. Syverson. Onion Routing. Commun. ACM, 42(2):39--41, 1999.
[18]
S. Hand and T. Roscoe. Mnemosyne: Peer-to-Peer Steganographic Storage. In Proc. of IPTPS, 2002.
[19]
V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard. Networking Named Content. In Proc. CoNEXT, Dec. 2009.
[20]
T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica. A Data-Oriented (and beyond) Network Architecture. In Proc. of SIGCOMM, 2007.
[21]
E. Kushilevitz and R. Ostrovsky. Replication Is Not Needed: Single Database, Computationally-private Information Retrieval. In Proc. 38th IEEE FOCS, 1997.
[22]
M. Luby. LT codes. In Proceedings of IEEE FOCS, 2002.
[23]
M. Naor and B. Pinkas. Oblivious Transfer with Adaptive Queries. In Proc. of CRYPTO, 1999.
[24]
M. Naor and B. Pinkas. Efficient Oblivious Transfer Protocols. In Proc. of SODA, 2001.
[25]
M. Naor and O. Reingold. On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited. Journal of Cryptology, 12(1):29--66, 1999.
[26]
R. Rivest. All-or-nothing Encryption and the Package Transform. In Proceedings of Fast Software Encryption, 1997.
[27]
S. W. Smith and D. Safford. Practical Private Information Retrieval with Secure Coprocessors. In Technical report, IBM T.J. Watson Research Center, 2000.
[28]
A. Stubblefield and D. Wallach. Dagster: Censorship-Resistant Publishing Without Replication. Rice University, Dept. of Computer Science, Tech. Rep. TR01-380, 2001.
[29]
D. Trossen, M. Särelä, and K. Sollins. Arguments for an Information-centric Internetworking Architecture. SIGCOMM CCR, 40, Apr. 2010.
[30]
TrueCrypt. http://www.truecrypt.org/.
[31]
L. Von Ahn and N. Hopper. Public-key Steganography. In Proc. of EUROCRYPT, 2004.
[32]
M. Waldman and D. Mazieres. Tangler: a censorship-resistant publishing system based on document entanglements. In Proc. of ACM CCS, pages 126--135, 2001.
[33]
Zero Knowledge Systems Freedom Network. http://www.zks.net/.

Cited By

View all
  • (2024)Hybrid-Coding Based Content Access Control for Information-Centric NetworkingIEEE Transactions on Wireless Communications10.1109/TWC.2023.333293023:7(6765-6777)Online publication date: Jul-2024
  • (2024)A Dummy Query-Based User Privacy Protection Scheme in Named Data NetworkingCommunications and Networking10.1007/978-3-031-67162-3_11(162-181)Online publication date: 6-Aug-2024
  • (2023)Programmable Name Obfuscation Framework for Controlling Privacy and Performance on CCNIEEE Transactions on Network and Service Management10.1109/TNSM.2023.327525020:3(2460-2474)Online publication date: Sep-2023
  • Show More Cited By

Index Terms

  1. On preserving privacy in content-oriented networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICN '11: Proceedings of the ACM SIGCOMM workshop on Information-centric networking
    August 2011
    80 pages
    ISBN:9781450308014
    DOI:10.1145/2018584
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 August 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. content-oriented networking
    2. privacy

    Qualifiers

    • Research-article

    Conference

    SIGCOMM '11
    Sponsor:
    SIGCOMM '11: ACM SIGCOMM 2011 Conference
    August 19, 2011
    Ontario, Toronto, Canada

    Acceptance Rates

    ICN '11 Paper Acceptance Rate 12 of 50 submissions, 24%;
    Overall Acceptance Rate 133 of 482 submissions, 28%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)71
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 17 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Hybrid-Coding Based Content Access Control for Information-Centric NetworkingIEEE Transactions on Wireless Communications10.1109/TWC.2023.333293023:7(6765-6777)Online publication date: Jul-2024
    • (2024)A Dummy Query-Based User Privacy Protection Scheme in Named Data NetworkingCommunications and Networking10.1007/978-3-031-67162-3_11(162-181)Online publication date: 6-Aug-2024
    • (2023)Programmable Name Obfuscation Framework for Controlling Privacy and Performance on CCNIEEE Transactions on Network and Service Management10.1109/TNSM.2023.327525020:3(2460-2474)Online publication date: Sep-2023
    • (2023)Edge-Assisted Intelligent Device Authentication in Cyber–Physical SystemsIEEE Internet of Things Journal10.1109/JIOT.2022.315182810:4(3057-3070)Online publication date: 15-Feb-2023
    • (2023)Security Overall in Information‐Centric NetworksAttribute‐based Encryption (ABE)10.1002/9781119989387.ch12(195-214)Online publication date: 6-Oct-2023
    • (2021)Producer Anonymity Based on Onion Routing in Named Data NetworkingIEEE Transactions on Network and Service Management10.1109/TNSM.2020.301905218:2(2420-2436)Online publication date: Jun-2021
    • (2021)Investigating the Design Space for Name Confidentiality in Named Data NetworkingMILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)10.1109/MILCOM52596.2021.9652892(570-576)Online publication date: 29-Nov-2021
    • (2021)Dynamic forest of random subsets-based one-time signature-based capability enhancing security architecture for named data networkingInternational Journal of Information Technology10.1007/s41870-021-00786-915:2(773-788)Online publication date: 31-Aug-2021
    • (2020)On economic, societal, and political aspects in ICNProceedings of the 7th ACM Conference on Information-Centric Networking10.1145/3405656.3420229(155-157)Online publication date: 22-Sep-2020
    • (2020)BEAcM‐DPTransactions on Emerging Telecommunications Technologies10.1002/ett.379431:2Online publication date: 16-Feb-2020
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media