[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

BEAcM‐DP: : A broadcast encryption anti‐censorship mechanism based on directory proxy

Published: 16 February 2020 Publication History

Abstract

As a typical representative of the next generation Internet, named data networking (NDN) solves many problems in IP network by adopting content‐oriented architecture. However, NDN also faces with severe challenges in the aspect of name and content privacy. One important privacy threat is the name censorship. By maintaining a blacklist at the hijacked router, an attacker can filter the received interest packets with sensitive content names. To solve this problem, we propose a broadcast encryption anticensorship mechanism, which is based on directory proxy. In our design, a directory proxy is deployed in the network, which provides a periodic updated directory file to all authorized users. In the directory file, a one‐to‐one mapping list of fake names with the censored names is given. By obtaining the directory file, the authorized user can request the censored content with its fake name. In addition, the directory proxy plays the role of translating the received fake name and then retrieving the target with real name. To guarantee the reusability of retrieved contents, the directory proxy returns them to the authorized users through broadcast encryption. The users within one broadcast group can share the encrypted censored contents at nearby routers. Simulation results show that, compared with ANDaNA, this mechanism can effectively avoid censorship in the network, while ensuring the utilization of in‐network caching and reducing the request delay.

Graphical Abstract

To defend the name censorship attack in NDN, this paper proposed a broadcast encryption anti‐censorship mechanism which is based on directory proxy (BEAcM‐DP). In BEAcM‐DP, a directory proxy to camouflage the real content name is set to evade censorship, the broadcast encryption is adopted to ensure that the censored content can be reused in the network for the users within a broadcast group.

References

[1]
Afanasyev A, Burke J, Refaei T, Wang L, Zhang B, Zhang L. A brief introduction to named data networking. Paper presented at: Military Communications for 21st Century, MILCOM; 2018; Los Angeles, CA.
[2]
Xu Y, Yang L, Song C, Tao L, Fu C. Distributed caching via rewarding: an incentive caching model for ICN. Paper presented at: GLOBECOM IEEE Global Communications Conference; 2018; Singapore.
[3]
Bari Md F, Chowdhury SR, Ahmed R, Boutaba R, Mathieu B. A survey of naming and routing in information‐centric networks. IEEE Commun Mag. 2012;50(12):44‐53.
[4]
Ngai E, Ohlman B, Tsudik G, Uzun E, Wählisch M, Wood CA. Can we make a cake and eat it too? A discussion of ICN security and privacy. ACM Sigcomm Computer Communication Review. 2017;47(1):49‐54.
[5]
Zhang Z, Yu Y, Zhang H, Newberry E, Mastorakis S. An overview of security support in named data networking. IEEE Commun Mag. 2018;56(11):62‐68.
[6]
Kumar N, Srivastava S. A triggered delay‐based approach against cache privacy attack in NDN. Paper presented at: 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS); 2018; Singapore.
[7]
Tourani R, Mick T, Misra S, Panwar G. Security, privacy, and access control in information‐centric networking: a survey. IEEE Commun Surv Tutor. 2016;1(20):566‐600.
[8]
Canard S, Phan D‐H, Trinh VC. Attribute‐based broadcast encryption scheme for lightweight devices. IET Inf Secur. 2018;12(1):52‐59.
[9]
Delerablée C, Paillier P, Pointcheval D. Fully collusion secure dynamic broadcast encryption with constant‐size ciphertexts or decryption keys. Paper presented at: International Conference on Pairing‐based Cryptography; 2007; Tokyo, Japan.
[10]
Arianfar S, Koponen T, Raghavan B, Shenker S. On preserving privacy in content‐oriented networks. Paper presented at: ACM SIGCOMM Workshop on Information‐Centric Networking; 2011; Toronto, Canada.
[11]
Fotiou N, Trossen D, Marias GF, Kostopoulos A, Polyzos GC. Enhancing information lookup privacy through homomorphic encryption. Secur Commun Netw. 2015;7(12):2804‐2814.
[12]
Tourani R, Misra S, Kliewer J, Ortegel S, Mick T. Catch me if you can: a practical framework to evade censorship in information‐centric networks. Paper presented at: International Conference on Information‐Centric Networking; 2015; San Francisco, CA.
[13]
Dingledine R, Mathewson N, Syverson P. Tor: the second‐generation onion router. J Frankl Inst. 2004;239(2):135‐139.
[14]
Dibenedetto S, Gasti P, Tsudik G, Uzun E. ANDaNA: anonymous named data networking application. Computer Science. 2011.
[15]
Seo SC, Kim T, Jang M. A privacy‐preserving approach in content centric. Paper presented at: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC); 2014; Las Vegas, NV.
[16]
Suhaili SB, Watanabe T. High speed implementation of the keyed‐hash message authentication code (HMAC) based on SHA‐1 algorithm. Adv Sci Lett. 2017;23(11):11096‐11100.
[17]
Fiat A, Naor M. Broadcast encryption. Paper presented at: Annual International Cryptology Conference; 1993; Santa Barbara, CA.
[18]
Rivest R. The MD5 message‐digest algorithm. Req Comments 1321. 1992;473(10):492‐492.
[19]
Mastorakis S, Afanasyev A, Zhang L. On the evolution of ndnSIM: an open‐source simulator for NDN experimentation. ACM SIGCOMM Comput Commun Rev. 2017;3(47):19‐33.
[20]
Alegria JMS, Gómez‐Déniz E. Construction of multivariate distributions: a review of some recent results. Sort. 2008;32(1):3‐36.
[21]
Detti A, Bracciale L, Loreti P, Melazzi NB. Modeling LRU cache with invalidation. Computer Networks. 2018;134:55‐65.
[22]
Stigler SM. Poisson on the Poisson distribution. Stat Probab Lett. 1982;1(1):33‐35.
[23]
Kanna GP, Vasudevan V. A new approach in multi cloud environment to improve data security. Paper presented at: 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS); 2017; Jammu, India.
[24]
Jadoon AK, Iqbal W, Amjad MF, Afzal H, Bangash YA. Forensic analysis of Tor browser: a case study for privacy and anonymity on the web. Forensic Sci Int. 2019;299(2019):59‐73.

Cited By

View all
  • (2021)Investigating the Design Space for Name Confidentiality in Named Data NetworkingMILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)10.1109/MILCOM52596.2021.9652892(570-576)Online publication date: 29-Nov-2021

Index Terms

  1. BEAcM‐DP: A broadcast encryption anti‐censorship mechanism based on directory proxy
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image Transactions on Emerging Telecommunications Technologies
          Transactions on Emerging Telecommunications Technologies  Volume 31, Issue 2
          February 2020
          532 pages
          EISSN:2161-3915
          DOI:10.1002/ett.v31.2
          Issue’s Table of Contents

          Publisher

          John Wiley & Sons, Inc.

          United States

          Publication History

          Published: 16 February 2020

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 18 Dec 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2021)Investigating the Design Space for Name Confidentiality in Named Data NetworkingMILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)10.1109/MILCOM52596.2021.9652892(570-576)Online publication date: 29-Nov-2021

          View Options

          View options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media