Cache privacy protection strategy in content centric networking
Cache privacy leak was one of the important security threats of CCN,the adversary could obtain the legitimate user’s privacy information through probing cache visiting time.Aiming at this security problem,the privacy and non-privacy contents were dealt separately,then a cache privacy protection stra...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2015-12-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2015323 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850211742068506624 |
|---|---|
| author | Yi ZHU Zheng-kun MI Wen-nai WANG |
| author_facet | Yi ZHU Zheng-kun MI Wen-nai WANG |
| author_sort | Yi ZHU |
| collection | DOAJ |
| description | Cache privacy leak was one of the important security threats of CCN,the adversary could obtain the legitimate user’s privacy information through probing cache visiting time.Aiming at this security problem,the privacy and non-privacy contents were dealt separately,then a cache privacy protection strategy based on recent visiting information and evicted copy up (CPPS-RVI&ECP) was proposed.In order to compare with the current typical defense strategy-random first k delay (RFKD),the theoretical analysis of privacy leak probability and network hit probability are further given.The CPPS-RVI&ECP identifies the recent visitor by setting privacy mark in interest packet,decreases the privacy leak probability by selecting replacing position randomly,and promotes the network performance by the mechanism of shifting evicted copy upstream.The numeric analysis results under the prescribed experimental conditions show that,whereas the ideal privacy protection ability of RFKD is obtained at the expense of sacrifice of cache contents delivery capability,the proposed CPPS-RVI&ECP can obtain low privacy leak probability and in the meantime maintain high network hit probability by setting reasonable upstream shifting probability. |
| format | Article |
| id | doaj-art-4aa6b6a71c464575b4b93b4a57486d7d |
| institution | OA Journals |
| issn | 1000-436X |
| language | zho |
| publishDate | 2015-12-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| series | Tongxin xuebao |
| spelling | doaj-art-4aa6b6a71c464575b4b93b4a57486d7d2025-08-20T02:09:30ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2015-12-013613915059697175Cache privacy protection strategy in content centric networkingYi ZHUZheng-kun MIWen-nai WANGCache privacy leak was one of the important security threats of CCN,the adversary could obtain the legitimate user’s privacy information through probing cache visiting time.Aiming at this security problem,the privacy and non-privacy contents were dealt separately,then a cache privacy protection strategy based on recent visiting information and evicted copy up (CPPS-RVI&ECP) was proposed.In order to compare with the current typical defense strategy-random first k delay (RFKD),the theoretical analysis of privacy leak probability and network hit probability are further given.The CPPS-RVI&ECP identifies the recent visitor by setting privacy mark in interest packet,decreases the privacy leak probability by selecting replacing position randomly,and promotes the network performance by the mechanism of shifting evicted copy upstream.The numeric analysis results under the prescribed experimental conditions show that,whereas the ideal privacy protection ability of RFKD is obtained at the expense of sacrifice of cache contents delivery capability,the proposed CPPS-RVI&ECP can obtain low privacy leak probability and in the meantime maintain high network hit probability by setting reasonable upstream shifting probability.http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2015323content centric networking;cache privacy probe;privacy protection strategy;privacy leak probability |
| spellingShingle | Yi ZHU Zheng-kun MI Wen-nai WANG Cache privacy protection strategy in content centric networking Tongxin xuebao content centric networking;cache privacy probe;privacy protection strategy;privacy leak probability |
| title | Cache privacy protection strategy in content centric networking |
| title_full | Cache privacy protection strategy in content centric networking |
| title_fullStr | Cache privacy protection strategy in content centric networking |
| title_full_unstemmed | Cache privacy protection strategy in content centric networking |
| title_short | Cache privacy protection strategy in content centric networking |
| title_sort | cache privacy protection strategy in content centric networking |
| topic | content centric networking;cache privacy probe;privacy protection strategy;privacy leak probability |
| url | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2015323 |
| work_keys_str_mv | AT yizhu cacheprivacyprotectionstrategyincontentcentricnetworking AT zhengkunmi cacheprivacyprotectionstrategyincontentcentricnetworking AT wennaiwang cacheprivacyprotectionstrategyincontentcentricnetworking |