Protecting access privacy of cached contents in information centric networks

In information centric network (ICN), contents are fetched by their names from caches deployed in the network or from origin servers. Once the contents are fetched from the origin server, it is replicated and cached in all routers along the routing and forwarding paths from the user that issues the interest to the origin server, thus allowing further "interests" by other users to be fulfilled quickly. However, the way ICN caching and interest fulfillment work pose a great privacy risk; the time difference between response for interest of cached and uncached contents can be used as an indicator to infer whether or not a near-by user previously requested the same contents requested by the adversary. This work introduces the extent to which the problem is applicable in ICN and provides several solutions to address it.

[1]  Srinivasan Seshan,et al.  XIA: Efficient Support for Evolvable Internetworking , 2012, NSDI.

[2]  Nicholas H. Briggs,et al.  Networking named content , 2009, CoNEXT '09.

[3]  Nick Feamster,et al.  Accountable internet protocol (aip) , 2008, SIGCOMM '08.

[4]  Brian Burch,et al.  Less for More , 1990 .

[5]  Karen R. Sollins,et al.  Arguments for an information-centric internetworking architecture , 2010, CCRV.

[6]  Scott Shenker,et al.  Naming in content-oriented architectures , 2011, ICN '11.

[7]  Michael Walfish,et al.  A layered naming architecture for the internet , 2004, SIGCOMM '04.

[8]  Scott Shenker,et al.  On preserving privacy in content-oriented networks , 2011, ICN '11.

[9]  Pablo Rodriguez,et al.  Privacy risks in named data networking: what is the cost of performance? , 2012, CCRV.

[10]  Pekka Nikander,et al.  Secure naming in information-centric networks , 2010, ReARCH '10.

[11]  George Pavlou,et al.  Cache "Less for More" in Information-Centric Networks , 2012, Networking.

[12]  Edward W. Felten,et al.  Timing attacks on Web privacy , 2000, CCS.

[13]  Yanghee Choi,et al.  Host-oblivious security for content-based networks , 2010, CFI.

[14]  Yonggang Wen,et al.  Towards name-based trust and security for content-centric network , 2011, 2011 19th IEEE International Conference on Network Protocols.

[15]  Dipankar Raychaudhuri,et al.  MobilityFirst future internet architecture project , 2011, AINTEC '11.

[16]  Deborah Estrin,et al.  Named Data Networking (NDN) Project , 2010 .

[17]  George C. Polyzos,et al.  A Hybrid Overlay Multicast and Caching Scheme for Information-Centric Networking , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[18]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[19]  Nicola Blefari-Melazzi,et al.  Transport-layer issues in information centric networks , 2012, ICN '12.