Betweenness centrality and cache privacy in information-centric networks

In-network caching is a feature shared by all proposed Information Centric Networking (ICN) architectures as it is critical to achieving a more efficient retrieval of content. However, the default "cache everything everywhere" universal caching scheme has caused the emergence of several privacy threats. Timing attacks are one such privacy breach where attackers can probe caches and use timing analysis of data retrievals to identify if content was retrieved from the data source or from the cache, the latter case inferring that this content was requested recently. We have previously proposed a betweenness centrality based caching strategy to mitigate such attacks by increasing user anonymity. We demonstrated its efficacy in a transit-stub topology. In this paper, we further investigate the effect of betweenness centrality based caching on cache privacy and user anonymity in more general synthetic and real world Internet topologies. It was also shown that an attacker with access to multiple compromised routers can locate and track a mobile user by carrying out multiple timing analysis attacks from various parts of the network. We extend our privacy evaluation to a scenario with mobile users and show that a betweenness centrality based caching policy provides a mobile user with path privacy by increasing an attacker's difficulty in locating a moving user or identifying his/her route.

[1]  Satyajayant Misra,et al.  Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[2]  Ventzislav Koptchev,et al.  PSIRP project -- publish-subscribe internet routing paradigm: new ideas for future internet , 2010, CompSysTech '10.

[3]  Mauro Conti,et al.  Cache Privacy in Named-Data Networking , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[4]  Mario Gerla,et al.  Centrality-based caching for privacy in Information-Centric Networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[5]  Luigi V. Mancini,et al.  Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking , 2015, ACNS.

[6]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[7]  U. Brandes A faster algorithm for betweenness centrality , 2001 .

[8]  Hossam S. Hassanein,et al.  A Survey of Security Attacks in Information-Centric Networking , 2015, IEEE Communications Surveys & Tutorials.

[9]  Andreas Pfitzmann,et al.  Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[10]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[11]  Aziz Mohaisen,et al.  Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures , 2015, IEEE Transactions on Dependable and Secure Computing.

[12]  Yongdae Kim,et al.  Protecting access privacy of cached contents in information centric networks , 2012, CCS.

[13]  Alexander Afanasyev,et al.  ndnSIM 2 . 0 : A new version of the NDN simulator for NS-3 , 2015 .

[14]  Pablo Rodriguez,et al.  Privacy risks in named data networking: what is the cost of performance? , 2012, CCRV.

[15]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[16]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[17]  Martin Everett,et al.  Ego network betweenness , 2005, Soc. Networks.

[18]  Scott Shenker,et al.  A data-oriented (and beyond) network architecture , 2007, SIGCOMM '07.

[19]  Emiliano De Cristofaro,et al.  Privacy in content-oriented networking: threats and countermeasures , 2012, CCRV.

[20]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[21]  Max Schuchard,et al.  POSTER : Protecting Access Privacy of Cached Contents in Information Centric Networks , 2012 .

[22]  Matthias Grossglauser,et al.  A parsimonious model of mobile partitioned networks with clustering , 2009, 2009 First International Communication Systems and Networks and Workshops.

[23]  Ratul Mahajan,et al.  Measuring ISP topologies with Rocketfuel , 2004, IEEE/ACM Transactions on Networking.