A World on NDN: Affordances & Implications of the Named Data Networking Future Internet Architecture

This paper explores the potential social impacts of Named Data Networking (NDN), a proposed future Internet architecture that forwards packets based on data names rather than host addresses. We highlight four departures from today's TCP/IP architecture, which underscore the social impacts of NDN: the architecture's emphases on enabling semantic classification, provenance, publication, and decentralized communication. While all of these principles can be implemented in the current Internet's application layer, NDN enables them at the network layer, and thus encourages all applications to comport with them. We describe how these changes from TCP/IP will expand affordances for free speech, and produce positive outcomes for security, privacy and anonymity while raising new challenges regarding data retention and forgetting. We describe how these changes might alter current corporate and law enforcement content regulation mechanisms by changing the way data is identified, handled, and routed across the Web. We examine how even as NDN empowers edges with more decentralized communication options, by providing more context per packet than IP, it raises new challenges in ensuring neutrality across the public network. Finally, we introduce openings where telecommunications policy can evolve alongside NDN to ensure an open, fair Internet.

[1]  Woodrow Hartzog,et al.  The Case for Online Obscurity , 2012 .

[2]  Lisa A. Ennis,et al.  Wired Shut: Copyright and the Shape of Digital Culture , 2007 .

[3]  Milton L. Mueller,et al.  The end of the net as we know it? Deep packet inspection and internet governance , 2011, New Media Soc..

[4]  Deborah G. Johnson,et al.  Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness , 2002, Inf. Soc..

[5]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[6]  Anil Kumar Understanding Privacy , 2010 .

[7]  Gene Tsudik,et al.  ANDaNA: Anonymous Named Data Networking Application , 2011, NDSS.

[8]  Priya Mahadevan,et al.  Custodian-based information sharing , 2012, IEEE Communications Magazine.

[9]  Viktor Mayer-Schoenberger,et al.  Useful Void: The Art of Forgetting in the Age of Ubiquitous Computing , 2007 .

[10]  Lee A. Bygrave,et al.  A right to be forgotten? , 2014, Commun. ACM.

[11]  Julie E. Cohen A Right to Read Anonymously: A Closer Look at , 1997 .

[12]  Julie E. Cohen DRM and privacy , 2003, CACM.

[13]  Louise Cooke,et al.  Controlling the net: European approaches to content and access regulation , 2007, J. Inf. Sci..

[14]  Dorothy J. Glancy At the Intersection of Visible and Invisible Worlds: United States Privacy Law and the Internet , 2000 .

[15]  S. L. Star,et al.  The Ethnography of Infrastructure , 1999 .

[16]  J. Peha The Benefits and Risks of Mandating Network Neutrality, and the Quest for a Balanced Policy , 2006 .

[17]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[18]  Jenny Fry,et al.  Engaging Privacy and Information Technology in a Digital Age , 2008 .

[19]  Michael L. Best,et al.  Democratic and Anti-Democratic Regulators of the Internet: A Framework , 2007, Inf. Soc..

[20]  Danielle Keats Citron Civil Rights in Our Information Age , 2012 .

[21]  Su Li,et al.  Mobile Phones and Privacy , 2012 .

[22]  V. Caron,et al.  United states. , 2018, Nursing standard (Royal College of Nursing (Great Britain) : 1987).

[23]  Laura DeNardis,et al.  HIDDEN LEVERS OF INTERNET CONTROL , 2012 .

[24]  Neil M. Richards The Perils of Social Reading , 2012 .

[25]  Alice E. Marwick,et al.  Social Privacy in Networked Publics: Teens’ Attitudes, Practices, and Strategies , 2011 .

[26]  Lawrence Lessig,et al.  Code - version 2.0 , 2006 .