About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Communications and Networking. 18th EAI International Conference, ChinaCom 2023, Sanya, China, November 18–19, 2023, Proceedings

Research Article

A Dummy Query-Based User Privacy Protection Scheme in Named Data Networking

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-67162-3_11,
        author={Jie Duan and Wenyu Tang and Chunxia Sun and Zihao Yan and Weidan Cheng and Chaojiang Li},
        title={A Dummy Query-Based User Privacy Protection Scheme in Named Data Networking},
        proceedings={Communications and Networking. 18th EAI International Conference, ChinaCom 2023, Sanya, China, November 18--19, 2023, Proceedings},
        proceedings_a={CHINACOM},
        year={2024},
        month={8},
        keywords={Named Data Networking User privacy Privacy protection Dummy queries},
        doi={10.1007/978-3-031-67162-3_11}
    }
    
  • Jie Duan
    Wenyu Tang
    Chunxia Sun
    Zihao Yan
    Weidan Cheng
    Chaojiang Li
    Year: 2024
    A Dummy Query-Based User Privacy Protection Scheme in Named Data Networking
    CHINACOM
    Springer
    DOI: 10.1007/978-3-031-67162-3_11
Jie Duan1,*, Wenyu Tang1, Chunxia Sun1, Zihao Yan1, Weidan Cheng1, Chaojiang Li1
  • 1: School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications
*Contact email: duanjie@cqupt.edu.cn

Abstract

Named Data Networking (NDN) can distribute content efficiently due to its characteristics of content naming and in-network caching, but these characteristics also raise privacy concerns. However, the existing NDN privacy protection schemes cannot protect user’s privacy completely because they neglect the correlation among NDN contents, content names and content caches. To solve this problem, this paper proposes a dummy query-based privacy protection scheme. Firstly, a similarity-based privacy metric applicable to NDN is formulated to measure the dispersion between queries, and the constraints of attacker’s background knowledge in NDN, communication overhead and NDN characteristics are established. Based on the above indicators, the two-step dummy query set selection algorithms are proposed to construct dummy query set. The algorithms select the dummies that satisfy the constraint on NDN distribution. From the selected dummies, the algorithms then filter out dummies that can be identified by taking account of decentralization, anonymity and communication overheads. Security analysis shows that our privacy protection scheme can effectively resist attacks against the user privacy in NDN. Furthermore, experimental results indicate that the proposal greatly improves user privacy compared with the existing schemes.

Keywords
Named Data Networking User privacy Privacy protection Dummy queries
Published
2024-08-06
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-67162-3_11
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL