Serveur d'exploration sur les relations entre la France et l'Australie

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Privacy in Content-Oriented Networking: Threats and Countermeasures

Identifieur interne : 000702 ( PascalFrancis/Checkpoint ); précédent : 000701; suivant : 000703

Privacy in Content-Oriented Networking: Threats and Countermeasures

Auteurs : Abdelberi Chaabane [France] ; Emiliano De Cristofaro [États-Unis] ; MOHAMED ALI KAAFAR [France, Australie] ; Ersin Uzun [États-Unis]

Source :

RBID : Pascal:13-0295001

Descripteurs français

English descriptors

Abstract

As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modem systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at the data level. However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges. In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. Finally, we present a comparison between CON and today's Internet in the context of a few privacy concepts, such as, anonymity, censoring, traceability, and confidentiality.


Affiliations:


Links toward previous steps (curation, corpus...)


Links to Exploration step

Pascal:13-0295001

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en" level="a">Privacy in Content-Oriented Networking: Threats and Countermeasures</title>
<author>
<name sortKey="Chaabane, Abdelberi" sort="Chaabane, Abdelberi" uniqKey="Chaabane A" first="Abdelberi" last="Chaabane">Abdelberi Chaabane</name>
<affiliation wicri:level="1">
<inist:fA14 i1="01">
<s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
<country>France</country>
<wicri:noRegion>INRIA Rhone-Alpes</wicri:noRegion>
<wicri:noRegion>INRIA Rhone-Alpes</wicri:noRegion>
</affiliation>
</author>
<author>
<name sortKey="De Cristofaro, Emiliano" sort="De Cristofaro, Emiliano" uniqKey="De Cristofaro E" first="Emiliano" last="De Cristofaro">Emiliano De Cristofaro</name>
<affiliation wicri:level="1">
<inist:fA14 i1="02">
<s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
<country>États-Unis</country>
<wicri:noRegion>PARC</wicri:noRegion>
</affiliation>
</author>
<author>
<name sortKey="Mohamed Ali Kaafar" sort="Mohamed Ali Kaafar" uniqKey="Mohamed Ali Kaafar" last="Mohamed Ali Kaafar">MOHAMED ALI KAAFAR</name>
<affiliation wicri:level="1">
<inist:fA14 i1="01">
<s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
<country>France</country>
<wicri:noRegion>INRIA Rhone-Alpes</wicri:noRegion>
<wicri:noRegion>INRIA Rhone-Alpes</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<inist:fA14 i1="03">
<s1>NICTA</s1>
<s3>AUS</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
<country>Australie</country>
<wicri:noRegion>NICTA</wicri:noRegion>
</affiliation>
</author>
<author>
<name sortKey="Uzun, Ersin" sort="Uzun, Ersin" uniqKey="Uzun E" first="Ersin" last="Uzun">Ersin Uzun</name>
<affiliation wicri:level="1">
<inist:fA14 i1="02">
<s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
<country>États-Unis</country>
<wicri:noRegion>PARC</wicri:noRegion>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">INIST</idno>
<idno type="inist">13-0295001</idno>
<date when="2013">2013</date>
<idno type="stanalyst">PASCAL 13-0295001 INIST</idno>
<idno type="RBID">Pascal:13-0295001</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000843</idno>
<idno type="wicri:Area/PascalFrancis/Curation">005644</idno>
<idno type="wicri:Area/PascalFrancis/Checkpoint">000702</idno>
<idno type="wicri:explorRef" wicri:stream="PascalFrancis" wicri:step="Checkpoint">000702</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a">Privacy in Content-Oriented Networking: Threats and Countermeasures</title>
<author>
<name sortKey="Chaabane, Abdelberi" sort="Chaabane, Abdelberi" uniqKey="Chaabane A" first="Abdelberi" last="Chaabane">Abdelberi Chaabane</name>
<affiliation wicri:level="1">
<inist:fA14 i1="01">
<s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
<country>France</country>
<wicri:noRegion>INRIA Rhone-Alpes</wicri:noRegion>
<wicri:noRegion>INRIA Rhone-Alpes</wicri:noRegion>
</affiliation>
</author>
<author>
<name sortKey="De Cristofaro, Emiliano" sort="De Cristofaro, Emiliano" uniqKey="De Cristofaro E" first="Emiliano" last="De Cristofaro">Emiliano De Cristofaro</name>
<affiliation wicri:level="1">
<inist:fA14 i1="02">
<s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
<country>États-Unis</country>
<wicri:noRegion>PARC</wicri:noRegion>
</affiliation>
</author>
<author>
<name sortKey="Mohamed Ali Kaafar" sort="Mohamed Ali Kaafar" uniqKey="Mohamed Ali Kaafar" last="Mohamed Ali Kaafar">MOHAMED ALI KAAFAR</name>
<affiliation wicri:level="1">
<inist:fA14 i1="01">
<s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
<country>France</country>
<wicri:noRegion>INRIA Rhone-Alpes</wicri:noRegion>
<wicri:noRegion>INRIA Rhone-Alpes</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<inist:fA14 i1="03">
<s1>NICTA</s1>
<s3>AUS</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
<country>Australie</country>
<wicri:noRegion>NICTA</wicri:noRegion>
</affiliation>
</author>
<author>
<name sortKey="Uzun, Ersin" sort="Uzun, Ersin" uniqKey="Uzun E" first="Ersin" last="Uzun">Ersin Uzun</name>
<affiliation wicri:level="1">
<inist:fA14 i1="02">
<s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
<country>États-Unis</country>
<wicri:noRegion>PARC</wicri:noRegion>
</affiliation>
</author>
</analytic>
<series>
<title level="j" type="main">Computer communication review</title>
<title level="j" type="abbreviated">Comput. commun. rev.</title>
<idno type="ISSN">0146-4833</idno>
<imprint>
<date when="2013">2013</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<title level="j" type="main">Computer communication review</title>
<title level="j" type="abbreviated">Comput. commun. rev.</title>
<idno type="ISSN">0146-4833</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Anonymity</term>
<term>Cache memory</term>
<term>Censorship</term>
<term>Computer security</term>
<term>Confidentiality</term>
<term>Internet</term>
<term>Level</term>
<term>Mobility</term>
<term>Naming</term>
<term>Network architecture</term>
<term>Private life</term>
<term>Risk analysis</term>
<term>Scalability</term>
<term>Storage management</term>
<term>Traceability</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr">
<term>Vie privée</term>
<term>Internet</term>
<term>Extensibilité</term>
<term>Mobilité</term>
<term>Sécurité informatique</term>
<term>Antémémoire</term>
<term>Gestion mémoire</term>
<term>Confidentialité</term>
<term>Architecture réseau</term>
<term>Dénomination</term>
<term>Analyse risque</term>
<term>Anonymat</term>
<term>Niveau</term>
<term>Censure</term>
<term>Traçabilité</term>
<term>.</term>
</keywords>
<keywords scheme="Wicri" type="topic" xml:lang="fr">
<term>Confidentialité</term>
<term>Censure</term>
<term>Traçabilité</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modem systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at the data level. However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges. In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. Finally, we present a comparison between CON and today's Internet in the context of a few privacy concepts, such as, anonymity, censoring, traceability, and confidentiality.</div>
</front>
</TEI>
<inist>
<standard h6="B">
<pA>
<fA01 i1="01" i2="1">
<s0>0146-4833</s0>
</fA01>
<fA03 i2="1">
<s0>Comput. commun. rev.</s0>
</fA03>
<fA05>
<s2>43</s2>
</fA05>
<fA06>
<s2>3</s2>
</fA06>
<fA08 i1="01" i2="1" l="ENG">
<s1>Privacy in Content-Oriented Networking: Threats and Countermeasures</s1>
</fA08>
<fA11 i1="01" i2="1">
<s1>CHAABANE (Abdelberi)</s1>
</fA11>
<fA11 i1="02" i2="1">
<s1>DE CRISTOFARO (Emiliano)</s1>
</fA11>
<fA11 i1="03" i2="1">
<s1>MOHAMED ALI KAAFAR</s1>
</fA11>
<fA11 i1="04" i2="1">
<s1>UZUN (Ersin)</s1>
</fA11>
<fA14 i1="01">
<s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</fA14>
<fA14 i1="02">
<s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</fA14>
<fA14 i1="03">
<s1>NICTA</s1>
<s3>AUS</s3>
<sZ>3 aut.</sZ>
</fA14>
<fA20>
<s1>26-33</s1>
</fA20>
<fA21>
<s1>2013</s1>
</fA21>
<fA23 i1="01">
<s0>ENG</s0>
</fA23>
<fA43 i1="01">
<s1>INIST</s1>
<s2>28172</s2>
<s5>354000503896500030</s5>
</fA43>
<fA44>
<s0>0000</s0>
<s1>© 2013 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45>
<s0>54 ref.</s0>
</fA45>
<fA47 i1="01" i2="1">
<s0>13-0295001</s0>
</fA47>
<fA60>
<s1>P</s1>
</fA60>
<fA61>
<s0>A</s0>
</fA61>
<fA64 i1="01" i2="1">
<s0>Computer communication review</s0>
</fA64>
<fA66 i1="01">
<s0>USA</s0>
</fA66>
<fC01 i1="01" l="ENG">
<s0>As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modem systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at the data level. However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges. In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. Finally, we present a comparison between CON and today's Internet in the context of a few privacy concepts, such as, anonymity, censoring, traceability, and confidentiality.</s0>
</fC01>
<fC02 i1="01" i2="X">
<s0>001D02B04</s0>
</fC02>
<fC02 i1="02" i2="X">
<s0>001D02B07C</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE">
<s0>Vie privée</s0>
<s5>06</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG">
<s0>Private life</s0>
<s5>06</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA">
<s0>Vida privada</s0>
<s5>06</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE">
<s0>Internet</s0>
<s5>07</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG">
<s0>Internet</s0>
<s5>07</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA">
<s0>Internet</s0>
<s5>07</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE">
<s0>Extensibilité</s0>
<s5>08</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG">
<s0>Scalability</s0>
<s5>08</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA">
<s0>Estensibilidad</s0>
<s5>08</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE">
<s0>Mobilité</s0>
<s5>09</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG">
<s0>Mobility</s0>
<s5>09</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA">
<s0>Movilidad</s0>
<s5>09</s5>
</fC03>
<fC03 i1="05" i2="X" l="FRE">
<s0>Sécurité informatique</s0>
<s5>10</s5>
</fC03>
<fC03 i1="05" i2="X" l="ENG">
<s0>Computer security</s0>
<s5>10</s5>
</fC03>
<fC03 i1="05" i2="X" l="SPA">
<s0>Seguridad informatica</s0>
<s5>10</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE">
<s0>Antémémoire</s0>
<s5>11</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG">
<s0>Cache memory</s0>
<s5>11</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA">
<s0>Antememoria</s0>
<s5>11</s5>
</fC03>
<fC03 i1="07" i2="X" l="FRE">
<s0>Gestion mémoire</s0>
<s5>12</s5>
</fC03>
<fC03 i1="07" i2="X" l="ENG">
<s0>Storage management</s0>
<s5>12</s5>
</fC03>
<fC03 i1="07" i2="X" l="SPA">
<s0>Gestión memoria</s0>
<s5>12</s5>
</fC03>
<fC03 i1="08" i2="X" l="FRE">
<s0>Confidentialité</s0>
<s5>18</s5>
</fC03>
<fC03 i1="08" i2="X" l="ENG">
<s0>Confidentiality</s0>
<s5>18</s5>
</fC03>
<fC03 i1="08" i2="X" l="SPA">
<s0>Confidencialidad</s0>
<s5>18</s5>
</fC03>
<fC03 i1="09" i2="X" l="FRE">
<s0>Architecture réseau</s0>
<s5>19</s5>
</fC03>
<fC03 i1="09" i2="X" l="ENG">
<s0>Network architecture</s0>
<s5>19</s5>
</fC03>
<fC03 i1="09" i2="X" l="SPA">
<s0>Arquitectura red</s0>
<s5>19</s5>
</fC03>
<fC03 i1="10" i2="X" l="FRE">
<s0>Dénomination</s0>
<s5>20</s5>
</fC03>
<fC03 i1="10" i2="X" l="ENG">
<s0>Naming</s0>
<s5>20</s5>
</fC03>
<fC03 i1="10" i2="X" l="SPA">
<s0>Denominación</s0>
<s5>20</s5>
</fC03>
<fC03 i1="11" i2="X" l="FRE">
<s0>Analyse risque</s0>
<s5>21</s5>
</fC03>
<fC03 i1="11" i2="X" l="ENG">
<s0>Risk analysis</s0>
<s5>21</s5>
</fC03>
<fC03 i1="11" i2="X" l="SPA">
<s0>Análisis riesgo</s0>
<s5>21</s5>
</fC03>
<fC03 i1="12" i2="X" l="FRE">
<s0>Anonymat</s0>
<s5>22</s5>
</fC03>
<fC03 i1="12" i2="X" l="ENG">
<s0>Anonymity</s0>
<s5>22</s5>
</fC03>
<fC03 i1="12" i2="X" l="SPA">
<s0>Anonimato</s0>
<s5>22</s5>
</fC03>
<fC03 i1="13" i2="X" l="FRE">
<s0>Niveau</s0>
<s5>23</s5>
</fC03>
<fC03 i1="13" i2="X" l="ENG">
<s0>Level</s0>
<s5>23</s5>
</fC03>
<fC03 i1="13" i2="X" l="SPA">
<s0>Nivel</s0>
<s5>23</s5>
</fC03>
<fC03 i1="14" i2="X" l="FRE">
<s0>Censure</s0>
<s5>24</s5>
</fC03>
<fC03 i1="14" i2="X" l="ENG">
<s0>Censorship</s0>
<s5>24</s5>
</fC03>
<fC03 i1="14" i2="X" l="SPA">
<s0>Censura</s0>
<s5>24</s5>
</fC03>
<fC03 i1="15" i2="X" l="FRE">
<s0>Traçabilité</s0>
<s5>25</s5>
</fC03>
<fC03 i1="15" i2="X" l="ENG">
<s0>Traceability</s0>
<s5>25</s5>
</fC03>
<fC03 i1="15" i2="X" l="SPA">
<s0>Rastreabilidad</s0>
<s5>25</s5>
</fC03>
<fC03 i1="16" i2="X" l="FRE">
<s0>.</s0>
<s4>INC</s4>
<s5>82</s5>
</fC03>
<fN21>
<s1>280</s1>
</fN21>
<fN44 i1="01">
<s1>OTO</s1>
</fN44>
<fN82>
<s1>OTO</s1>
</fN82>
</pA>
</standard>
</inist>
<affiliations>
<list>
<country>
<li>Australie</li>
<li>France</li>
<li>États-Unis</li>
</country>
</list>
<tree>
<country name="France">
<noRegion>
<name sortKey="Chaabane, Abdelberi" sort="Chaabane, Abdelberi" uniqKey="Chaabane A" first="Abdelberi" last="Chaabane">Abdelberi Chaabane</name>
</noRegion>
<name sortKey="Mohamed Ali Kaafar" sort="Mohamed Ali Kaafar" uniqKey="Mohamed Ali Kaafar" last="Mohamed Ali Kaafar">MOHAMED ALI KAAFAR</name>
</country>
<country name="États-Unis">
<noRegion>
<name sortKey="De Cristofaro, Emiliano" sort="De Cristofaro, Emiliano" uniqKey="De Cristofaro E" first="Emiliano" last="De Cristofaro">Emiliano De Cristofaro</name>
</noRegion>
<name sortKey="Uzun, Ersin" sort="Uzun, Ersin" uniqKey="Uzun E" first="Ersin" last="Uzun">Ersin Uzun</name>
</country>
<country name="Australie">
<noRegion>
<name sortKey="Mohamed Ali Kaafar" sort="Mohamed Ali Kaafar" uniqKey="Mohamed Ali Kaafar" last="Mohamed Ali Kaafar">MOHAMED ALI KAAFAR</name>
</noRegion>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Asie/explor/AustralieFrV1/Data/PascalFrancis/Checkpoint
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000702 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Checkpoint/biblio.hfd -nk 000702 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Asie
   |area=    AustralieFrV1
   |flux=    PascalFrancis
   |étape=   Checkpoint
   |type=    RBID
   |clé=     Pascal:13-0295001
   |texte=   Privacy in Content-Oriented Networking: Threats and Countermeasures
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Tue Dec 5 10:43:12 2017. Site generation: Tue Mar 5 14:07:20 2024