Privacy in Content-Oriented Networking: Threats and Countermeasures
Identifieur interne : 000843 ( PascalFrancis/Corpus ); précédent : 000842; suivant : 000844Privacy in Content-Oriented Networking: Threats and Countermeasures
Auteurs : Abdelberi Chaabane ; Emiliano De Cristofaro ; MOHAMED ALI KAAFAR ; Ersin UzunSource :
- Computer communication review [ 0146-4833 ] ; 2013.
Descripteurs français
- Pascal (Inist)
English descriptors
- KwdEn :
Abstract
As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modem systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at the data level. However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges. In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. Finally, we present a comparison between CON and today's Internet in the context of a few privacy concepts, such as, anonymity, censoring, traceability, and confidentiality.
Notice en format standard (ISO 2709)
Pour connaître la documentation sur le format Inist Standard.
pA |
|
---|
Format Inist (serveur)
NO : | PASCAL 13-0295001 INIST |
---|---|
ET : | Privacy in Content-Oriented Networking: Threats and Countermeasures |
AU : | CHAABANE (Abdelberi); DE CRISTOFARO (Emiliano); MOHAMED ALI KAAFAR; UZUN (Ersin) |
AF : | INRIA Rhone-Alpes/France (1 aut., 3 aut.); PARC/Palo Alto, CA/Etats-Unis (2 aut., 4 aut.); NICTA/Australie (3 aut.) |
DT : | Publication en série; Niveau analytique |
SO : | Computer communication review; ISSN 0146-4833; Etats-Unis; Da. 2013; Vol. 43; No. 3; Pp. 26-33; Bibl. 54 ref. |
LA : | Anglais |
EA : | As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modem systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at the data level. However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges. In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. Finally, we present a comparison between CON and today's Internet in the context of a few privacy concepts, such as, anonymity, censoring, traceability, and confidentiality. |
CC : | 001D02B04; 001D02B07C |
FD : | Vie privée; Internet; Extensibilité; Mobilité; Sécurité informatique; Antémémoire; Gestion mémoire; Confidentialité; Architecture réseau; Dénomination; Analyse risque; Anonymat; Niveau; Censure; Traçabilité; . |
ED : | Private life; Internet; Scalability; Mobility; Computer security; Cache memory; Storage management; Confidentiality; Network architecture; Naming; Risk analysis; Anonymity; Level; Censorship; Traceability |
SD : | Vida privada; Internet; Estensibilidad; Movilidad; Seguridad informatica; Antememoria; Gestión memoria; Confidencialidad; Arquitectura red; Denominación; Análisis riesgo; Anonimato; Nivel; Censura; Rastreabilidad |
LO : | INIST-28172.354000503896500030 |
ID : | 13-0295001 |
Links to Exploration step
Pascal:13-0295001Le document en format XML
<record><TEI><teiHeader><fileDesc><titleStmt><title xml:lang="en" level="a">Privacy in Content-Oriented Networking: Threats and Countermeasures</title>
<author><name sortKey="Chaabane, Abdelberi" sort="Chaabane, Abdelberi" uniqKey="Chaabane A" first="Abdelberi" last="Chaabane">Abdelberi Chaabane</name>
<affiliation><inist:fA14 i1="01"><s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="De Cristofaro, Emiliano" sort="De Cristofaro, Emiliano" uniqKey="De Cristofaro E" first="Emiliano" last="De Cristofaro">Emiliano De Cristofaro</name>
<affiliation><inist:fA14 i1="02"><s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Mohamed Ali Kaafar" sort="Mohamed Ali Kaafar" uniqKey="Mohamed Ali Kaafar" last="Mohamed Ali Kaafar">MOHAMED ALI KAAFAR</name>
<affiliation><inist:fA14 i1="01"><s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation><inist:fA14 i1="03"><s1>NICTA</s1>
<s3>AUS</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Uzun, Ersin" sort="Uzun, Ersin" uniqKey="Uzun E" first="Ersin" last="Uzun">Ersin Uzun</name>
<affiliation><inist:fA14 i1="02"><s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">INIST</idno>
<idno type="inist">13-0295001</idno>
<date when="2013">2013</date>
<idno type="stanalyst">PASCAL 13-0295001 INIST</idno>
<idno type="RBID">Pascal:13-0295001</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000843</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title xml:lang="en" level="a">Privacy in Content-Oriented Networking: Threats and Countermeasures</title>
<author><name sortKey="Chaabane, Abdelberi" sort="Chaabane, Abdelberi" uniqKey="Chaabane A" first="Abdelberi" last="Chaabane">Abdelberi Chaabane</name>
<affiliation><inist:fA14 i1="01"><s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="De Cristofaro, Emiliano" sort="De Cristofaro, Emiliano" uniqKey="De Cristofaro E" first="Emiliano" last="De Cristofaro">Emiliano De Cristofaro</name>
<affiliation><inist:fA14 i1="02"><s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Mohamed Ali Kaafar" sort="Mohamed Ali Kaafar" uniqKey="Mohamed Ali Kaafar" last="Mohamed Ali Kaafar">MOHAMED ALI KAAFAR</name>
<affiliation><inist:fA14 i1="01"><s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation><inist:fA14 i1="03"><s1>NICTA</s1>
<s3>AUS</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Uzun, Ersin" sort="Uzun, Ersin" uniqKey="Uzun E" first="Ersin" last="Uzun">Ersin Uzun</name>
<affiliation><inist:fA14 i1="02"><s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</analytic>
<series><title level="j" type="main">Computer communication review</title>
<title level="j" type="abbreviated">Comput. commun. rev.</title>
<idno type="ISSN">0146-4833</idno>
<imprint><date when="2013">2013</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><title level="j" type="main">Computer communication review</title>
<title level="j" type="abbreviated">Comput. commun. rev.</title>
<idno type="ISSN">0146-4833</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass><keywords scheme="KwdEn" xml:lang="en"><term>Anonymity</term>
<term>Cache memory</term>
<term>Censorship</term>
<term>Computer security</term>
<term>Confidentiality</term>
<term>Internet</term>
<term>Level</term>
<term>Mobility</term>
<term>Naming</term>
<term>Network architecture</term>
<term>Private life</term>
<term>Risk analysis</term>
<term>Scalability</term>
<term>Storage management</term>
<term>Traceability</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr"><term>Vie privée</term>
<term>Internet</term>
<term>Extensibilité</term>
<term>Mobilité</term>
<term>Sécurité informatique</term>
<term>Antémémoire</term>
<term>Gestion mémoire</term>
<term>Confidentialité</term>
<term>Architecture réseau</term>
<term>Dénomination</term>
<term>Analyse risque</term>
<term>Anonymat</term>
<term>Niveau</term>
<term>Censure</term>
<term>Traçabilité</term>
<term>.</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modem systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at the data level. However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges. In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. Finally, we present a comparison between CON and today's Internet in the context of a few privacy concepts, such as, anonymity, censoring, traceability, and confidentiality.</div>
</front>
</TEI>
<inist><standard h6="B"><pA><fA01 i1="01" i2="1"><s0>0146-4833</s0>
</fA01>
<fA03 i2="1"><s0>Comput. commun. rev.</s0>
</fA03>
<fA05><s2>43</s2>
</fA05>
<fA06><s2>3</s2>
</fA06>
<fA08 i1="01" i2="1" l="ENG"><s1>Privacy in Content-Oriented Networking: Threats and Countermeasures</s1>
</fA08>
<fA11 i1="01" i2="1"><s1>CHAABANE (Abdelberi)</s1>
</fA11>
<fA11 i1="02" i2="1"><s1>DE CRISTOFARO (Emiliano)</s1>
</fA11>
<fA11 i1="03" i2="1"><s1>MOHAMED ALI KAAFAR</s1>
</fA11>
<fA11 i1="04" i2="1"><s1>UZUN (Ersin)</s1>
</fA11>
<fA14 i1="01"><s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</fA14>
<fA14 i1="02"><s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</fA14>
<fA14 i1="03"><s1>NICTA</s1>
<s3>AUS</s3>
<sZ>3 aut.</sZ>
</fA14>
<fA20><s1>26-33</s1>
</fA20>
<fA21><s1>2013</s1>
</fA21>
<fA23 i1="01"><s0>ENG</s0>
</fA23>
<fA43 i1="01"><s1>INIST</s1>
<s2>28172</s2>
<s5>354000503896500030</s5>
</fA43>
<fA44><s0>0000</s0>
<s1>© 2013 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45><s0>54 ref.</s0>
</fA45>
<fA47 i1="01" i2="1"><s0>13-0295001</s0>
</fA47>
<fA60><s1>P</s1>
</fA60>
<fA61><s0>A</s0>
</fA61>
<fA64 i1="01" i2="1"><s0>Computer communication review</s0>
</fA64>
<fA66 i1="01"><s0>USA</s0>
</fA66>
<fC01 i1="01" l="ENG"><s0>As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modem systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at the data level. However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges. In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. Finally, we present a comparison between CON and today's Internet in the context of a few privacy concepts, such as, anonymity, censoring, traceability, and confidentiality.</s0>
</fC01>
<fC02 i1="01" i2="X"><s0>001D02B04</s0>
</fC02>
<fC02 i1="02" i2="X"><s0>001D02B07C</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE"><s0>Vie privée</s0>
<s5>06</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG"><s0>Private life</s0>
<s5>06</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA"><s0>Vida privada</s0>
<s5>06</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE"><s0>Internet</s0>
<s5>07</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG"><s0>Internet</s0>
<s5>07</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA"><s0>Internet</s0>
<s5>07</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE"><s0>Extensibilité</s0>
<s5>08</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG"><s0>Scalability</s0>
<s5>08</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA"><s0>Estensibilidad</s0>
<s5>08</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE"><s0>Mobilité</s0>
<s5>09</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG"><s0>Mobility</s0>
<s5>09</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA"><s0>Movilidad</s0>
<s5>09</s5>
</fC03>
<fC03 i1="05" i2="X" l="FRE"><s0>Sécurité informatique</s0>
<s5>10</s5>
</fC03>
<fC03 i1="05" i2="X" l="ENG"><s0>Computer security</s0>
<s5>10</s5>
</fC03>
<fC03 i1="05" i2="X" l="SPA"><s0>Seguridad informatica</s0>
<s5>10</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE"><s0>Antémémoire</s0>
<s5>11</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG"><s0>Cache memory</s0>
<s5>11</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA"><s0>Antememoria</s0>
<s5>11</s5>
</fC03>
<fC03 i1="07" i2="X" l="FRE"><s0>Gestion mémoire</s0>
<s5>12</s5>
</fC03>
<fC03 i1="07" i2="X" l="ENG"><s0>Storage management</s0>
<s5>12</s5>
</fC03>
<fC03 i1="07" i2="X" l="SPA"><s0>Gestión memoria</s0>
<s5>12</s5>
</fC03>
<fC03 i1="08" i2="X" l="FRE"><s0>Confidentialité</s0>
<s5>18</s5>
</fC03>
<fC03 i1="08" i2="X" l="ENG"><s0>Confidentiality</s0>
<s5>18</s5>
</fC03>
<fC03 i1="08" i2="X" l="SPA"><s0>Confidencialidad</s0>
<s5>18</s5>
</fC03>
<fC03 i1="09" i2="X" l="FRE"><s0>Architecture réseau</s0>
<s5>19</s5>
</fC03>
<fC03 i1="09" i2="X" l="ENG"><s0>Network architecture</s0>
<s5>19</s5>
</fC03>
<fC03 i1="09" i2="X" l="SPA"><s0>Arquitectura red</s0>
<s5>19</s5>
</fC03>
<fC03 i1="10" i2="X" l="FRE"><s0>Dénomination</s0>
<s5>20</s5>
</fC03>
<fC03 i1="10" i2="X" l="ENG"><s0>Naming</s0>
<s5>20</s5>
</fC03>
<fC03 i1="10" i2="X" l="SPA"><s0>Denominación</s0>
<s5>20</s5>
</fC03>
<fC03 i1="11" i2="X" l="FRE"><s0>Analyse risque</s0>
<s5>21</s5>
</fC03>
<fC03 i1="11" i2="X" l="ENG"><s0>Risk analysis</s0>
<s5>21</s5>
</fC03>
<fC03 i1="11" i2="X" l="SPA"><s0>Análisis riesgo</s0>
<s5>21</s5>
</fC03>
<fC03 i1="12" i2="X" l="FRE"><s0>Anonymat</s0>
<s5>22</s5>
</fC03>
<fC03 i1="12" i2="X" l="ENG"><s0>Anonymity</s0>
<s5>22</s5>
</fC03>
<fC03 i1="12" i2="X" l="SPA"><s0>Anonimato</s0>
<s5>22</s5>
</fC03>
<fC03 i1="13" i2="X" l="FRE"><s0>Niveau</s0>
<s5>23</s5>
</fC03>
<fC03 i1="13" i2="X" l="ENG"><s0>Level</s0>
<s5>23</s5>
</fC03>
<fC03 i1="13" i2="X" l="SPA"><s0>Nivel</s0>
<s5>23</s5>
</fC03>
<fC03 i1="14" i2="X" l="FRE"><s0>Censure</s0>
<s5>24</s5>
</fC03>
<fC03 i1="14" i2="X" l="ENG"><s0>Censorship</s0>
<s5>24</s5>
</fC03>
<fC03 i1="14" i2="X" l="SPA"><s0>Censura</s0>
<s5>24</s5>
</fC03>
<fC03 i1="15" i2="X" l="FRE"><s0>Traçabilité</s0>
<s5>25</s5>
</fC03>
<fC03 i1="15" i2="X" l="ENG"><s0>Traceability</s0>
<s5>25</s5>
</fC03>
<fC03 i1="15" i2="X" l="SPA"><s0>Rastreabilidad</s0>
<s5>25</s5>
</fC03>
<fC03 i1="16" i2="X" l="FRE"><s0>.</s0>
<s4>INC</s4>
<s5>82</s5>
</fC03>
<fN21><s1>280</s1>
</fN21>
<fN44 i1="01"><s1>OTO</s1>
</fN44>
<fN82><s1>OTO</s1>
</fN82>
</pA>
</standard>
<server><NO>PASCAL 13-0295001 INIST</NO>
<ET>Privacy in Content-Oriented Networking: Threats and Countermeasures</ET>
<AU>CHAABANE (Abdelberi); DE CRISTOFARO (Emiliano); MOHAMED ALI KAAFAR; UZUN (Ersin)</AU>
<AF>INRIA Rhone-Alpes/France (1 aut., 3 aut.); PARC/Palo Alto, CA/Etats-Unis (2 aut., 4 aut.); NICTA/Australie (3 aut.)</AF>
<DT>Publication en série; Niveau analytique</DT>
<SO>Computer communication review; ISSN 0146-4833; Etats-Unis; Da. 2013; Vol. 43; No. 3; Pp. 26-33; Bibl. 54 ref.</SO>
<LA>Anglais</LA>
<EA>As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modem systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at the data level. However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges. In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. Finally, we present a comparison between CON and today's Internet in the context of a few privacy concepts, such as, anonymity, censoring, traceability, and confidentiality.</EA>
<CC>001D02B04; 001D02B07C</CC>
<FD>Vie privée; Internet; Extensibilité; Mobilité; Sécurité informatique; Antémémoire; Gestion mémoire; Confidentialité; Architecture réseau; Dénomination; Analyse risque; Anonymat; Niveau; Censure; Traçabilité; .</FD>
<ED>Private life; Internet; Scalability; Mobility; Computer security; Cache memory; Storage management; Confidentiality; Network architecture; Naming; Risk analysis; Anonymity; Level; Censorship; Traceability</ED>
<SD>Vida privada; Internet; Estensibilidad; Movilidad; Seguridad informatica; Antememoria; Gestión memoria; Confidencialidad; Arquitectura red; Denominación; Análisis riesgo; Anonimato; Nivel; Censura; Rastreabilidad</SD>
<LO>INIST-28172.354000503896500030</LO>
<ID>13-0295001</ID>
</server>
</inist>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Asie/explor/AustralieFrV1/Data/PascalFrancis/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000843 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Corpus/biblio.hfd -nk 000843 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Asie |area= AustralieFrV1 |flux= PascalFrancis |étape= Corpus |type= RBID |clé= Pascal:13-0295001 |texte= Privacy in Content-Oriented Networking: Threats and Countermeasures }}
This area was generated with Dilib version V0.6.33. |