Multi-layer encryption privacy protection method used for content-centric networking

A content-centric network and multi-layer encryption technology, which is applied to the public key and key distribution of secure communication, can solve the problems of maintaining a large amount, the publisher's privacy is easy to leak, and the content data packet encryption protection, etc., to achieve the effect of protecting privacy

Inactive Publication Date: 2016-12-21
GUANGDONG UNIV OF TECH
View PDF5 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

2) In the content privacy leak, each data packet has the signature of the publisher to ensure that the requester can confirm that the returned data is the data requested by him, but the name of the content data packet is not

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-layer encryption privacy protection method used for content-centric networking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] See figure 1 , first give the meanings of the symbols involved in the method described in this embodiment: the set of routers is AR set ;Router area AR 1 、AR 2 The public / private key pair is (puk1|pri1), (puk2|pri2); the content publisher’s public / private key pair is (puk1│pri1); the requester’s public / private key pair is (puk_r|pri_r) ; Data is an encrypted data packet for verifying that the requester is a credible requester; LastTime is an embedded iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-layer encryption privacy protection method used for content-centric networking. The multi-layer encryption privacy protection method comprises the steps that: a requester sends an interest package used for creditability validation to a publisher of content, and the publisher responds to the requestor; the requestor sequentially uses a publisher public key and a router public key for encrypting the requested interest packet, and sends the requested interest packet to a router; the router decrypts the requested interest packet by using a private key to obtain information it needs, and then forwards the requested interest packet to the next-layer router until the requested interest packet is sent to the publisher; the publisher decrypts the requested interest packet by using a publisher private key, validates the creditability of the requester, responds to the requested interest packet when the validation passes, and sends data to the router; and the router decrypts a data packet by using a private key to obtain response data, and forwards the response data to the next-level router until the response data is forwarded to the requester. The multi-layer encryption privacy protection method adopts the public keys for encryption, is relatively high in security, and can protect the privacy of the requestor and the publisher to a greater extent.

Description

technical field [0001] The invention relates to the field of content CITIC network research, in particular to a multi-layer encryption privacy protection method for content-centric networks. Background technique [0002] With the rapid development of the Internet, the traditional IP network architecture has exposed many disadvantages, and it has been difficult to meet the development requirements of the current Internet. In order to adapt to the development of the times, since 2006, academic circles at home and abroad have carried out research on new network architectures, including the data-oriented network architecture (DONA, data-oriented network architecture) (KOPONEN T , CHAWLA M, GON C B, et al.A data-oriented(and beyond) network architecture[A].Proceedings of the ACM SIGCOMM2007Conference[C].Kyoto,Japan,2007.181-192.), Palo Alto Research Center Center network (CCN, content-centric networking) (European Union.Project FP7 4WARD[EB / OL].http: / / www.4wardproject.eu,2010), ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/30H04L9/32H04L29/06
Inventor 柳毅白雪峰凌捷
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products