Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-layer encryption privacy protection method for content-centric network

A content-centric network and multi-layer encryption technology, which is applied to the public key and key distribution of secure communication, can solve the problems of maintaining a large amount, being unable to prevent the response of illegal interest packets, and easily leaking the publisher's privacy, so as to achieve the goal of protecting privacy Effect

Inactive Publication Date: 2019-10-25
GUANGDONG UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

2) In the content privacy leak, each data packet has the signature of the publisher to ensure that the requester can confirm that the returned data is the data requested by him, but the name of the content data packet is not encrypted and protected
The disadvantage is that the requester and the router need to maintain a large number of keys, the publisher's privacy is easy to leak, and it cannot prevent illegal interest packets from being responded

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-layer encryption privacy protection method for content-centric network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0029] See figure 1 , First give the meaning of each symbol involved in the method described in this embodiment: the set of routers is AR set ; Router area AR 1 , AR 2 The public / private key pair is (puk1|pri1) and (puk2|pri2); the public / private key pair of the content publisher is (puk1│pri1); the public / private key pair of the requester is (puk_r|pri_r) ; Data is an encrypted data packet verifying that the requester is a trusted reque...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-layer encryption privacy protection method used for content-centric networking. The multi-layer encryption privacy protection method comprises the steps that: a requester sends an interest package used for creditability validation to a publisher of content, and the publisher responds to the requestor; the requestor sequentially uses a publisher public key and a router public key for encrypting the requested interest packet, and sends the requested interest packet to a router; the router decrypts the requested interest packet by using a private key to obtain information it needs, and then forwards the requested interest packet to the next-layer router until the requested interest packet is sent to the publisher; the publisher decrypts the requested interest packet by using a publisher private key, validates the creditability of the requester, responds to the requested interest packet when the validation passes, and sends data to the router; and the router decrypts a data packet by using a private key to obtain response data, and forwards the response data to the next-level router until the response data is forwarded to the requester. The multi-layer encryption privacy protection method adopts the public keys for encryption, is relatively high in security, and can protect the privacy of the requestor and the publisher to a greater extent.

Description

Technical field [0001] The present invention relates to the research field of content CITIC network, and in particular to a multi-layer encryption privacy protection method for content center network. Background technique [0002] With the rapid development of the Internet, the traditional IP network architecture has exposed many drawbacks, and it has been difficult to meet the current development requirements of the Internet. In order to adapt to the development of the times, since 2006, domestic and foreign academic circles have carried out research on new network architecture, including the data-oriented network architecture (DONA, data-oriented network architecture) proposed by UC Berkeley RAD Laboratory (KOPONEN T ,CHAWLA M,GON CB,et al.A data-oriented(and beyond)network architecture[A].Proceedings of the ACM SIGCOMM2007Conference[C].Kyoto,Japan,2007.181-192.), content proposed by Palo Alto Research Center Central Network (CCN, content-centric networking) (European Union.Pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32H04L29/06
CPCH04L9/0869H04L9/30H04L9/3247H04L63/0478H04L63/064H04L63/083
Inventor 柳毅白雪峰凌捷
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products