Content centric network privacy protection method based on hybrid encryption and anonymous group

A technology of content-centric network and privacy protection, which is applied in the field of privacy protection of content-centric network based on hybrid encryption and anonymous groups, and can solve the problems of users, publishers, content privacy leakage, etc.

Active Publication Date: 2017-07-07
GUANGDONG UNIV OF TECH
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a content-centric network privacy protection method based on hybrid encryption and anonymous groups, which is used to solve the technical problem that the existing CCN system is likely to cause privacy leakage of users, publishers, and content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Content centric network privacy protection method based on hybrid encryption and anonymous group
  • Content centric network privacy protection method based on hybrid encryption and anonymous group
  • Content centric network privacy protection method based on hybrid encryption and anonymous group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The embodiment of the present invention provides a content-centric network privacy protection method based on hybrid encryption and anonymous groups, which is used to solve the technical problem that the existing CCN system easily causes privacy leakage of users, publishers, and content.

[0061] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0062] It should be noted that the meaning...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a content centric network privacy protection method based on hybrid encryption and an anonymous group. An interest packet is transmitted through the anonymous group, and decrypted into a plaintext interest packet layer by layer in a node of the anonymous group, thereby effectively preventing an attacker from getting association between the interest packet and a user. Hybrid encryption is performed on the interest packet and a data packet through encryption methods such as a user ID, a public key and a private key of a publisher, a symmetric key, and a public key and a private key of the anonymous group, so that the data packet can be protected from being modified in a process from signature to reception by the user, and plaintext content cannot be cracked inversely within certain time even though the attacker gets encrypted communication content by eavesdropping, thereby protecting the privacy of communication data. In the embodiment of the invention, the identity privacy information of a signer is protected through construction of the anonymous group, and meanwhile unlinkability between communication content and both communication parties is realized through a hybrid encryption method.

Description

technical field [0001] The invention relates to the research field of content-centric networks, in particular to a method for protecting privacy of content-centric networks based on hybrid encryption and anonymous groups. Background technique [0002] Compared with the traditional Internet, Content Centric Network (CCN) can provide storage and computing functions, and can regulate and manage content resources. A complete CCN includes users, content publishers and routing nodes. The privacy protection of CCN includes user privacy protection, content publisher privacy protection and privacy protection of content cached on routing nodes. The data communication in CCN adopts the "publish-request-response" mode, and the user obtains the data by sending the content name instead of the IP address to the source server, and no longer cares about the storage location of the data. The routing nodes in the network have the characteristics of universal caching. All passing data packets ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0421H04L63/045
Inventor 凌捷赵文龚怡柳毅谢锐
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products