Method and device for protecting user behavior privacy in content-centric network

A content-centric network and content technology, applied in the field of network communication, can solve problems such as large changes, difficult routing calculations, and privacy leaks, and achieve the effects of reducing burdens, increasing time uncertainty, and protecting behavioral privacy

Inactive Publication Date: 2020-05-12
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF16 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the recent access mechanism, the attacker can request the target content multiple times and find the delay phenomenon, then it can be speculated that other users have also requested the target content before the request, and then learn the communication traces of neighboring users on sensitive content, and privacy Leakage; for the random fallback mechanism, because the content needs to be moved backwards from the storage location in turn during random fallback, the change is too large, and the calculation of the route is too difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting user behavior privacy in content-centric network
  • Method and device for protecting user behavior privacy in content-centric network
  • Method and device for protecting user behavior privacy in content-centric network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0024] figure 1 A schematic diagram of a method for protecting user behavior privacy in a content-centric network provided by an embodiment of the present invention, as shown in figure 1 As shown, the embodiment of the present invention provides a method for protecting user behavior privacy in a content-centric network, the execution subje...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a method and device for protecting user behavior privacy in a content-centric network. The method includes: determining the number of content fragments according to the content privacy level and content popularity of the target data content, and the node betweenness; The number of content fragments, store the target data content in fragments; obtain the user's data request information, reorganize the fragmented data, and send a copy of the reorganized target data content to the user terminal. The method and device for protecting user behavior privacy in the content-centric network provided by the embodiments of the present invention classify the privacy levels of data content, and implement fragmented storage and reorganization, on the one hand, reduce the burden of non-private content on the network and routers, and ensure The advantage of CCN distribution efficiency, on the other hand, increases time uncertainty through fragmented storage and reorganization, resists time attacks, prevents attackers from judging the preferences of adjacent users from round-trip time, and protects user behavior privacy.

Description

technical field [0001] Embodiments of the present invention relate to the field of network communication technologies, and in particular, to a method and device for protecting user behavior privacy in a content-centric network. Background technique [0002] With the rapid development of the Internet and the continuous growth of the number of users, the pressure of data traffic distribution on the traditional IP Internet is becoming more and more serious, and many problems have been exposed. These problems make it difficult for the traditional IP Internet architecture to continue to support such a huge data traffic distribution, and cannot effectively meet the communication needs of current users. In order to solve many problems in the traditional IP Internet, people are sparing no effort to study the Internet architecture that is more suitable for the current situation, the most representative of which is Content-Centric Networking (CCN). [0003] CCN is a communication net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06G06F21/62
CPCH04L63/20H04L67/1097G06F21/6218H04L67/568
Inventor 刘银龙李婷张杭生梁杰
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products