Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection method, system and key transmission method for named data network

A named data network, privacy protection technology, applied in the field of system and key transmission, privacy protection, can solve the problems of ambiguity, high bit error rate, unfriendliness, etc., to improve satisfaction, strengthen security, and increase security. Effect

Active Publication Date: 2022-06-21
BEIJING UNIV OF POSTS & TELECOMM
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are literatures (Massawe,E.A.,Du,S.,\&Zhu,H.(2013,July).A scalable and privacy-preserving named data networking architecture based on Bloom filters.In 2013IEEE 33rd International Conference on Distributed Computing Systems Workshops(pp.22 -26).IEEE) proposes to use the Bloom filter to convert the name to the Bloom filter to achieve a blurred effect. However, the size of the Bloom filter needs to be set in advance, otherwise it will cause a bit error rate high disadvantage
There are documents (Jiang X, Huang Q. Efficiently Preserving the Privacy of the Semantic Routing in Named Data Network[C] / / IEEE, Intl Confon Ubiquitous Intelligence and Computing and 2015IEEE, Intl Conf on Autonomic and Trusted Computing and 2015IEEE, Intl Conf on Scalable Computing andCommunications and ITS Associated Workshops.IEEE Computer Society,2015:686-689) proposed to use the integer group to convert the naming to the integer group. However, the theoretical safety limit of this method is that a prime number of at least 1024 bits is required, which is for some Devices with limited resources are not friendly, see some related papers on IEEE (Akyildiz I F, Su W, Sankarasubramaniam Y, et al.A survey on sensor networks[J].IEEE Communications magazine,2002,40(8):102 -114)
In addition, there are some researches in academia on solutions to the security problems of the content value of data packets in named data networks, but none of them consider the security problems of naming
[0005] In addition, in the previous literature, researchers paid more attention to the problem of how to encrypt the data content value, but seldom considered how to reasonably distribute the encrypted key to the legal data requester.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method, system and key transmission method for named data network
  • Privacy protection method, system and key transmission method for named data network
  • Privacy protection method, system and key transmission method for named data network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] image 3 A flowchart of a privacy-preserving method for named data networks, such as image 3 As shown, the privacy protection method for a named data network in this embodiment is applied to a data requester, and the method includes the following steps:

[0066] S101: Send an interest packet naming request carrying the original name m;

[0067] Specifically, since the named data network is a receiver-driven model, the data requester, as the receiver of the data, is the initiator of the communication. When the data requester needs to request the interest package name of the present invention, it needs to request the interest package name from the server. In the process of requesting the interest package name, the data requester needs to send the original name m of the interest package to the server. The original name m can be a string of indeterminate length. When the server receives the interest package name request information, the server identifies the data request...

Embodiment 2

[0084] Image 6 A flowchart of a privacy-preserving method for named data networks, such as Image 6 As shown, the privacy protection method for a named data network in this embodiment is applied to a router, and the method includes the following steps:

[0085] S201: Obtain the mapping F of the original name m on the elliptic curve, wherein the base point on the elliptic curve is represented as P;

[0086] In this embodiment, similar to the first embodiment, the mapping F can be obtained from the data production end. The data production end stores all the mappings F corresponding to the original name m on the elliptic curve. All original names m and their mappings F on the elliptic curve can also be stored locally on the server. Of course, the mapping F of the original name m on the elliptic curve can also be obtained through calculation every time. For the specific acquisition process, please refer to Figure 4 .

[0087] S202: Create a data table containing the verifi...

Embodiment 3

[0110] For a legitimate data requester, in addition to obtaining D from the server to construct the interest packet in the named data network, it also needs to know the decryption key of the data content value to decrypt the data packets that may be obtained later. . To this end, embodiments of the present invention provide a key transmission method. The core of this method is that when a legitimate data requester needs to request a decryption key, it needs to combine the I obtained in the previous paragraph to construct an interest packet named I:key and send it to the network. The routers in the network send this Interest packet to the data producer according to the forwarding principle. The data production end constructs a data packet, the data packet is named I:key, and the content value part is the encryption key of the real data corresponding to I. The encryption key is encrypted by an attribute-based encryption method, and is packaged into a data packet and sent to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a privacy protection method, system and key transmission method of a named data network. The privacy protection method is applied to the data request end as follows: sending an interest packet naming request carrying the original name m; when the interest packet naming request is received When responding, receive the Interest package name D corresponding to the original name m, where the Interest package name D is represented by the base point P on the elliptic curve and the point O on the elliptic curve; obtain the mapping F of the original name m on the elliptic curve; according to Map F, base point P, and point O on the elliptic curve, obtain the fuzzy name I of the Interest packet, and send the Interest packet with the fuzzy name I. The invention increases the security of interest packet transmission and protects the privacy of users. In addition, under the same security requirements, it can also reduce the operation time of the data production end and the data request end and reduce the data return delay.

Description

technical field [0001] The present invention relates to a named data network technology, in particular to a privacy protection method, system and key transmission method of a named data network. Background technique [0002] Named Data Networking (NDN) is a new type of future network architecture, which is different from the traditional TCP / IP network architecture. It uses "name" as the identifier of data in the network, rather than the traditional network 's IP address. figure 1 A schematic diagram of the architecture of the named data network. like figure 1 As shown, in a named data network, there are two main types of packets, Interest and Data. The legitimate data requester can get the corresponding data back by sending the constructed interest packet to the network. Among them, Interests and Data packets are named with strings. However, the names of Interest and Data packets are readable, which means that when these two kinds of packets are transmitted in the netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08H04L9/40H04L45/745H04L61/30
CPCH04L9/3066H04L9/3013H04L9/0861H04L63/08H04L63/06H04L45/745H04L61/30
Inventor 刘亮马华东何欢陈博
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products