CN109040163A - Name data network secret protection cache decision method based on k anonymity - Google Patents

Name data network secret protection cache decision method based on k anonymity Download PDF

Info

Publication number
CN109040163A
CN109040163A CN201810381113.9A CN201810381113A CN109040163A CN 109040163 A CN109040163 A CN 109040163A CN 201810381113 A CN201810381113 A CN 201810381113A CN 109040163 A CN109040163 A CN 109040163A
Authority
CN
China
Prior art keywords
content
router
cst
interface
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810381113.9A
Other languages
Chinese (zh)
Other versions
CN109040163B (en
Inventor
柳毅
李小燕
凌捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201810381113.9A priority Critical patent/CN109040163B/en
Publication of CN109040163A publication Critical patent/CN109040163A/en
Application granted granted Critical
Publication of CN109040163B publication Critical patent/CN109040163B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • H04L67/5682Policies or rules for updating, deleting or replacing the stored data

Abstract

The present invention relates to the name data network secret protection cache decision methods based on k anonymity, only carry out cache decision in the node that user issues request, which neighbor node be cached to by the caching replacement rate decision of node.Attacker allows to know that nearest someone accessed the content; but due to having carried out the cache cooperation in region; attacker can not be inferred to which router access is the content pass through by which user recently; therefore it can be capable of the privacy of effective protection requestor to avoid the privacy information of attacker probe requests thereby person.In addition; extended one's service anonymous locality protection caching privacy by way of neighbours' cooperation caching, and router does not need to execute the building in anonymous region, do not need to carry out the data search in anonymous region; the realization difficulty for reducing anonymous region reduces the time delay that local users obtain data.

Description

Name data network secret protection cache decision method based on k anonymity
Technical field
The present invention relates to the technical fields of name data network secret protection, more particularly to the name number based on k anonymity Cache decision method is protected according to the network privacy.
Background technique
Being constantly progressive and develop with Internet information technique, the major function of internet has changed into highly effective and safe The acquisition and distribution of content.And the initial network based on ICP/IP protocol, there are IPv4 address shortages, cyberspace vulnerability It is more, the defects such as network service quality is low.There are one the serious wastings of resources for the internet of the TCP/IP network system, that is, deposits The problem of a large amount of duplicate contents transmit.In order to solve the essential problem of TCP/IP network, a kind of revolutionary future network body Architecture --- information centre's network (Information-Centric Network, ICN) (Vasilakos A V, Li Z, Simon G, et al.Information centric network:research challenges and Opportunities [J] .Journal of Network and Computer Applications, 2015,52:1-10.) It is suggested, to meet, Future Internet high efficiency, extensive, safety content obtains and the growth requirement of transmission.And several In representative ICN associated frame scheme, name data network (Named-Data Networking, NDN) (Zhang L, Estrin D,Burke J,et al.Named data networking(ndn)project[J].Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC, 2010.) because of advance, the side of its project theory The feasibility and substantial progress of case, the mainstream being increasingly becoming in ICN architectural framework.
Have to reduce using network internal storage and nets interior redundant transmission, realizes content is shared, improves content distribution speed etc. Advantage.When the data packet of network internal caching responds request rather than is responded by data producer, that is, Cache hit has occurred, cache hit means to reduce the use of bandwidth.I.e. reasonable network internal cache policy can be very big Ground reduces network bandwidth and reduces the load of original server.However, the cache contents of network internal may leak it is some hidden Private sensitive information.Attacker may obtain the time of request content by measurement, can speculate whether certain contents are accessed, Or thus position etc. of the speculative request person in network topology.Thus for naming data network, it is excellent to play caching in net The key of gesture is to prevent caching leakage privacy information under lesser expense, promote caching performance.And the caching everywhere defaulted (Leave Copy Everywhere,LCE)(Wang W,Sun Y,Guo Y,et al.CRCache:Exploiting the correlation between content popularity and network topology information for ICN caching[C]//IEEE International Conference on Communications(ICC).Sydney: IEEE, 2014:3191-3196.) strategy be easy to cause caching redundancy, i.e., and identical object has copy in multiple nodes, this leads The waste of serious memory space is caused, while attacker can easily pass through caching to deduce communication trace of neighbor user etc. hidden Personal letter breath.
For the deficiency of name data network LCE caching method, in order to reduce redundancy, network performance is promoted, is studied at present Some cache policies have been proposed in personnel.Laoutaris, Eum, Wang et al. propose the decision based on random cache, this A little cache decisions can reduce caching redundancy to a certain extent, but randomness and blindness are stronger;Psaras et al. passes through Calculate node hop count and buffer memory capacity carry out cache decision (Psaras I, Chai W K, Pavlou G.Probabilistic in-network caching for information-centric networks[C].ACM Proceedings of the second edition of the ICN workshop on Information-centric networking(ICN), 2012:55-60.).Cui shows east et al. and proposes BetwRep method (Cui Xiandong, Liu Jiang, Huang Tao wait to be based on node betweenness and replacing Change cache policy [J] electronics and information journal, 2014,36 (1): 1-7. in the content center network net of rate), it is situated between based on node Several and cache contents replacement rates are as the decision metric on return path.Both methods does not account for point of content requests Cloth feature.Hu et al. proposes PRL method (Hu X, Gong J, Cheng G, et al.Enhancing in-network caching by coupling cache placement,replacement and location[C].IEEE,2015: 5672-5678.), router calculates caching income according to the request rate of content, hop count information and content replacement rate, is transmitting The node of Income Maximum is selected in path as cache node.This method can dramatically increase network load.And Ge Guodong et al. (Ge Guodong, Guo Yunfei, Liu Caixia wait the cooperation caching in content center network towards secret protection to the CCSPP method of proposition Tactful [J] electronics and information journal, 2015,37 (5): 1220-1226.) comprehensively consider the secret protection cached, it constructs Anonymous region selects maximum hotspot request region to be cached when content returns.But the difficulty for constructing anonymous region is high, and Introduce additional lookup time delay.In view of current cache policy secret protection degree is insufficient, there are security risk and performance are more low Problem proposes the present invention.
Summary of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of name data network based on k anonymity is hidden Private protection cache decision method, prevents attacker from detecting the cache contents in router, avoids it to infer and know that neighbours use The privacy informations such as the access content at family;Meanwhile under the premise of protecting router cache privacy information, realizing has k anonymity total Data cached, raising Buffer Utilization is enjoyed, the router hops that reduction user's request content is passed through reduce averagely asking for content Seeking time;And when data packet returns, cache decision only is carried out in the node that user issues request, increases cache contents in network Diversity, reduce a large amount of caching redundancies, improve partial cache hit rate.
To achieve the above object, technical solution provided by the present invention are as follows:
Name data network router node in increase content status table (Content State Table, CST) and With neighbor information table (Neighborhood State Table, NST), the request of content when for counting interest packet arrival node The request user of user volume and encryption collection;
When router node receives interest packet, according to the content C in content status table CSTxWith the user U of encryptiony, Modify the request user volume of content;
When the corresponding data packet backtracking of interest packet, only cached certainly in the router node that cache hit occurs Plan, and its anonymous set for increasing access using k anonymity characteristic, carry out neighbours' cooperation caching.
Further, when the router node receives interest packet, specific processing step is as follows:
S1-1, it searches in content status table CST with the presence or absence of content Cx, if it does not exist, then go to step S1-4;If depositing Whether there is user U in the user's collection uSet for then searching content status table CSTyIf not having, toward content CxUser collect uSet Add Uy, number of users adds 1;If so, then passing directly to step S1-2;
S1-2, judge content C in CST tablexThe value of corresponding Interface: it if Interface is sky, thens follow the steps S1-5;If Interface is equal to 0, by the content returned data packet in CS to user, process terminates;If Interface is not Sky is also not zero, and thens follow the steps S1-3;
S1-3, content C in CST table is pressedxCorresponding interface is forwarded to neighbor router, and process terminates;
S1-4, a content C is added to CSTxRecord, user UyUser's collection is added, request user volume adds 1;
S1-5, content C is searched in PITx, find then content CxIt reaches interface and is added to PIT, and abandon the interest Packet, process terminate;Otherwise content C is searched in FIBx
S1-6, content C is found in FIBx;It is then forwarded by the interface list found, and adds the interest packet in PIT New entry;It is not found in FIB, shows that network can not respond the request, abandon the interest packet.
Further, when the corresponding data packet backtracking of interest packet, router node receives the cache decision of data packet Steps are as follows:
S2-1、CxData packet return on the way, arrival have user issue request CxNode Ri, search whether CS has Cx Data packet, the data packet is directly abandoned if having, C is not searched in CSTx
If S2-2, finding C in CSTx, then follow the steps S2-3;If not finding C in CSTx, then follow the steps S2-4;
S2-3, judge whether Interface is empty and the number of users of the request of router interface quantity or CST table Whether num of User is more than or equal to threshold value k;
If Interface is that the number of users num of User of empty and router interface quantity or CST table request is big In being equal to threshold value k, then data packet copy is buffered in this router Ri, the interface of CST table is updated to 0, and neighbor router is updated to This router Ri
If Interface be the number of users num of User of empty and router interface quantity or CST table request not More than or equal to threshold value k, then the caching the smallest neighbor node R of replacement rate is selected according to NSTi, data packet copy is forwarded and is cached To Ri, neighbours' interface of selection is updated to CST;
If Interface is not the number of users num of User of empty and router interface quantity or CST table request More than or equal to threshold value k, then data packet copy is buffered in this router Ri, the interface of CST table is updated to 0, and neighbor router updates For this router Ri
If Interface is not the number of users num of User of empty and router interface quantity or CST table request No more than threshold value k is equal to, directly execution step S2-4;
S2-4, C is searched in PIT tablex, do not find, abandon the data packet, find then by C in PITxCorresponding interface forwarding Data packet.
Further, it names the router node in data network to be equipped with neighbours and updates message (Neighbor update Packages, NUP), local information periodically is noticed to neighbor router for router, neighbours is received and updates message NUP Router node the letter reported in content update the content status table CST and neighbor information table NST of NUP is then updated according to neighbours Breath, the specific steps are as follows:
S3-1, router RiThe periodically caching replacement rate in the unit of account time
Wherein, S (fk) indicate node RiIt is replaced content fkSize, C (Ri) indicate node RiCache size, m indicate Unit time interior nodes RiThe content number being replaced;If Re (Ri)=0 indicates that nodal cache is less than or reaches without new content;
S3-2, router RiPeriodically local information is noticed to neighbor router;
After S3-3, neighbor router receive update message, neighbor information table NST updates corresponding router according to message content Nodal cache replacement rate, if content status table CST contains the cache contents replaced, content status table CST, which is deleted, to be corresponded to Tuple.
Compared with prior art, the principle and advantage of this programme is as follows:
1. meeting is on all nodes on data packet return path due to the cache decision LCE of name data network default Content caching is carried out, this can greatly waste the memory space of network, cause cache contents redundancy.This programme is responded in data and is saved When point data packet backtracking that interest packet is corresponding, cache decision only is carried out in the node that user issues request, it in this way can be with While keeping higher cache hit rate, the redundancy of cache contents is effectively reduced, improves the diversity of data in netting, reduces The renewal frequency of cache contents in node.
2. attacker can be by the two-way time of measurement specific content, to speculate whether neighbor user is requested recently The content, it might even be possible to deduce the topology location of user in a network.Therefore for naming the caching privacy of data network to protect It protects of crucial importance.This programme reveals the associated privacy information of requestor, the corresponding data packet backtracking of interest packet in order to prevent When, cache decision only is carried out in the node that user issues request, which neighbour is cached to by the caching replacement rate decision of node Occupy node.Attacker allows to know that nearest someone accessed the content, but due to having carried out the cache cooperation in region, attacks The person of hitting can not be inferred to the content recently by which user by which router access, therefore can detect to avoid attacker The privacy information of requestor is capable of the privacy of effective protection requestor.
The anonymous locality protection caching privacy 3. this programme is extended one's service by way of neighbours' cooperation caching, compare Pueraria lobota state Et al. the CCSPP scheme that proposes, router do not need to execute the building in anonymous region, do not need to carry out the number in anonymous region It is investigated that looking for, the realization difficulty in anonymous region is reduced, reduces the time delay that local users obtain data.Ge Guodong etc. simultaneously The scheme that people proposes is realizing the utilization that caching is although realized while privacy of user protection, but on the road that data packet returns On diameter, content is only stored in the highest anonymous region of hot spot, if it is other anonymous regions on same path user to same There is very big probability to need to request to content publisher again when data make requests.And this programme is then on the road that data packet returns The node that all users issue request on diameter carries out cache decision, improves Buffer Utilization and cache hit rate.
Detailed description of the invention
Fig. 1 is name data network topology figure;
Fig. 2 is interest packet forwarding process figure of the present invention;
Fig. 3 is the cache decision flow chart of data packet of the present invention.
Specific embodiment
Before illustrating specific embodiment, the meaning of each symbol, phrase used in the present invention is provided first:
The meaning of each symbol is as follows:
Ri: router node i, the unique identity of node;
Cx: content x;
Uy: the mark of the user y of encryption;
CS: the content storage of router, Content Store;
Re(Ri): the caching replacement rate of router node i;
CST: content status table, Content State Table;
NST: neighbor state table, Neighborhood State Table;
PIT: interest table undetermined, Pending Interest Table;
FIB: forwarding information table, Forwarding Information Base;
NUP: neighbours update message, Neighbor update packages;
Num of User/uReq: all requested content CiNumber of users;
Interface: indicating the interface with neighbor router, wherein 0 indicates local router;
User Set/uSet: Yong Huji, content CiThe set of the encryption user label of corresponding requestor;
K: judge whether the threshold value cached in present node;
The present invention is further explained in the light of specific embodiments:
Name data network secret protection cache decision method described in the present embodiment based on k anonymity:
Now set router R0CST it is as shown in table 1, NST is as shown in table 2.CST maintains local node or neighbor node The state of content, user integrate as content CxCorresponding requestor, the user volume of request are all requested content CxNumber of users Amount, interface 0 indicate that content is stored in local router, and 1-n indicates the interface with neighbor router.Interface and neighbor router are Illustrate that the data packet of request does not reach this node also when empty.The network topological diagram that the present embodiment uses is as shown in Figure 1.
1 content status table of table (Content State Table, CST)
2 neighbor state table of table (Neighborhood State Table, NST)
As shown in Fig. 2, processing step of the node when receiving interest packet is as follows:
S1-1, it searches in content status table CST with the presence or absence of content Cx, if it does not exist, then go to step S1-4;If depositing Whether there is user U in the user's collection uSet for then searching content status table CSTyIf not having, toward content CxUser collect uSet Add Uy, number of users adds 1;If so, then going to step S1-2;
S1-2, judge content C in CST tablexThe value of corresponding Interface: it if Interface is sky, thens follow the steps S1-5;By the content returned data packet in CS to user if Interface is equal to 0, process terminates;If Interface is not Sky is also not zero, and thens follow the steps S1-3;
S1-3, content C in CST table is pressedxCorresponding interface is forwarded to neighbor router, and (router does not have interface in this strategy 0, interface 0 refers to content caching in local), process terminates;
S1-4, a content C is added to CSTxRecord, user UyUser's collection is added, request user volume adds 1;
S1-5, content C is searched in PITx, find then content CxIt reaches interface and is added to PIT, and abandon the interest Packet;Otherwise content C is searched in FIBx
S1-6, content C is found in FIBx;It is then forwarded by the interface list found, and adds the interest packet in PIT New entry;It is not found in FIB, shows that network can not respond the request, abandon the interest packet.
As shown in figure 3, when the corresponding data packet backtracking of interest packet, router node receives the caching after data packet and determines Steps are as follows for plan:
S2-1、CxData packet return on the way, arrival have user issue request CxNode Ri, search whether CS has Cx Data packet, the data packet is directly abandoned if having, C is not searched in CSTx
If S2-2, finding C in CSTx, then follow the steps S2-3;If not finding C in CSTx, then follow the steps S2-4;
S2-3, judge whether Interface is empty and the number of users of the request of router interface quantity or CST table Whether num of User is more than or equal to threshold value k;
If Interface is that the number of users num of User of empty and router interface quantity or CST table request is big In being equal to threshold value k, then data packet copy is buffered in this router Ri, the interface of CST table is updated to 0, and neighbor router is updated to This router Ri
If Interface be the number of users num of User of empty and router interface quantity or CST table request not More than or equal to threshold value k, then the caching the smallest neighbor node R of replacement rate is selected according to NSTi, data packet copy is forwarded and is cached To Ri, neighbours' interface of selection is updated to CST;
If Interface is not the number of users num of User of empty and router interface quantity or CST table request More than or equal to threshold value k, then data packet copy is buffered in this router Ri, the interface of CST table is updated to 0, and neighbor router updates For this router Ri, update corresponding neighbours' interface in CST;
If Interface is not the number of users num of User of empty and router interface quantity or CST table request No more than threshold value k is equal to, directly execution step S2-4;
S2-4, C is searched in PIT tablex, do not find, abandon the data packet, find then by C in PITxCorresponding interface forwarding Data packet.
The decision process of cache policy is illustrated below according to the data of table 1, table 2:
Assuming that k=30, user passes through router R5Request data D1, the data packet D of present content supplier's return1? Node R on the way3It was found that there is user to issue request, the num of User=10 of CST then finds Re (R in NST because being less than ki) It is worth the smallest node R2, data packet D1Copy from router R3Interface 2 be forwarded to neighbor router carry out cooperation caching, R simultaneously3Continue D1Back to R5
Message NUP is updated by neighbours, router periodically notices local information to neighbor router, and specific steps are such as Under:
S3-1, router RiThe periodically caching replacement rate in the unit of account time
Wherein, S (fk) indicate node RiIt is replaced content fkSize, C (Ri) indicate node RiCache size, m indicate Unit time interior nodes RiThe content number being replaced;If Re (Ri)=0 indicates that nodal cache is less than or reaches without new content;
S3-2, router RiLocal information periodically is noticed to neighbor router, structure is as shown in table 3;
After S3-3, neighbor router receive update message, neighbor information table NST updates corresponding router according to message content Nodal cache replacement rate, if content status table CST contains the cache contents replaced, content status table CST, which is deleted, to be corresponded to Tuple.
3 neighbours of table update message (Neighbor update packages, NUP)
Router mark Ri
Cache replacement rate Re (Ri)
Message creation time
The cache contents C replacedi
The present embodiment is only issued in user and is requested in data responsive node data packet backtracking that interest packet is corresponding Node carry out cache decision, make that the redundancy of cache contents is effectively reduced while keeping higher cache hit rate, raising The diversity of data in netting, reduces the renewal frequency of cache contents in node.In addition, the corresponding data packet backtracking of interest packet When, cache decision only is carried out in the node that user issues request, which neighbour is cached to by the caching replacement rate decision of node Occupy node.Attacker allows to know that nearest someone accessed the content, but due to having carried out the cache cooperation in region, attacks The person of hitting can not be inferred to the content recently by which user by which router access, therefore can detect to avoid attacker The privacy information of requestor is capable of the privacy of effective protection requestor.In addition, it is extended one's service by way of neighbours' cooperation caching Anonymous locality protection caches privacy, and router does not need to execute the building in anonymous region, do not need to carry out the number in anonymous region It is investigated that looking for, the realization difficulty in anonymous region is reduced, reduces the time delay that local users obtain data.
The examples of implementation of the above are only the preferred embodiments of the invention, and implementation model of the invention is not limited with this It encloses, therefore all shapes according to the present invention, changes made by principle, should all be included within the scope of protection of the present invention.

Claims (4)

1. the name data network secret protection cache decision method based on k anonymity, which is characterized in that in name data network Increase in router node content status table CST and with neighbor information table NST, for counting content when interest packet reaches node Request the request user of user volume and encryption collection;
When router node receives interest packet, according to the content C in content status table CSTxWith the user U of encryptiony, modification The request user volume of content;
When the corresponding data packet backtracking of interest packet, cache decision only is carried out in the node that user issues request, and utilize k Anonymous characteristic is gathered to increase the anonymous of access, carries out neighbours' cooperation caching.
2. the name data network secret protection cache decision method according to claim 1 based on k anonymity, feature exist In when the router node receives interest packet, specific processing step is as follows:
S1-1, it searches in content status table CST with the presence or absence of content Cx, if it does not exist, then go to step S1-4;If it exists, then it looks into The user of content status table CST is looked for collect in uSet whether have user UyIf not having, toward content CxUser collect uSet add Uy, Number of users adds 1;If so, then passing directly to step S1-2;
S1-2, judge content C in CST tablexThe value of corresponding Interface: if Interface is sky, S1-5 is thened follow the steps; If Interface is equal to 0, by the content returned data packet in CS to user, process terminates;If Interface is not empty It is not zero, thens follow the steps S1-3;
S1-3, content C in CST table is pressedxCorresponding interface is forwarded to neighbor router, and process terminates;
S1-4, a content C is added to CSTxRecord, user UyUser's collection is added, request user volume adds 1;
S1-5, content C is searched in PITx, find then content CxIt reaches interface and is added to PIT, and abandon the interest packet, flow Journey terminates;Otherwise content C is searched in FIBx
S1-6, content C is found in FIBx;It is then forwarded by the interface list found, and adds the new of the interest packet in PIT Entry;It is not found in FIB, shows that network can not respond the request, abandon the interest packet.
3. the name data network secret protection cache decision method according to claim 1 based on k anonymity, feature exist When, interest packet corresponding data packet backtracking, router node receives the cache decision of data packet, and steps are as follows:
S2-1、CxData packet return on the way, arrival have user issue request CxNode Ri, search whether CS has CxData Packet, the data packet is directly abandoned if having, C is not searched in CSTx
If S2-2, finding C in CSTx, then follow the steps S2-3;If not finding C in CSTx, then follow the steps S2-4;
S2-3, judge whether Interface is empty and the number of users num of of the request of router interface quantity or CST table Whether User is more than or equal to threshold value k;
If Interface is that the number of users num of User of empty and router interface quantity or CST table request is greater than etc. In threshold value k, then data packet copy is buffered in this router Ri, the interface of CST table is updated to 0, and neighbor router is updated to this road By device Ri
If Interface is that the number of users num of User of empty and router interface quantity or CST table request is not more than Equal to threshold value k, then the caching the smallest neighbor node R of replacement rate is selected according to NSTi, data packet copy is forwarded and is cached to Ri, Neighbours' interface of selection is updated to CST;
If Interface is not that the number of users num of User of empty and router interface quantity or CST table request is greater than Equal to threshold value k, then data packet copy is buffered in this router Ri, the interface of CST table is updated to 0, and neighbor router is updated to this Router Ri
If Interface is not that the number of users num of User of empty and router interface quantity or CST table request is little In being equal to threshold value k, directly execution step S2-4;
S2-4, C is searched in PIT tablex, do not find, abandon the data packet, find then by C in PITxCorresponding interface forwards data Packet.
4. the name data network secret protection cache decision method according to claim 1 based on k anonymity, feature exist In the router node in name data network is equipped with neighbours and updates message NUP, periodically routes to neighbours for router Device notices local information, and the router node for receiving neighbours' update message NUP then updates in the content update for reporting NUP according to neighbours Hold the information in state table CST and neighbor information table NST, the specific steps are as follows:
S3-1, router RiThe periodically caching replacement rate in the unit of account time
Wherein, S (fk) indicate node RiIt is replaced content fkSize, C (Ri) indicate node RiCache size, m indicate unit Time interior nodes RiThe content number being replaced;If Re (Ri)=0 indicates that nodal cache is less than or reaches without new content;
S3-2, router RiPeriodically local information is noticed to neighbor router;
After S3-3, neighbor router receive update message, neighbor information table NST updates the section of corresponding router according to message content Point cache replacement rate, if content status table CST contains the cache contents replaced, content status table CST deletes corresponding member Group.
CN201810381113.9A 2018-04-25 2018-04-25 Named data network privacy protection caching decision method based on k anonymity Active CN109040163B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810381113.9A CN109040163B (en) 2018-04-25 2018-04-25 Named data network privacy protection caching decision method based on k anonymity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810381113.9A CN109040163B (en) 2018-04-25 2018-04-25 Named data network privacy protection caching decision method based on k anonymity

Publications (2)

Publication Number Publication Date
CN109040163A true CN109040163A (en) 2018-12-18
CN109040163B CN109040163B (en) 2021-03-30

Family

ID=64630219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810381113.9A Active CN109040163B (en) 2018-04-25 2018-04-25 Named data network privacy protection caching decision method based on k anonymity

Country Status (1)

Country Link
CN (1) CN109040163B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625565A (en) * 2020-05-22 2020-09-04 哈尔滨工程大学 Multi-attribute cooperative caching method for information center network cache privacy protection
CN111917658A (en) * 2020-07-01 2020-11-10 大连理工大学 Privacy protection cooperative caching method based on grouping under named data network
CN112612727A (en) * 2020-12-08 2021-04-06 海光信息技术股份有限公司 Cache line replacement method and device and electronic equipment
CN114844670A (en) * 2022-03-22 2022-08-02 电子科技大学 IP address hiding method based on named network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905538A (en) * 2014-03-22 2014-07-02 哈尔滨工程大学 Neighbor cooperation cache replacement method in content center network
CN106790638A (en) * 2017-01-10 2017-05-31 北京邮电大学 Data transmission method and system based on active cache in name data network
WO2017165246A1 (en) * 2016-03-25 2017-09-28 Cisco Technology, Inc. System and method for routing packets in a content centric network using anonymous datagrams
WO2017192569A1 (en) * 2016-05-04 2017-11-09 Cisco Technology, Inc. System and method for routing packets in a stateless content centric network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905538A (en) * 2014-03-22 2014-07-02 哈尔滨工程大学 Neighbor cooperation cache replacement method in content center network
WO2017165246A1 (en) * 2016-03-25 2017-09-28 Cisco Technology, Inc. System and method for routing packets in a content centric network using anonymous datagrams
WO2017192569A1 (en) * 2016-05-04 2017-11-09 Cisco Technology, Inc. System and method for routing packets in a stateless content centric network
CN106790638A (en) * 2017-01-10 2017-05-31 北京邮电大学 Data transmission method and system based on active cache in name data network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
J. J. GARCIA-LUNA-ACEVES等: "Content-centric networking using anonymous datagrams", 《2016 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS》 *
葛国栋: "内容中心网络中面向隐私保护的协作缓存策略", 《电子与信息学报》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625565A (en) * 2020-05-22 2020-09-04 哈尔滨工程大学 Multi-attribute cooperative caching method for information center network cache privacy protection
CN111625565B (en) * 2020-05-22 2022-09-02 哈尔滨工程大学 Multi-attribute cooperative caching method for information center network cache privacy protection
CN111917658A (en) * 2020-07-01 2020-11-10 大连理工大学 Privacy protection cooperative caching method based on grouping under named data network
CN111917658B (en) * 2020-07-01 2022-02-25 大连理工大学 Privacy protection cooperative caching method based on grouping under named data network
CN112612727A (en) * 2020-12-08 2021-04-06 海光信息技术股份有限公司 Cache line replacement method and device and electronic equipment
CN114844670A (en) * 2022-03-22 2022-08-02 电子科技大学 IP address hiding method based on named network
CN114844670B (en) * 2022-03-22 2023-03-10 电子科技大学 IP address hiding method based on named network

Also Published As

Publication number Publication date
CN109040163B (en) 2021-03-30

Similar Documents

Publication Publication Date Title
Zhang et al. A survey of caching mechanisms in information-centric networking
CN109040163A (en) Name data network secret protection cache decision method based on k anonymity
Hail et al. Caching in named data networking for the wireless internet of things
Xylomenos et al. A survey of information-centric networking research
Chow et al. GroCoca: Group-based peer-to-peer cooperative caching in mobile environment
Seetharam On caching and routing in information-centric networks
Le et al. Social caching and content retrieval in disruption tolerant networks (DTNs)
An et al. An in-network caching scheme based on energy efficiency for content-centric networks
Dutta et al. Caching scheme for information‐centric networks with balanced content distribution
CN109788319B (en) Data caching method
Amadeo et al. Beyond edge caching: Freshness and popularity aware iot data caching via ndn at internet-scale
Zhang et al. Combining popularity and locality to enhance in-network caching performance and mitigate pollution attacks in content-centric networking
CN105208553B (en) The guard method and system of CCMANET requesting node retrieval privacy
Zhang et al. Cache-aware named-data forwarding in internet of things
CN108769252A (en) A kind of ICN network pre-cache methods based on request content relevance
Alahmri et al. Efficient pooling and collaborative cache management for NDN/IoT networks
Dron et al. Information-maximizing caching in ad hoc networks with named data networking
Yang et al. Providing cache consistency guarantee for ICN-based IoT based on push mechanism
Qin et al. A probability-based caching strategy with consistent hash in named data networking
Zhu et al. Popularity-based neighborhood collaborative caching for information-centric networks
CN107302571B (en) The routing of information centre's network and buffer memory management method based on drosophila algorithm
Zhou et al. Popularity and age based cache scheme for content-centric network
Shibuya et al. Cache decision policy for breadcrumbs in CCN
Gu et al. Node value and content popularity-based caching strategy for massive VANETs
Chow et al. Peer-to-peer cooperative caching in a hybrid data delivery environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant