anonymous named data networking application
play

Anonymous Named Data Networking Application NDN Security Group - PowerPoint PPT Presentation

Anonymous Named Data Networking Application NDN Security Group Ersin Uzun, Steven DiBenedetto, Gene Tsudik, Paolo Gasti Privacy Challenges in NDN Name Privacy: semantically related names Interested in /healthonline/STDs/..


  1. Anonymous Named Data Networking Application NDN Security Group Ersin Uzun, Steven DiBenedetto, Gene Tsudik, Paolo Gasti

  2. Privacy Challenges in NDN • Name Privacy: semantically related names – Interested in “/healthonline/STDs/..” • Content Privacy: unencrypted public content. – Retrieved content is an “.mp3” file • Signature Privacy: leaked signer(publisher) identity – Retrieved content is signed by “match.com” • Cache privacy: detectable cache hits/misses – Interests from this user usually misses caches -- it is for Russian content. 1

  3. Objective • Design a practical system for NDN that enables – user privacy and anonymity – censorship resistance • Implement and evaluate its performance and anonymity guarantees 2

  4. Threat Model • Passive: – Traffic observation & fingerprinting – Timing & size correlation • Active: – Moving attacker – Compromised routers & content producers 3

  5. Named Data Onion Routing (NDor) • Consists of client and anonymizing router (AR) software • Supports two modes – Ephemeral : Asymmetric encryption of interests – Session: Symmetric encryption of interests • Client: – Encrypt & encapsulate interests – Decrypt & decapsulate data • Anonymizing Routers: – Decrypt & decapsulate interests – Encrypt & encapsulate data 4

  6. Interest & Content Format • Layers of encrypted Interests reside inside the name component of interests – E.g.,: /anonymizer/Enc(Timestamp || key || Interest) • Content is encrypted with the client-provided key on its way back – Encapsulation is published under the requested name and signed by ARs. 5

  7. NDor Example ? /OR1/ OR2/ nytimes.com/today ? /nytimes.com/today /OR1 /OR2 ? /OR2/ nytimes.com/today ? /nytimes.com/today 6

  8. Experimental Setup OR1 OR2 Data Forwarding Path • Experiments on ONL – Line topology – Comparison with TOR (for comparable privacy) 7

  9. Initial Results Cold Start: Warm Start: Including Initial setup time Omitting the setup time �� �� �������� ��������� �� �� NDor-S ���� ����������������� ������������������� ������������������� ��������� Dor ������ ���������������� �� �� �� �� �� �� �� �� �� �� �� �� �� ��� ���� �� ��� ���� �������������� �������������� • Computational relative overhead is comparable to Tor... • Expected real-life overhead is less than Tor • NDor requires less hops (2 ARs only compared to 3 in Tor and others) • Dynamic caching on and around exit nodes 8

  10. Other Security topics in NDN project • More efficient security primitives – Esp. signature schemes • New library functionalities – e.g., access control, key mgnt, signed interests… • Trust management research – Alternatives for PKI 9

  11. Thanks! • NDN website: – http://www.named-data.net • Contact information: – euzun@parc.com 10

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend