DOI QR코드

DOI QR Code

A novel architecture of CCN for better security and applicability

향상된 보안 및 적용 가능성을 위한 컨텐츠 중심 네트워킹(CCN)의 새로운 아키텍처 연구

  • Sharma, Aashis (Ncell Pvt. Ltd.) ;
  • Kim, Yun Seon (Handong Global University, Graduate School of Global Development & Entrepreneurship)
  • Received : 2016.11.23
  • Accepted : 2017.01.27
  • Published : 2017.03.31

Abstract

Information Centric Networking is changing the way how content is being transmitted. The shift from IP and host based networking towards content based networking scenario is growing day by day. Many researches have been done about different frameworks of ICN. Caching is an important part of ICN and many researchers have also proposed different ways for caching the data. With caching of data in intermediate devices like the network devices as well the user devices in some cases, the issue of content security as well as the role of the content producer becomes a major concern. A modified ICN architecture based on the current Content Centric Networking (CCN) model is presented in the paper. The architecture mainly focuses on involving the content producer in content delivery in the real time. The proposed architecture provides better security aspects for the CCN architecture. Apart from security the paper will also consider the issue of applicability of CCN architecture to replace the TCP/IP based architecture. The efficiency of the proposed architecture is compared with the previous CCN architecture based on the response time for a content delivery which shows very comparable level of efficiency. The paper than analyzes different beneficial aspects of the proposed architecture over the current architecture.

정보 중심 네트워킹 (Information Centric Networking)은 콘텐츠 전송 방식을 바꾸고 있다. IP 및 호스트 기반 네트워킹에서 콘텐츠 기반 네트워킹 시나리오로의 전환이 날로 증가하고 있고 ICN의 다른 프레임워크에 대한 많은 연구가 수행되었다. 캐싱은 ICN의 중요한 부분이며 많은 연구자들은 데이터 캐싱을 위한 다양한 방법을 제안했다. 네트워크 장치와 같은 중간 장치에 데이터를 캐싱하고 사용자 장치를 경우에 따라 사용하면 콘텐츠 제작자의 역할뿐 아니라 콘텐츠 보안 문제가 큰 관심사가 된다. 현재 CCN (Content Centric Networking) 모델을 기반으로 하는 수정된 ICN의 새로운 아키텍처가 이 연구에서 제시되었다. 이 아키텍처는 주로 실시간으로 콘텐츠 제공에 콘텐츠 제작자를 참여시키는데 중점을 둔다. 제안된 새 아키텍처는 CCN 아키텍처에 대한 보다 나은 보안 측면을 제공하고 보안 외에도 TCP / IP 기반 아키텍처를 대체하기 위해 CCN 아키텍처의 적용 가능성 문제를 고려하고 있다. 제안된 새 아키텍처의 효율성은 기존의 아키텍처와 매우 유사한 수준의 효율성을 보여주고 컨텐트 전달에 대한 응답 시간을 기반으로 이전 CCN 아키텍처와 비교하였다. 이 논문에서 현재 아키텍처에 비해 제안된 새로운 아키텍처의 다양한 이점을 제시한다.

Keywords

References

  1. Trossen, D., Sarela, M., & Sollins, K. (2010). Arguments for an information-centric internetworking architecture. ACM SIGCOMM Computer Communication Review, 40(2), 26-33 https://doi.org/10.1145/1764873.1764878
  2. Rexford, J., & Dovrolis, C. (2010). Future Internet architecture: clean-slate versus evolutionary research. Communications of the ACM, 53(9), 36-40. https://doi.org/10.1145/1810891.1810906
  3. "IRTF Information-Centric Networking Research Group (ICNRG)". Irtf.org. N.p., 2016. Web. 17 Aug. 2016.
  4. Jacobson, V., Smetters, D. K., Thornton, J. D., Plass, M. F., Briggs, N. H., & Braynard, R. L. (2009, December). Networking named content. In Proceedings of the 5th international conference on Emerging networking experiments and technologies (pp. 1-12). ACM.
  5. Sourlas, V., Flegkas, P., & Tassiulas, L. (2014). A novel cache aware routing scheme for Information-Centric Networks. Computer Networks, 59, 44-61. http://dx.doi.org/10.1016/j.bjp.2013.12.002
  6. Cheriton, D. R., & Gritter, M. (2000). TRIAD: A new next-generation Internet architecture.
  7. Baccala, B. (2002). Data Oriented Networking.
  8. Arianfar, S., Nikander, P., & Ott, J. (2010, June). Packet-level caching for information-centric networking. In ACM SIGCOMM, ReArch Workshop.
  9. Jacobson, V., Smetters, D. K., Thornton, J. D., Plass, M. F., Briggs, N. H., & Braynard, R. L. (2009, December). Networking named content. In Proceedings of the 5th international conference on Emerging networking experiments and technologies (pp. 1-12). ACM.?
  10. Koponen, T., Chawla, M., Chun, B. G., Ermolinskiy, A., Kim, K. H., Shenker, S., & Stoica, I. (2007, August). A data-oriented (and beyond) network architecture. In ACM SIGCOMM Computer Communication Review (Vol. 37, No. 4, pp. 181-192). ACM.? https://doi.org/10.1145/1282427.1282402
  11. Ahlgren, B., D'ambrosio, M., Dannewitz, C., Eriksson, A., Golic, J., Gr?nvall, B., ... & M?kel?, J. (2010). Second netinf architecture description. 4WARD EU FP7 Project, Deliverable D-6.2 v2. 0.
  12. Ain, M., Trossen, D., Nikander, P., Tarkoma, S., Visala, K., Rimey, K., ... & Kj?llman, J. (2009). D2. 3-architecture definition, component descriptions, and requirements. Deliverable, PSIRP 7th FP EUfunded project.
  13. Jacobson, V., Smetters, D. K., Thornton, J. D., Plass, M. F., Briggs, N. H., & Braynard, R. L. (2009, December). Networking named content. In Proceedings of the 5th international conference on Emerging networking experiments and technologies (pp. 1-12). ACM.
  14. Tourani, R., Mick, T., Misra, S., & Panwar, G. (2016). Security, Privacy, and Access Control in Information-Centric Networking: A Survey. arXiv preprint arXiv:1603.03409.
  15. Lagutin, D., Visala, K., & Tarkoma, S. (2010). Publish/Subscribe for Internet: PSIRP Perspective. Future internet assembly, 84.
  16. Akhshabi, S., & Dovrolis, C. (2013). The evolution of layered protocol stacks leads to an hourglassshaped architecture. In Dynamics On and Of Complex Networks, Volume 2 (pp. 55-88). Springer New York.
  17. Vasilakos, A., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal Of Network And Computer Applications, 52, 1-10. http://dx.doi.org/10.1016/j.jnca.2015.02.001
  18. Almeida, F. L. F., & Louren?o, J. M. (2012). Information centric networks-design issues, principles and approaches. International Journal of Latest Trends in Computing, 3(3). ?
  19. Zhang, X., Chang, K., Xiong, H., Wen, Y., Shi, G., & Wang, G. (2011, October). Towards name-based trust and security for content-centric network. In 2011 19th IEEE International Conference on Network Protocols (pp. 1-6). IEEE.
  20. Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H. Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications, ser. SIGCOMM '01; 2001.
  21. Misra, S., Tourani, R., & Majd, N. E. (2013, August). Secure content delivery in informationcentric networks: Design, implementation, and analyses. In Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking (pp. 73-78). ACM.
  22. Lauinger, T., Laoutaris, N., Rodriguez, P., Strufe, T., Biersack, E., & Kirda, E. (2012). Privacy implications of ubiquitous caching in named data networking architectures. Technical report, TRiSecLab-0812-001, iSecLab.
  23. Rossini D, Rossi D. A dive into the caching performance of content centric networking. Technical report, Telecom ParisTech; 2011.
  24. Muscariello, L., Carofiglio, G., & Gallo, M. (2011, August). Bandwidth and storage sharing performance in information centric networking. In Proceedings of the ACM SIGCOMM workshop on Informationcentric networking (pp. 26-31). ACM.
  25. Udugama, A. (2015). Enhanced Forwarding Strategies in Information Centric Networking (Pd.D). University of Bremen.
  26. Arianfar, S., Nikander, P., & Ott, J. (2010, November). On content-centric router design and implications. In Proceedings of the Re-Architecting the Internet Workshop (p. 5). ACM.
  27. Ahlgren, B., Dannewitz, C., Imbrenda, C., Kutscher, D., & Ohlman, B. (2012). A survey of informationcentric networking. IEEE Communications Magazine, 50(7), 26-36. https://doi.org/10.1109/MCOM.2012.6231276
  28. Adamic, L. A., & Huberman, B. A. (2002). Zipf's law and the Internet. Glottometrics, 3(1), 143-150.
  29. Sugiyama, K., Hatano, K., & Yoshikawa, M. (2004, May). Adaptive web search based on user profile constructed without any effort from users. In Proceedings of the 13th international conference on World Wide Web (pp. 675-684). ACM.
  30. Kaushik, P. (2016). Tomorrow's Internet: A World of Hyper-Personalized Tribes?. WIRED. Retrieved 4 September 2016, from https://www.wired.com/insights/2014/03/todays-internet-world-hyperpersonalized-tribes/
  31. Hu, Y. Performance-based Pricing Models in Online Advertising. SSRN Electronic Journal. http://dx.doi.org/10.2139/ssrn.501082
  32. CCNx$\mid$PARC's implementation of content-centric networking. (2016). Ccnx.org. Retrieved 30 June 2016, from http://www.ccnx.org/
  33. Afanasyev, A., Moiseenko, I., & Zhang, L. (2012). ndnSIM: NDN simulator for NS-3. University of California, Los Angeles, Tech. Rep.
  34. Chiocchetti, R., Rossi, D., & Rossini, G. (2013, June). ccnsim: An highly scalable ccn simulator. In 2013 IEEE International Conference on Communications (ICC) (pp. 2309-2314). IEEE..
  35. Nikolaos Vastardis Personal Webpage. (2016). Privateessex.ac.uk. Retrieved 30 June 2016, from http://privatewww.essex.ac.uk/-nvasta/ICNSim.htm
  36. Ghodsi, A., Shenker, S., Koponen, T., Singla, A., Raghavan, B., & Wilcox, J. (2011, November). Information-centric networking: seeing the forest for the trees. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks (p. 1). ACM.
  37. Rossi, D., & Rossini, G. (2011). Caching performance of content centric networks under multi-path routing (and more). Relat?rio t?cnico, Telecom ParisTech.
  38. Rossini, G. & Rossi, D. (2013). Evaluating CCN multi-path interest forwarding strategies. Computer Communications, 36(7), 771-778. http://dx.doi.org/10.1016/j.comcom.2013.01.008
  39. Conti, M., Gasti, P., & Teoli, M. (2013). A lightweight mechanism for detection of cache pollution attacks in Named Data Networking. Computer Networks, 57(16), 3178-3191. https://doi.org/10.1016/j.comnet.2013.07.034
  40. Udugama, A. (2015). Enhanced Forwarding Strategies in Information Centric Networking (Doctoral dissertation, Faculty of Physics and Electrical Engineering, University of Bremen).