Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Incrementally improving lookup latency in distributed hash table systems
SIGMETRICS '03 Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
A layered naming architecture for the internet
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Cyclone: A Novel Design Schema for Hierarchical DHTs
P2P '05 Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing
Insight and perspectives for content delivery networks
Communications of the ACM - Personal information management
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
OpenID 2.0: a platform for user-centric identity management
Proceedings of the second ACM workshop on Digital identity management
A data-oriented (and beyond) network architecture
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
A Comparative Study of Hierarchical DHT Systems
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
OpenID identity discovery with XRI and XRDS
Proceedings of the 7th symposium on Identity and trust on the Internet
Improving performance on the internet
Communications of the ACM - Inspiring Women in Computing
Identities in the Future Internet of Things
Wireless Personal Communications: An International Journal
A SWIFT Take on Identity Management
Computer
Relaxed-2-Chord: Efficiency, flexibility and provable stretch
IPDPS '09 Proceedings of the 2009 IEEE International Symposium on Parallel&Distributed Processing
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Automated Security Protocol Analysis With the AVISPA Tool
Electronic Notes in Theoretical Computer Science (ENTCS)
PSIRP project -- publish-subscribe internet routing paradigm: new ideas for future internet
Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies
Identity based architecture for secure communication in future internet
Proceedings of the 6th ACM workshop on Digital identity management
Internet 3.0: ten problems with current internet architecture and solutions for the next generation
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
A privacy-aware access control model for distributed network monitoring
Computers and Electrical Engineering
CP2: Cryptographic privacy protection framework for online social networks
Computers and Electrical Engineering
Hi-index | 0.00 |
In this paper we show how to bring enhanced privacy to future content delivery network architectures, with special attention to Content-Centric Networking (CCN). This objective is primarily achieved through the prevention of operation traceability while raising the role of communication parties to be a central element of the network. Thus, we propose an identity-based architecture that provides these capabilities in an integrated way with the underlay network architecture, which here is CCN. Also, the architecture we propose adds to CCN the possibility of performing secure end-to-end communications with transparent authentication capabilities. To reinforce the proposed architecture we discuss a successful security verification of its protocol and finally, we discuss a proof-of-concept implementation of the architecture working on top of CCN that we then use to perform the necessary tests to demonstrate its feasibility and scalability.