2019
DOI: 10.1109/access.2019.2950593
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving Protocol for Network-Neutral Caching in ISP Networks

Abstract: By performing in-network caching, Internet Service Providers (ISPs) allow Content Providers (CPs) to serve contents from locations closer to users. In this way, the pressure of content delivery on ISPs' network is alleviated, and the users' Quality-of-Experience (QoE) improved. Due to its impact on QoE, caching has been recently considered as a form of traffic prioritization in the debate on Network Neutrality (NN). A possible approach to perform NN-compliant caching consists in assigning the same portion of c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…In Fig. 4, we show the trade-off between overhead and privacy with varying η ∈ [1,200], for χ ∈ [10,20,30,40]. From this figure, we observe that a very high level of privacy can be reached at a remarkable reduction of the overhead.…”
Section: B Data Overheadmentioning
confidence: 97%
See 1 more Smart Citation
“…In Fig. 4, we show the trade-off between overhead and privacy with varying η ∈ [1,200], for χ ∈ [10,20,30,40]. From this figure, we observe that a very high level of privacy can be reached at a remarkable reduction of the overhead.…”
Section: B Data Overheadmentioning
confidence: 97%
“…In this work, we exploit consolidated privacy-preserving techniques (e.g., as those employed in [10], [11]) to compute the number of contacts that a user had with positive people, while guaranteeing that users' contacts, locations and infection status are not disclosed to illegitimate parties (see subsection III-B for further details). Differently from tokenbased solutions that only detect users' proximity, our protocol allows to compute also the number of positive persons within a given place.…”
Section: Related Workmentioning
confidence: 99%
“…In this work, we exploit consolidated privacy-preserving techniques (e.g., as those employed in [11], [12]) to compute the number of contacts that a user had with positive people, while guaranteeing that users' contacts, locations and infection status are not disclosed to illegitimate parties (see subsection III-B for further details). Differently from tokenbased solutions that only detect users' proximity, our protocol allows to compute also the number of positive persons within a given place.…”
Section: Related Workmentioning
confidence: 99%
“…Solving for k, we obtain Equation 7where p = T S a − (n access − 1)k − (n access − 2). By approximating the value of the summation we get Equation (8).…”
Section: Notation and An Examplementioning
confidence: 99%
“…In this work, we aim to find the optimal cache deployment that minimizes network resource-occupation; i.e., the amount of capacity occupied in the network to perform VoD content delivery, for a given investment in terms of storage capacity (i.e., under limited storage capacity available). Here, we note that recent debates about network-neutral-caching [6] have also addressed a similar problem: regulations of network neutrality force content providers to utilize a specific amount of storage capacity to perform caching [7,8]. In that case, however, network operators aim to minimize network resource occupation, subject to constraints given by network neutrality regulations, instead of by a limited monetary investment.…”
Section: Introductionmentioning
confidence: 99%