ICC 2019 - 2019 IEEE International Conference on Communications (ICC) 2019
DOI: 10.1109/icc.2019.8761596
|View full text |Cite
|
Sign up to set email alerts
|

An Open Privacy-Preserving and Scalable Protocol for a Network-Neutrality Compliant Caching

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 11 publications
1
9
0
Order By: Relevance
“…An example of this type of subdivision, that we refer to as popularity-driven, is the following: given a cache server that can store an average number of 1000 contents, a CP that owns 500 out the 1000 most requested contents from the users of the ISP is assigned 50% of the available cache storage. Consistently with our previous works [4], [5], we consider the popularity-driven subdivision to be both NNcompliant and effective. In fact, it is NN-compliant since it guarantees the CPs a neutral treatment (because the storage is assigned only based on their attractiveness and not on arbitrary forms of agreement with the ISP), but also effective for the ISP, that experiences the highest reduction of its network resource occupation when the most popular contents are served directly from its area.…”
Section: Introductionsupporting
confidence: 53%
See 3 more Smart Citations
“…An example of this type of subdivision, that we refer to as popularity-driven, is the following: given a cache server that can store an average number of 1000 contents, a CP that owns 500 out the 1000 most requested contents from the users of the ISP is assigned 50% of the available cache storage. Consistently with our previous works [4], [5], we consider the popularity-driven subdivision to be both NNcompliant and effective. In fact, it is NN-compliant since it guarantees the CPs a neutral treatment (because the storage is assigned only based on their attractiveness and not on arbitrary forms of agreement with the ISP), but also effective for the ISP, that experiences the highest reduction of its network resource occupation when the most popular contents are served directly from its area.…”
Section: Introductionsupporting
confidence: 53%
“…In this work, we focus on the technical implementation of a protocol that enables the enforcement of NN-compliant caching. Specifically, we extend our work in [5], in which we designed a protocol that guarantees (i) NN compliance, (ii) scalability (e.g., with respect to the number of CPs) and (iii) privacy (CPs and ISP are not required to exchange sensitive information with each other). The main limitations of the protocol in [5] are that the available cache storage is not fully utilized and all the contents are required to be of the same size.…”
Section: A Related Work 1) Network-neutral Cachingmentioning
confidence: 99%
See 2 more Smart Citations
“…In this work, we aim to find the optimal cache deployment that minimizes network resource-occupation; i.e., the amount of capacity occupied in the network to perform VoD content delivery, for a given investment in terms of storage capacity (i.e., under limited storage capacity available). Here, we note that recent debates about network-neutral-caching [6] have also addressed a similar problem: regulations of network neutrality force content providers to utilize a specific amount of storage capacity to perform caching [7,8]. In that case, however, network operators aim to minimize network resource occupation, subject to constraints given by network neutrality regulations, instead of by a limited monetary investment.…”
Section: Introductionmentioning
confidence: 99%