An End-To-End Encrypted Cache System with Time-Dependent Access Control
Authors:
Keita Emura,
Masato Yoshimi
Abstract:
Due to the increasing use of encrypted communication, such as Transport Layer Security (TLS), encrypted cache systems are a promising approach for providing communication efficiency and privacy. Cache-22 is an encrypted cache system (Emura et al. ISITA 2020) that makes it possible to significantly reduce communication between a cache server and a service provider. In the final procedure of Cache-2…
▽ More
Due to the increasing use of encrypted communication, such as Transport Layer Security (TLS), encrypted cache systems are a promising approach for providing communication efficiency and privacy. Cache-22 is an encrypted cache system (Emura et al. ISITA 2020) that makes it possible to significantly reduce communication between a cache server and a service provider. In the final procedure of Cache-22, the service provider sends the corresponding decryption key to the user via TLS and this procedure allows the service provider to control which users can access the contents. For example, if a user has downloaded ciphertexts of several episodes of a show, the service provider can decide to provide some of the contents (e.g., the first episode) available for free while requiring a fee for the remaining contents. However, no concrete access control method has been implemented in the original Cache-22 system. In this paper, we add a scalable access control protocol to Cache-22. Specifically, we propose a time-dependent access control that requires a communication cost of $O(\log T_{\sf max})$ where $T_{\sf max}$ is the maximum time period. Although the protocol is stateful, we can provide time-dependent access control with scalability at the expense of this key management. We present experimental results and demonstrate that the modified system is effective for controlling access rights. We also observe a relationship between cache capacity and network traffic because the number of duplicated contents is higher than that in the original Cache-22 system, due to time-dependent access control.
△ Less
Submitted 22 February, 2023;
originally announced February 2023.
A use case of Content Delivery Network raw logfile analysis
Authors:
Hoang-Loc La,
Anh-Tu Ngoc Tran,
Quang-Trai Le,
Masato Yoshimi,
Takuma Nakajima,
Nam Thoai
Abstract:
The growth of video streaming has stretched the Internet to its limitation. In other words, the Internet was originally devised to connect a limited number of computers so that they can share network resources, so the Internet cannot handle a large amount of traffic at a time, which leads to network congestion. To overcome this, CDNs are built on top of the Internet as an overlay to efficiently st…
▽ More
The growth of video streaming has stretched the Internet to its limitation. In other words, the Internet was originally devised to connect a limited number of computers so that they can share network resources, so the Internet cannot handle a large amount of traffic at a time, which leads to network congestion. To overcome this, CDNs are built on top of the Internet as an overlay to efficiently store and swiftly disseminate contents to users by placing many servers and data centers around the globe. The topic of CDNs has been extensively studied in the last several decades. However, there is still a certain gap between theories in academia and current technologies in industry. In this paper, we take a close look at the design, implementation, solution, and performance of a CDN system by analyzing its raw log files. Specifically, its infrastructure and system design are first presented, and then we conduct a trace-based study to understand user access patterns, the sources of requests, system performance, and how such information can be used to improve the whole CDN system.
△ Less
Submitted 17 June, 2021; v1 submitted 12 June, 2021;
originally announced June 2021.