An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation

被引:8
|
作者
Sultan, Nazatul Haque [1 ]
Varadharajan, Vijay [1 ]
Camtepe, Seyit [2 ]
Nepal, Surya [2 ]
机构
[1] Univ Newcastle, Callaghan, Australia
[2] CSIRO Data61, Marsfield, NSW 2122, Australia
来源
关键词
Named Data Networking; Access control; Accountability; Revocation; Encryption; Authentication; Provable security; SECURE;
D O I
10.1007/978-3-030-58951-6_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a novel encryption-based access control scheme to address the access control issues in Named Data Networking (NDN). Though there have been several recent works proposing access control schemes, they are not suitable for many large scale real-world applications where content is often organized in a hierarchical manner (such as movies in Netflix) for efficient service provision. This paper uses a cryptographic technique, referred to as Role-Based Encryption, to introduce inheritance property for achieving access control over hierarchical contents. The proposed scheme encrypts the hierarchical content in such a way that any consumer who pays a higher level of subscription and is able to access (decrypt) contents in the higher part of the hierarchy is also able to access (decrypt) the content in the lower part of the hierarchy using their decryption keys. Additionally, our scheme provides many essential features such as authentication of the consumers at the very beginning before forwarding their requests into the network, accountability of the Internet Service Provider, consumers' privilege revocations, etc. In addition, we present a formal security analysis of the proposed scheme showing that the scheme is provably secure against Chosen Plaintext Attack. Moreover, we describe the performance analysis showing that our scheme achieves better results than existing schemes in terms of functionality, computation, storage, and communication overhead. Our network simulations show that the main delay in our scheme is due to cryptographic operations, which are more efficient and hence our scheme is better than the existing schemes.
引用
收藏
页码:569 / 590
页数:22
相关论文
共 50 条
  • [1] Access control scheme with attribute revocation for SWIM
    Wu Zhijun
    Cui Zihan
    Wang Caiyun
    Lei Jin
    The Journal of China Universities of Posts and Telecommunications, 2017, (06) : 49 - 54
  • [2] Access control scheme with attribute revocation for SWIM
    Wu Zhijun
    Cui Zihan
    Wang Caiyun
    Lei Jin
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2017, 24 (06) : 49 - 54
  • [3] Access Control Mechanisms in Named Data Networks: A Comprehensive Survey
    Nour, Boubakr
    Khelifi, Hakima
    Hussain, Rasheed
    Mastorakis, Spyridon
    Moungla, Hassine
    ACM COMPUTING SURVEYS, 2022, 54 (03)
  • [4] Secure Content Distribution with Access Control Enforcement in Named Data Networking
    Htet Hlaing, Htet
    Funamoto, Yuki
    Mambo, Masahiro
    SENSORS, 2021, 21 (13)
  • [5] A dynamic data access control scheme for hierarchical structures in big data
    Deng, Xinxin
    Peng, Changgen
    Yang, Haoxuan
    Peng, Zongfeng
    Zhong, Chongyi
    COMPUTER COMMUNICATIONS, 2024, 220 : 128 - 137
  • [6] A Secure Content Sharing Scheme Based on Blockchain in Vehicular Named Data Networks
    Chen, Chen
    Wang, Cong
    Qiu, Tie
    Lv, Ning
    Pei, Qingqi
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (05) : 3278 - 3289
  • [7] ESAC: An Efficient and Secure Access Control Scheme in Vehicular Named Data Networking
    Jiang, Shunrong
    Liu, Jianqing
    Wang, Liangmin
    Zhou, Yong
    Fang, Yuguang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (09) : 10252 - 10263
  • [8] A hierarchical access control scheme in ad-hoc wireless networks
    Hernández-Goya, C
    Caballero-Gil, P
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 242 - 245
  • [9] LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking
    Li, Qi
    Zhang, Xinwen
    Zheng, Qingji
    Sandhu, Ravi
    Fu, Xiaoming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) : 308 - 320
  • [10] A fine-grained access control and revocation scheme on clouds
    Tu, Shan-shan
    Niu, Shao-zhang
    Li, Hui
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (06): : 1697 - 1714