An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation

被引:8
|
作者
Sultan, Nazatul Haque [1 ]
Varadharajan, Vijay [1 ]
Camtepe, Seyit [2 ]
Nepal, Surya [2 ]
机构
[1] Univ Newcastle, Callaghan, Australia
[2] CSIRO Data61, Marsfield, NSW 2122, Australia
来源
关键词
Named Data Networking; Access control; Accountability; Revocation; Encryption; Authentication; Provable security; SECURE;
D O I
10.1007/978-3-030-58951-6_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a novel encryption-based access control scheme to address the access control issues in Named Data Networking (NDN). Though there have been several recent works proposing access control schemes, they are not suitable for many large scale real-world applications where content is often organized in a hierarchical manner (such as movies in Netflix) for efficient service provision. This paper uses a cryptographic technique, referred to as Role-Based Encryption, to introduce inheritance property for achieving access control over hierarchical contents. The proposed scheme encrypts the hierarchical content in such a way that any consumer who pays a higher level of subscription and is able to access (decrypt) contents in the higher part of the hierarchy is also able to access (decrypt) the content in the lower part of the hierarchy using their decryption keys. Additionally, our scheme provides many essential features such as authentication of the consumers at the very beginning before forwarding their requests into the network, accountability of the Internet Service Provider, consumers' privilege revocations, etc. In addition, we present a formal security analysis of the proposed scheme showing that the scheme is provably secure against Chosen Plaintext Attack. Moreover, we describe the performance analysis showing that our scheme achieves better results than existing schemes in terms of functionality, computation, storage, and communication overhead. Our network simulations show that the main delay in our scheme is due to cryptographic operations, which are more efficient and hence our scheme is better than the existing schemes.
引用
收藏
页码:569 / 590
页数:22
相关论文
共 50 条
  • [21] RRMAC: A Multi-Data Owner Access Control Scheme With Robust Revocation for Co-Owned Data Sharing
    Li, Bei
    Zhong, Hong
    Cui, Jie
    Gu, Chengjie
    He, Debiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 1206 - 1221
  • [22] LQCC: A Link Quality-based Congestion Control Scheme in Named Data Networks
    Khelifi, Hakima
    Luo, Senlin
    Nourz, Boubakr
    Moungla, Hassine
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [23] An interest-based access control scheme via edge verification in Named Data Networking
    Tao, Yu
    Zhu, Yi
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (10)
  • [24] FGAC-NDN: Fine-Grained Access Control for Named Data Networks
    Tseng, Yi-Fan
    Fan, Chun-, I
    Wu, Chin-Yu
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (01): : 143 - 152
  • [25] An Access Control Mechanism to Ensure Privacy in Named Data Networking using Attribute-based Encryption with Immediate Revocation of Privileges
    da Silva, Roan Simoes
    Zorzo, Sergio Donizetti
    2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 128 - 133
  • [26] A Secure Dynamic Content Delivery Scheme in Named Data Networking
    Zhang, Jiancong
    Li, Shining
    Wang, Changhao
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [27] An efficient fine-grained access control scheme for hierarchical wireless sensor networks
    Chatterjee, Santanu
    Roy, Sandip
    Chattopadhyay, Samiran
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2018, 29 (03) : 161 - 180
  • [28] Path Switching in Content Centric and Named Data Networks
    Moiseenko, Ilya
    Oran, Dave
    PROCEEDINGS OF THE 4TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN 2017), 2017, : 66 - 76
  • [29] An Efficient Content Retrieval and Content Placement Approach for Named Data Networks
    Kumari, Matta Krishna
    Tripathi, Nikhil
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 603 - 608
  • [30] A Practical Congestion Control Scheme for Named Data Networking
    Schneider, Klaus
    Yi, Cheng
    Zhang, Beichuan
    Zhang, Lixia
    PROCEEDINGS OF THE 2016 3RD ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ACM-ICN '16), 2016, : 21 - 30