An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation

被引:8
|
作者
Sultan, Nazatul Haque [1 ]
Varadharajan, Vijay [1 ]
Camtepe, Seyit [2 ]
Nepal, Surya [2 ]
机构
[1] Univ Newcastle, Callaghan, Australia
[2] CSIRO Data61, Marsfield, NSW 2122, Australia
来源
关键词
Named Data Networking; Access control; Accountability; Revocation; Encryption; Authentication; Provable security; SECURE;
D O I
10.1007/978-3-030-58951-6_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a novel encryption-based access control scheme to address the access control issues in Named Data Networking (NDN). Though there have been several recent works proposing access control schemes, they are not suitable for many large scale real-world applications where content is often organized in a hierarchical manner (such as movies in Netflix) for efficient service provision. This paper uses a cryptographic technique, referred to as Role-Based Encryption, to introduce inheritance property for achieving access control over hierarchical contents. The proposed scheme encrypts the hierarchical content in such a way that any consumer who pays a higher level of subscription and is able to access (decrypt) contents in the higher part of the hierarchy is also able to access (decrypt) the content in the lower part of the hierarchy using their decryption keys. Additionally, our scheme provides many essential features such as authentication of the consumers at the very beginning before forwarding their requests into the network, accountability of the Internet Service Provider, consumers' privilege revocations, etc. In addition, we present a formal security analysis of the proposed scheme showing that the scheme is provably secure against Chosen Plaintext Attack. Moreover, we describe the performance analysis showing that our scheme achieves better results than existing schemes in terms of functionality, computation, storage, and communication overhead. Our network simulations show that the main delay in our scheme is due to cryptographic operations, which are more efficient and hence our scheme is better than the existing schemes.
引用
收藏
页码:569 / 590
页数:22
相关论文
共 50 条
  • [31] A Cloud-Based Access Control Scheme with User Revocation and Attribute Update
    Zhang, Peng
    Chen, Zehong
    Liang, Kaitai
    Wang, Shulan
    Wang, Ting
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 525 - 540
  • [32] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Xia, Zhihua
    Zhang, Liangao
    Liu, Dandan
    CHINA COMMUNICATIONS, 2016, 13 (07) : 92 - 99
  • [33] NAC: Automating Access Control via Named Data
    Zhang, Zhiyi
    Yu, Yingdi
    Ramani, Sanjeev Kaushik
    Afanasyev, Alex
    Zhang, Lixia
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 619 - 626
  • [34] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Zhihua Xia
    Liangao Zhang
    Dandan Liu
    中国通信, 2016, 13 (07) : 92 - 99
  • [35] An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks
    Tian, Ye
    Peng, Yanbin
    Peng, Xinguang
    Li, Hongbin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [36] Access control enforcement in Named Data N etworking
    Hamdane, Balkis
    Serhrouchni, Ahmed
    El Fatmi, Sihem Guemara
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 576 - +
  • [37] An efficient attribute-based hierarchical data access control scheme in cloud computing
    He, Heng
    Zheng, Liang-han
    Li, Peng
    Deng, Li
    Huang, Li
    Chen, Xiang
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [38] Fog Radio Access Networks With Hierarchical Content Delivery
    Zhong, Zhenyu
    Qin, Jianmin
    Zhong, Zeyu
    Li, Zhang
    IEEE ACCESS, 2019, 7 : 20950 - 20960
  • [39] Optimizing Data Access for Wind Farm Control over Hierarchical Communication Networks
    Madsen, Jacob
    Findrik, Mislav
    Madsen, Tatiana
    Schwefel, Hans-Peter
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,
  • [40] Accountable specific attribute-based encryption scheme for cloud access control
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,