An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation

被引:8
|
作者
Sultan, Nazatul Haque [1 ]
Varadharajan, Vijay [1 ]
Camtepe, Seyit [2 ]
Nepal, Surya [2 ]
机构
[1] Univ Newcastle, Callaghan, Australia
[2] CSIRO Data61, Marsfield, NSW 2122, Australia
来源
关键词
Named Data Networking; Access control; Accountability; Revocation; Encryption; Authentication; Provable security; SECURE;
D O I
10.1007/978-3-030-58951-6_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a novel encryption-based access control scheme to address the access control issues in Named Data Networking (NDN). Though there have been several recent works proposing access control schemes, they are not suitable for many large scale real-world applications where content is often organized in a hierarchical manner (such as movies in Netflix) for efficient service provision. This paper uses a cryptographic technique, referred to as Role-Based Encryption, to introduce inheritance property for achieving access control over hierarchical contents. The proposed scheme encrypts the hierarchical content in such a way that any consumer who pays a higher level of subscription and is able to access (decrypt) contents in the higher part of the hierarchy is also able to access (decrypt) the content in the lower part of the hierarchy using their decryption keys. Additionally, our scheme provides many essential features such as authentication of the consumers at the very beginning before forwarding their requests into the network, accountability of the Internet Service Provider, consumers' privilege revocations, etc. In addition, we present a formal security analysis of the proposed scheme showing that the scheme is provably secure against Chosen Plaintext Attack. Moreover, we describe the performance analysis showing that our scheme achieves better results than existing schemes in terms of functionality, computation, storage, and communication overhead. Our network simulations show that the main delay in our scheme is due to cryptographic operations, which are more efficient and hence our scheme is better than the existing schemes.
引用
收藏
页码:569 / 590
页数:22
相关论文
共 50 条
  • [41] An efficient adaptive cache management scheme for named data networks
    Reshadinezhad, Amir
    Khayyambashi, Mohammad Reza
    Movahedinia, Naser
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 148 : 79 - 92
  • [42] Mobility Study for Named Data Networking in Wireless Access Networks
    Azgin, Aytac
    Ravindran, Ravishankar
    Wang, Guoqiang
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3252 - 3257
  • [43] Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks
    He, Daojing
    Chan, Sammy
    Guizani, Mohsen
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (01) : 389 - 398
  • [44] TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things
    Liu, Chunchi
    Xu, Minghui
    Guo, Hechuan
    Cheng, Xiuzhen
    Xiao, Yinhao
    Yu, Dongxiao
    Gong, Bei
    Yerukhimovich, Arkady
    Wang, Shengling
    Lyu, Weifeng
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 6133 - 6148
  • [45] An Efficient Dynamic Fine Grained Access Control Scheme for Secure Data Access in Cloud Networks
    Chatterjee, Santanu
    Gupta, Amit Kumar
    Sudhakar, G. V.
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES, 2015,
  • [46] Fine-grained Access Control and Revocation for Sharing Data on Clouds
    Tu, Shan-shan
    Niu, Shao-zhang
    Li, Hui
    Yun Xiao-ming
    Li, Meng-jiao
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 2146 - 2155
  • [47] Convertible Authenticated Encryption Scheme with Hierarchical Access Control
    Hsu, Chien-Lung
    Lin, Han-Yu
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03): : 1239 - 1246
  • [48] A centralized key management scheme for hierarchical access control
    Zhang, Q
    Wang, YK
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2067 - 2071
  • [49] Cryptographic key assignment scheme for hierarchical access control
    Wu, TC
    Chang, CC
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2001, 16 (01): : 25 - 28
  • [50] Enabling Critical Content Dissemination in Vehicular Named Data Networks
    Yaqub, Muhammad Azfar
    Ahmed, Syed Hassan
    Bouk, Safdar Hussain
    Kim, Dongkyun
    PROCEEDINGS OF THE 2018 CONFERENCE ON RESEARCH IN ADAPTIVE AND CONVERGENT SYSTEMS (RACS 2018), 2018, : 94 - 99