SEANAC: Schema Enforced Automation of Name-based Access Control

被引:0
|
作者
Podder, Proyash [1 ]
Afanasyev, Alexander [1 ]
机构
[1] Florida Int Univ, Miami, FL 33199 USA
关键词
Named Data Networking; Access Control Policy; Name-based Access Control;
D O I
10.1109/ICNC57223.2023.10073994
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Name-based Access Control (NAC) facilitates access control by utilizing NDN's data-centric security and naming convention. NAC design includes three agents: (a) Encryptors, (b) Decryptors, and (c) Access Manager. Encryptors encrypts the content (data) symmetrically using a Content Key (CK). This CK is later encrypted asymmetrically using a Key Encryption Key (KEK). A corresponding KDK is used to decrypt the CK first by the decryptor, and eventually decrypt the content using that CK. Note that, KDK is private and access manager will provide a KDK only to a certain entity if it has access to that data. Access manager is responsible for generating and managing both KEK and KDK. However, in NAC design, there is not any specific mention of how an access manager gets the knowledge of following two things: (a) which KEK will be used to encrypt which CK and (b) which users will have access to which KDK. On the implementation side, these two things are configured manually. However, is a system with a significant number of entities, manually configuring this would not be a feasible approach. Therefore, to automate this process, we have proposed SEANAC, which is a schema-enforced approach to automate the overall NAC process by addressing the two issues mentioned above. In this paper, we have described our design choices and implementation details of SEANAC. Besides, we have evaluated our approach by experimenting with an NDN-based application, Hydra; what are the access control requirements of Hydra, and how SEANAC can be used to fulfill those requirements and build an automated access control system.
引用
收藏
页码:586 / 590
页数:5
相关论文
共 50 条
  • [1] Name-based Routing in Virtual Automation Networks
    Messerschmidt, Ralf
    Neumann, Peter
    Lindemann, Lars
    AUTOMATION 2010, 2010, : 445 - 448
  • [2] NAC: Name-Based Access Control in Named Data Networking
    Zhang, Zhiyi
    Yu, Yingdi
    Afanasyev, Alexander
    Burke, Jeff
    Zhang, Lixia
    PROCEEDINGS OF THE 4TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN 2017), 2017, : 186 - 187
  • [3] Secure Sharing of Spatio-Temporal Data through Name-based Access Control
    Fan, Laqin
    Wang, Lan
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
  • [4] Name-based Shim6: A name-based approach to host mobility
    Ming, Zhongxing
    Ubillos, Javier
    Xu, Mingwei
    MOBILE COMPUTING AND COMMUNICATIONS REVIEW, 2011, 15 (04) : 46 - 48
  • [5] Name-Based Cluster Sampling
    Ferguson, Douglas A.
    SOCIOLOGICAL METHODS & RESEARCH, 2009, 37 (04) : 590 - 598
  • [6] Comment on name-based reporting
    Catania, Joseph A.
    Osmond, Dennis
    AMERICAN JOURNAL OF PUBLIC HEALTH, 2008, 98 (10) : 1735 - 1736
  • [7] Name-Based Estimators of Intergenerational Mobility
    Santavirta, Torsten
    Stuhler, Jan
    ECONOMIC JOURNAL, 2024, 134 (663): : 2982 - 3016
  • [8] Enhancing Scalable Name-Based Forwarding
    Yuan, Haowei
    Crowley, Patrick
    Song, Tian
    2017 ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS), 2017, : 60 - 69
  • [9] Enabling NAME-Based Security and Trust
    Fotiou, Nikos
    Polyzos, George C.
    TRUST MANAGEMENT IX, 2015, 454 : 47 - 59
  • [10] A Feasibility Evaluation on Name-Based Routing
    Hwang, Haesung
    Ata, Shingo
    Murata, Masayuki
    IP OPERATIONS AND MANAGEMENT, PROCEEDINGS, 2009, 5843 : 130 - +