SEANAC: Schema Enforced Automation of Name-based Access Control

被引:0
|
作者
Podder, Proyash [1 ]
Afanasyev, Alexander [1 ]
机构
[1] Florida Int Univ, Miami, FL 33199 USA
关键词
Named Data Networking; Access Control Policy; Name-based Access Control;
D O I
10.1109/ICNC57223.2023.10073994
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Name-based Access Control (NAC) facilitates access control by utilizing NDN's data-centric security and naming convention. NAC design includes three agents: (a) Encryptors, (b) Decryptors, and (c) Access Manager. Encryptors encrypts the content (data) symmetrically using a Content Key (CK). This CK is later encrypted asymmetrically using a Key Encryption Key (KEK). A corresponding KDK is used to decrypt the CK first by the decryptor, and eventually decrypt the content using that CK. Note that, KDK is private and access manager will provide a KDK only to a certain entity if it has access to that data. Access manager is responsible for generating and managing both KEK and KDK. However, in NAC design, there is not any specific mention of how an access manager gets the knowledge of following two things: (a) which KEK will be used to encrypt which CK and (b) which users will have access to which KDK. On the implementation side, these two things are configured manually. However, is a system with a significant number of entities, manually configuring this would not be a feasible approach. Therefore, to automate this process, we have proposed SEANAC, which is a schema-enforced approach to automate the overall NAC process by addressing the two issues mentioned above. In this paper, we have described our design choices and implementation details of SEANAC. Besides, we have evaluated our approach by experimenting with an NDN-based application, Hydra; what are the access control requirements of Hydra, and how SEANAC can be used to fulfill those requirements and build an automated access control system.
引用
收藏
页码:586 / 590
页数:5
相关论文
共 50 条
  • [21] The quality of name-based species records in databases
    Santos, Antonio M.
    Branco, Madalena
    TRENDS IN ECOLOGY & EVOLUTION, 2012, 27 (01) : 6 - 7
  • [22] Hierarchical Name-based Route Aggregation Scheme
    Xu Z.-W.
    Chen B.
    Zhang Y.-J.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (02): : 381 - 398
  • [23] Cryptographically enforced personalized role-based access control
    Petkovic, Milan
    Conrado, Claudine
    Hammoutene, Malik
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 364 - +
  • [24] SNGR: Scalable Name-Based Geometric Routing for ICN
    Sun, Yanbin
    Zhang, Yu
    Fang, Binxing
    Zhang, Hongli
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (08) : 1835 - 1845
  • [25] Using name-based mappings to increase hit rates
    Thaler, DG
    Ravishankar, CV
    IEEE-ACM TRANSACTIONS ON NETWORKING, 1998, 6 (01) : 1 - 14
  • [26] CANR: CACHE-AWARE NAME-BASED ROUTING
    Hu, Xiaoyan
    Gong, Jian
    2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), 2014, : 212 - 217
  • [27] Cryptographically Enforced Access Control in Blockchain-Based Platforms
    Ghaffaripour, Shadan
    Miri, Ali
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [28] Name-based demographic inference and the unequal distribution of misrecognition
    Lockhart, Jeffrey. W. W.
    King, Molly. M. M.
    Munsch, Christin
    NATURE HUMAN BEHAVIOUR, 2023, 7 (07) : 1084 - +
  • [29] Name-Based Address Mapping for Virtual Private Networks
    Suranyi, Peter
    Shinjo, Yasushi
    Kato, Kazuhiko
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2009, E92B (01) : 200 - 208
  • [30] Name-Based Analysis of Equally Typed Method Arguments
    Pradel, Michael
    Gross, Thomas R.
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2013, 39 (08) : 1127 - 1143