SEANAC: Schema Enforced Automation of Name-based Access Control

被引:0
|
作者
Podder, Proyash [1 ]
Afanasyev, Alexander [1 ]
机构
[1] Florida Int Univ, Miami, FL 33199 USA
关键词
Named Data Networking; Access Control Policy; Name-based Access Control;
D O I
10.1109/ICNC57223.2023.10073994
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Name-based Access Control (NAC) facilitates access control by utilizing NDN's data-centric security and naming convention. NAC design includes three agents: (a) Encryptors, (b) Decryptors, and (c) Access Manager. Encryptors encrypts the content (data) symmetrically using a Content Key (CK). This CK is later encrypted asymmetrically using a Key Encryption Key (KEK). A corresponding KDK is used to decrypt the CK first by the decryptor, and eventually decrypt the content using that CK. Note that, KDK is private and access manager will provide a KDK only to a certain entity if it has access to that data. Access manager is responsible for generating and managing both KEK and KDK. However, in NAC design, there is not any specific mention of how an access manager gets the knowledge of following two things: (a) which KEK will be used to encrypt which CK and (b) which users will have access to which KDK. On the implementation side, these two things are configured manually. However, is a system with a significant number of entities, manually configuring this would not be a feasible approach. Therefore, to automate this process, we have proposed SEANAC, which is a schema-enforced approach to automate the overall NAC process by addressing the two issues mentioned above. In this paper, we have described our design choices and implementation details of SEANAC. Besides, we have evaluated our approach by experimenting with an NDN-based application, Hydra; what are the access control requirements of Hydra, and how SEANAC can be used to fulfill those requirements and build an automated access control system.
引用
收藏
页码:586 / 590
页数:5
相关论文
共 50 条
  • [31] A Study of Assimilation Bias in Name-Based Sampling of Migrants
    Schnell, Rainer
    Trappmann, Mark
    Gramlich, Tobias
    JOURNAL OF OFFICIAL STATISTICS, 2014, 30 (02) : 231 - 249
  • [32] Name-based demographic inference and the unequal distribution of misrecognition
    Jeffrey W. Lockhart
    Molly M. King
    Christin Munsch
    Nature Human Behaviour, 2023, 7 : 1084 - 1095
  • [33] Name-based autoconfiguration for mobile ad hoc networks
    Kim, N
    Kang, S
    Lee, Y
    Lee, B
    Odu, BO
    ETRI JOURNAL, 2006, 28 (02) : 243 - 246
  • [34] Name-based surveillance for HIV-infected persons
    Brewer, DD
    Potterat, JJ
    ANNALS OF INTERNAL MEDICINE, 2000, 132 (11) : 922 - 923
  • [35] A Schema Based Approach to Valid XML Access Control
    Byun, Changwoo
    Park, Seog
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (05) : 1719 - 1739
  • [36] DeepBugs: A Learning Approach to Name-Based Bug Detection
    Pradel, Michael
    Sen, Koushik
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2018, 2
  • [37] CONSERT: Constructing optimal name-based routing tables
    Dai, Huichen
    Liu, Bin
    COMPUTER NETWORKS, 2016, 94 : 62 - 79
  • [38] DeepBugs: A Learning Approach to Name-Based Bug Detection
    Pradel, Michael
    Sen, Koushik
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2018, 2
  • [39] DeepBugs: A learning approach to name-based bug detection
    Pradel M.
    Sen K.
    Proceedings of the ACM on Programming Languages, 2018, 2 (OOPSLA)
  • [40] HIV testing after implementation of name-based reporting
    Solomon, L
    Benjamin, G
    Wasserman, M
    JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 1999, 281 (15): : 1378 - 1379