Achieving Secure and Scalable Data Access Control in Information-Centric Networking

被引:0
|
作者
Zheng, Qingji [1 ]
Wang, Guoqiang [1 ]
Ravindran, Ravishankar [1 ]
Azgin, Aytac [1 ]
机构
[1] Huawei Res Ctr, Santa Clara, CA USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Shifting from host-oriented to data-oriented, information-centric networking (ICN) adopts several key design principles, e.g., in-network caching, to cope with the tremendous internet growth. In the ICN setting, data to be distributed can be cached by ICN routers anywhere and accessed arbitrarily by customers without data publishers' permission, which imposes new challenges when achieving data access control: (i) security: How can data publishers protect data confidentiality (either data cached by ICN routers or data accessed by authorized users) even when an authorized user's decryption key was revoked or compromised, and (ii) scalability: How can data publishers leverage ICN's promising features and enforce access control without complicated key management or extensive communication. This paper addresses these challenges by using the new proposed dual-phase encryption that uniquely combines the ideas from one-time decryption key, proxy re-encryption and all-or-nothing transformation, while still being able to leverage ICN's features. Our analysis and performance show that our solution is highly efficient and provable secure under the existing security model.
引用
收藏
页码:5367 / 5373
页数:7
相关论文
共 50 条
  • [1] Scalable and Secure Information-Centric Networking
    Yan, Zhiwei
    Chiang, Hua-Pei
    Park, Yong-Jin
    Lee, Xiaodong
    Huang, Yueh-Min
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (06): : 867 - 880
  • [2] SBAC: A secure blockchain-based access control framework for information-centric networking
    Lyu, Qiuyun
    Qi, Yizhen
    Zhang, Xiaochen
    Liu, Huaping
    Wang, Qiuhua
    Zheng, Ning
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 149
  • [3] Enforcing Access Control in Information-Centric Edge Networking
    Wu, Danye
    Xu, Zhiwei
    Chen, Bo
    Zhang, Yujun
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (01) : 353 - 364
  • [4] Access Control Enforcement Delegation for Information-Centric Networking Architectures
    Fotiou, Nikos
    Marias, Giannis F.
    Polyzos, George C.
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (04) : 497 - 502
  • [5] Security, Privacy, and Access Control in Information-Centric Networking: A Survey
    Tourani, Reza
    Misra, Satyajayant
    Mick, Travis
    Panwar, Gaurav
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01): : 566 - 600
  • [6] A Distributed Capability Access Control Scheme in Information-Centric Networking
    Cha, Jung-Hwan
    Han, Youn-Hee
    Min, Sung-Gi
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (05) : 1121 - 1130
  • [7] Scalable and efficient file sharing in information-centric networking
    Kim, Younghoon
    Yeom, Ikjun
    Bi, Jun
    Kim, Yusung
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 57 : 21 - 32
  • [8] Scalable Mobile Backhauling via Information-Centric Networking
    Carofiglio, Giovanna
    Gallo, Massimo
    Muscariello, Luca
    Perino, Diego
    [J]. 2015 IEEE 21ST INTERNATIONAL WORKSHOP ON LOCAL & METROPOLITAN AREA NETWORKS (LANMAN), 2015,
  • [9] Secure Distribution of Protected Content in Information-Centric Networking
    Bilal, Muhammad
    Pack, Sangheon
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1921 - 1932
  • [10] Secure Function Chaining Enabled by Information-Centric Networking
    Bahrami, Mehdi
    Xie, Liguang
    Liu, Lei
    Ito, Akira
    Peng, Yang
    Mnatsakanyan, Sevak
    Ye, Zilong
    Guo, Huiping
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 415 - 421