Access-Controlled In-Network Processing of Named Data

被引:12
|
作者
Marxer, Claudio [1 ]
Scherb, Christopher [1 ]
Tschudin, Christian [1 ]
机构
[1] Univ Basel, CH-4003 Basel, Switzerland
关键词
information centric networking; named data networking; named function networking; in-network computations; security; privacy; access control;
D O I
10.1145/2984356.2984366
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In content-based security, encrypted content as well as wrapped access keys are made freely available by an Information Centric Network: Only those clients which are able to unwrap the encryption key can access the protected content. In this paper we extend this model to computation chains where derived data (e.g. produced by a Named Function Network) also has to comply to the content-based security approach. A central problem to solve is the synchronized ondemand publishing of encrypted results and wrapped keys as well as defining the set of consumers which are authorized to access the derived data. In this paper we introduce contentattendant policies and report on a running prototype that demonstrates how to enforce data owner-defined access control policies despite fully decentralized and arbitrarily long computation chains.
引用
收藏
页码:77 / 82
页数:6
相关论文
共 50 条
  • [1] In-Network Live Stream Processing with Named Functions
    Scherb, Christopher
    Marxer, Claudio
    Schnurrenberger, Urs
    Tschudin, Christian
    [J]. 2017 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS, 2017,
  • [2] Poster: In-Network Retransmissions in Named Data Networking
    Ben Abraham, Hila
    Crowley, Patrick
    [J]. PROCEEDINGS OF THE 2016 3RD ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ACM-ICN '16), 2016, : 209 - 210
  • [3] AYA: "AN EFFICIENT ACCESS-CONTROLLED STORAGE AND PROCESSING FOR CLOUD-BASED SENSED DATA"
    Martin, Konan
    Wang, Wenyong
    [J]. 2015 12TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2015, : 130 - 134
  • [4] Popularity-Aware In-Network Caching for Edge Named Data Network
    Yin, Jiliang
    Jiang, Congfeng
    Mino, Hidetoshi
    Cerin, Christophe
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [5] A Hybrid Coordination Approach of In-network Caching for Named Data Networking
    Chang, Chih Yen
    Chang, Ming Sang
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (04): : 285 - 299
  • [6] Distributed Optimization Framework for In-Network Data Processing
    Nazemi, Sepideh
    Leung, Kin K.
    Swami, Ananthram
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2019, 27 (06) : 2432 - 2443
  • [7] In-network Cache Size Allocation for Video Streaming on Named Data Networking
    Zhang, Yuanzun
    Tan, Xiaobin
    Li, Weiping
    [J]. PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 18 - 23
  • [8] Access-controlled resource discovery for pervasive networks
    Sarath, BRS
    Govindaraj, P
    [J]. 23RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, 2003, : 776 - 781
  • [9] Visually Identifying Potential Sensitive Information Leaks in Access-Controlled Data Services
    Eng, Kalvin
    [J]. 2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2019), 2019, : 132 - 134
  • [10] Access-controlled resource discovery in pervasive networks
    Raman, S
    Clarke, D
    Burnside, M
    Devadas, S
    Rivest, R
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2004, 16 (11): : 1099 - 1120