Access-Controlled In-Network Processing of Named Data

被引:12
|
作者
Marxer, Claudio [1 ]
Scherb, Christopher [1 ]
Tschudin, Christian [1 ]
机构
[1] Univ Basel, CH-4003 Basel, Switzerland
关键词
information centric networking; named data networking; named function networking; in-network computations; security; privacy; access control;
D O I
10.1145/2984356.2984366
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In content-based security, encrypted content as well as wrapped access keys are made freely available by an Information Centric Network: Only those clients which are able to unwrap the encryption key can access the protected content. In this paper we extend this model to computation chains where derived data (e.g. produced by a Named Function Network) also has to comply to the content-based security approach. A central problem to solve is the synchronized ondemand publishing of encrypted results and wrapped keys as well as defining the set of consumers which are authorized to access the derived data. In this paper we introduce contentattendant policies and report on a running prototype that demonstrates how to enforce data owner-defined access control policies despite fully decentralized and arbitrarily long computation chains.
引用
收藏
页码:77 / 82
页数:6
相关论文
共 50 条
  • [31] In-network data processing in wireless sensor networks using compressed sensing
    Singh, Vishal Krishna
    Kumar, Manish
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2018, 26 (03) : 174 - 189
  • [32] A distributed minimum-distortion routing algorithm with in-network data processing
    Khalili, Ramin
    Kurose, Jim
    [J]. 27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 296 - 300
  • [33] Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey
    Sorniotti, Alessandro
    Gomez, Laurent
    Wrona, Konrad
    Odorico, Lorenzo
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (03): : 189 - 199
  • [34] Programmable access-controlled and generic erasable PUF design and its applications
    Chenglu Jin
    Wayne Burleson
    Marten van Dijk
    Ulrich Rührmair
    [J]. Journal of Cryptographic Engineering, 2022, 12 : 413 - 432
  • [35] A Programmable Data Plane to Support In-network Data Processing in Software-Defined IoT
    Kim, Ki-Wook
    Min, Sung-Gi
    Han, Youn-Hee
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 855 - 860
  • [36] Collaborative In-Network Processing for Target Tracking
    Juan Liu
    James Reich
    Feng Zhao
    [J]. EURASIP Journal on Advances in Signal Processing, 2003
  • [37] In-network join processing for sensor networks
    Yu, H
    Lim, EP
    Zhang, J
    [J]. FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 263 - 274
  • [38] Collaborative in-network processing for target tracking
    Liu, J
    Reich, J
    Zhao, F
    [J]. EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2003, 2003 (04) : 378 - 391
  • [39] Expectation aware in-network context processing
    Sigg, Stephan
    Beigl, Michael
    [J]. 4TH ACM INTERNATIONAL WORKSHOP ON CONTEXT-AWARENESS FOR SELF-MANAGING SYSTEMS (CASEMANS 2010), 2010, : 59 - 64
  • [40] Security Constraints in Temporal Role-Based Access-Controlled Workflows
    Combi, Carlo
    Vigano, Luca
    Zavatteri, Matteo
    [J]. CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 207 - 218