Rendezvous-based access control for information-centric architectures

被引:4
|
作者
Fotiou, Nikos [1 ]
Alzahrani, Bander A. [2 ]
机构
[1] Athens Univ Econ & Business, Mobile Multimedia Lab, Sch Informat Sci & Technol, Dept Informat, 76 Patis, Athens 10434, Greece
[2] King Abdulaziz Univ, Coll Comp & Informat Technol, Jeddah, Saudi Arabia
关键词
identity-based encryption; proxy re-encryption; publish-subscribe Internet;
D O I
10.1002/nem.2007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information-centric networking (ICN) has been in the spotlight of many research efforts as it shifts the focus from (endpoint) locations to content items themselves. By leveraging content centrism and by using content and content names as the main pillar of all (inter-)networking functions, ICN architectures are expected to overcome many of the limitations of the current Internet architecture. Information-centric networking paradigm also advocates a shift in security solutions: Instead of securing the communication channel, ICN security solutions should secure the content itself. Therefore, end users should be able to access content stored in various locations in the networkeven unsecuredin a private and secure way. Similarly, content owners should not lose the governance of their content items, no matter the network location where they are stored. In this paper, we design, implement, and evaluate an access control delegation mechanism for the publish-subscribe Internet architecture. Our solution does not introduce any new entity; instead it allows semitrusted publish-subscribe Internet rendezvous points to enforce access control policies. Moreover, our solution leverages identity-based proxy re-encryption to protect content confidentiality in the presences of malicious publishers, ie, nodes that host content items and do not respect the access control decisions of the rendezvous point.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Access Control Enforcement Delegation for Information-Centric Networking Architectures
    Fotiou, Nikos
    Marias, Giannis F.
    Polyzos, George C.
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (04) : 497 - 502
  • [2] Distributed access control for information-centric networking architectures using verifiable credentials
    Alzahrani, Bander
    Fotiou, Nikos
    Albeshri, Aiiad
    Almuhaimeed, Abdullah
    Alsubhi, Khalid
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (02) : 467 - 478
  • [3] Distributed access control for information-centric networking architectures using verifiable credentials
    Bander Alzahrani
    Nikos Fotiou
    Aiiad Albeshri
    Abdullah Almuhaimeed
    Khalid Alsubhi
    [J]. International Journal of Information Security, 2023, 22 : 467 - 478
  • [4] Enforcing Access Control in Information-Centric Edge Networking
    Wu, Danye
    Xu, Zhiwei
    Chen, Bo
    Zhang, Yujun
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (01) : 353 - 364
  • [5] Geographic rendezvous-based architectures for emergency data dissemination
    Seada, Karim
    Helmy, Ahmed
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (09): : 1221 - 1237
  • [6] Name-Based Security for Information-Centric Networking Architectures
    Fotiou, Nikos
    Polyzos, George C.
    [J]. FUTURE INTERNET, 2019, 11 (11):
  • [7] Session-based Access Control in Information-Centric Networks: Design and Analyses
    Wang, Yu
    Xu, Mingwei
    Feng, Zhen
    Li, Qing
    Li, Qi
    [J]. 2014 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2014,
  • [8] EnCIRCLE: Encryption-based Access Control for Information-Centric Connected Vehicles
    Grewe, Dennis
    Rao, Pavithra K. P.
    Schildt, Sebastian
    Wagner, Marco
    Schoop, Dominik
    Frey, Hannes
    [J]. PROCEEDINGS OF THE 2017 8TH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2017, : 114 - 119
  • [9] Hybrid-Coding Based Content Access Control for Information-Centric Networking
    Tan, Xiaobin
    Wang, Shunyi
    Ji, Liguo
    Tong, Xinxin
    Zou, Cliff
    Zheng, Quan
    Yang, Jian
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (07) : 6765 - 6777
  • [10] IaaS-Aided Access Control for Information-Centric IoT
    Carofiglio, Giovanna
    Compagno, Alberto
    Conti, Mauro
    De Gaspari, Fabio
    Muscariello, Luca
    [J]. PROCEEDINGS OF THE 2018 IEEE 43RD CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2018, : 208 - 216