ATTRIBUTE-BASED ACCOUNTABLE ACCESS CONTROL FOR MULTIMEDIA CONTENT WITH IN-NETWORK CACHING

被引:5
|
作者
He, Peixuan [1 ]
Xue, Kaiping [1 ]
Xu, Jie [1 ]
Xia, Qiudong [1 ]
Liu, Jianqing [2 ]
Yue, Hao [3 ]
机构
[1] Univ Sci & Technol China, Dept EEIS, Hefei 230027, Anhui, Peoples R China
[2] Univ Alabama, Dept Elect & Comp Engn, Huntsville, AL 35899 USA
[3] San Francisco State Univ, Dept Comp Sci, San Francisco, CA 94132 USA
基金
中国国家自然科学基金;
关键词
Multimedia content security; Access control; In-network caching; Attribute-based encryption; Access policy based authentication; SECURITY; PRIVACY;
D O I
10.1109/ICME.2019.00139
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, multimedia content retrieval has become the major service requirement of the Internet and the traffic of these contents has dominated the IP traffic. To reduce the duplicated traffic and improve the performance of distributing massive volumes of multimedia contents, in-network caching has been proposed recently. However, because in-network content caching can be directly utilized to respond users' requests, multimedia content retrieval is beyond content providers' control and makes it hard for them to implement access control and service accounting. In this paper, we propose an attribute-based accountable access control scheme for multimedia content distribution while making the best of in-network caching, in which content providers can be fully offline. In our scheme, the attribute-based encryption at multimedia content provider side and access policy based authentication at the edge router side jointly ensure the secure access control, which is also efficient in both space and time. Besides, secure service accounting is implemented by letting edge routers collect service credentials generated during users' request process. Through the informal security analysis, we prove the security of our scheme. Simulation results demonstrate that our scheme is efficient with acceptable overhead.
引用
收藏
页码:778 / 783
页数:6
相关论文
共 50 条
  • [41] Automated trust negotiation in attribute-based access control
    Winsborough, WH
    Jacobs, J
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 252 - 257
  • [42] Attribute-based Access Control for ICN Naming Scheme
    Li, Bing
    Verleker, Ashwin Prabhu
    Huang, Dijiang
    Wang, Zhijie
    Zhu, Yan
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 391 - 399
  • [43] Attribute-based access control policy specification language
    Ye, Chunxiao
    Zhong, Jiang
    Feng, Yong
    Journal of Southeast University (English Edition), 2008, 24 (03) : 260 - 263
  • [44] A Time and Mutable Attribute-Based Access Control Model
    Yang, Ran
    Lin, Chuang
    Feng, Fujun
    JOURNAL OF COMPUTERS, 2009, 4 (06) : 510 - 518
  • [45] Attribute-Based Access Control for Layered Grid Resources
    Lang, Bo
    Li, Hangyu
    Ni, Wenting
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 31 - 40
  • [46] Efficient Attribute-Based Comparable Data Access Control
    Wang, Zhijie
    Huang, Dijiang
    Zhu, Yan
    Li, Bing
    Chung, Chun-Jen
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3430 - 3443
  • [47] Attribute-Based Access Control Architectures with the eIDAS Protocols
    Morgner, Frank
    Bastian, Paul
    Fischlin, Marc
    SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 205 - 226
  • [48] Levelled attribute-based encryption for hierarchical access control
    Le, Huy Quoc
    Le, Phi Thuong
    Trinh, Sy Tuan
    Susilo, Willy
    Trinh, Viet Cuong
    COMPUTER STANDARDS & INTERFACES, 2025, 93
  • [49] Attribute-based access control management for multicloud collaboration
    John, John C.
    Sural, Shamik
    Gupta, Arobinda
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (19):
  • [50] Deconflicting policies in attribute-based access control systems
    Yahiaoui, Mohamed
    Zinedine, Ahmed
    Harti, Mostafa
    2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136