A Credential and Encryption Based Access Control Solution for Named Data Networking

被引:0
|
作者
Hamdane, Balkis [1 ,2 ]
El Fatmi, Sihem Guemara [1 ]
机构
[1] Higher Sch Commun Tunis SupCom, Digital Secur Res Unit, Tunis, Tunisia
[2] Telecom ParisTech, Paris, France
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Named Data Networking (NDN) represents a promising candidate for the future Internet architecture adopting the Information Centric Networking (ICN) approach. For a more effective content delivery, it leverages in-network caching. However, security can no longer be tied a particular location. It becomes a property of the content and its name, regardless where it is situated. To ensure access control that represents an important security feature, NDN proposes the use of an encryption-based model; sensitive data can be encrypted then decrypted only by legitimate entities. Many solutions adopting this model have been proposed but they require prior knowledge of all authorized entities. In this paper, we propose an encryption-based access control solution that does not have such requirements and which is valid in an open environment. This solution assigns access rights based on certified encrypted credentials provided by the different entities. To confirm the security of this proposal, a formal security analysis is provided.
引用
收藏
页码:1234 / 1237
页数:4
相关论文
共 50 条
  • [31] Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based Encryption
    Xu, YuHua
    Sun, ZhiXin
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 203 - 213
  • [32] Named Data Networking
    Zhang, Lixia
    Afanasyev, Alexander
    Burke, Jeffrey
    Jacobson, Van
    Claffy, Kc
    Crowley, Patrick
    Papadopoulos, Christos
    Wang, Lan
    Zhang, Beichuan
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (03) : 66 - 73
  • [33] Private, efficient, and flexible: protecting names based on message-derived encryption in named data networking
    He, Kai
    Shi, Shengyuan
    Yin, Chunxiao
    Wan, Hongyan
    Shi, Jiaoli
    CYBERSECURITY, 2025, 8 (01):
  • [34] An Explicit Congestion Control Algorithm for Named Data Networking
    Ren, Yongmao
    Li, Jun
    Shi, Shanshan
    Li, Lingling
    Wang, Guodong
    2016 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2016,
  • [35] Named data networking protocols for tactical command and control
    Evans, Joseph B.
    Pennington, Steven G.
    Ewy, Benjamin J.
    OPEN ARCHITECTURE/OPEN BUSINESS MODEL NET-CENTRIC SYSTEMS AND DEFENSE TRANSFORMATION 2018, 2018, 10651
  • [36] A CUBIC-Based Explicit Congestion Control Mechanism in Named Data Networking
    Liu, Yongbin
    Piao, Xuewei
    Hou, Chaojun
    Lei, Kai
    2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 360 - 363
  • [37] Transport Control Strategies in Named Data Networking: A Survey
    Chen, Qingxia
    Xie, Renchao
    Yu, F. Richard
    Liu, Jiang
    Huang, Tao
    Liu, Yunjie
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 2052 - 2083
  • [38] A Practical Congestion Control Scheme for Named Data Networking
    Schneider, Klaus
    Yi, Cheng
    Zhang, Beichuan
    Zhang, Lixia
    PROCEEDINGS OF THE 2016 3RD ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ACM-ICN '16), 2016, : 21 - 30
  • [39] Security Attacks in Named Data Networking of Things and a Blockchain Solution
    Zhu, Konglin
    Chen, Zhicheng
    Yan, Wenke
    Zhang, Lin
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) : 4733 - 4741
  • [40] On the Use of Proxy Re-Encryption to Control Access to Sensitive Data on Information Centric Networking
    da Silva, Roan Simoes
    Zorzo, Sergio Donizetti
    2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2016, : 7 - 12