Access Control Enforcement Delegation for Information-Centric Networking Architectures

被引:23
|
作者
Fotiou, Nikos [1 ]
Marias, Giannis F. [1 ]
Polyzos, George C. [1 ]
机构
[1] Athens Univ Econ & Business, Mobile Multimedia Lab, Dept Informat, Athens, Greece
关键词
Access control policies; Privacy preservation; Stakeholder interoperability; Security; Design; Experimentation;
D O I
10.1145/2377677.2377773
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information is the building block of Information Centric Networks (ICNs). Access control policies limit information dissemination to authorized entities only. Defining access control policies in an ICN is a non-trivial task as an information item may exist in multiple copies dispersed in various network locations, including caches and content replication servers. In this paper we propose an access control enforcement delegation scheme which enables the purveyor of an information item to evaluate a request against an access control policy, without having access to the requestor credentials nor to the actual definition of the policy. Such an approach has multiple merits: it enables the interoperability of various stakeholders, it protects user identity and it can set the basis for a privacy preserving mechanism. An implementation of our scheme supports its feasibility.
引用
收藏
页码:497 / 502
页数:6
相关论文
共 50 条
  • [1] Distributed access control for information-centric networking architectures using verifiable credentials
    Alzahrani, Bander
    Fotiou, Nikos
    Albeshri, Aiiad
    Almuhaimeed, Abdullah
    Alsubhi, Khalid
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (02) : 467 - 478
  • [2] Distributed access control for information-centric networking architectures using verifiable credentials
    Bander Alzahrani
    Nikos Fotiou
    Aiiad Albeshri
    Abdullah Almuhaimeed
    Khalid Alsubhi
    [J]. International Journal of Information Security, 2023, 22 : 467 - 478
  • [3] Enforcing Access Control in Information-Centric Edge Networking
    Wu, Danye
    Xu, Zhiwei
    Chen, Bo
    Zhang, Yujun
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (01) : 353 - 364
  • [4] Security, Privacy, and Access Control in Information-Centric Networking: A Survey
    Tourani, Reza
    Misra, Satyajayant
    Mick, Travis
    Panwar, Gaurav
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01): : 566 - 600
  • [5] A Distributed Capability Access Control Scheme in Information-Centric Networking
    Cha, Jung-Hwan
    Han, Youn-Hee
    Min, Sung-Gi
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (05) : 1121 - 1130
  • [6] Rendezvous-based access control for information-centric architectures
    Fotiou, Nikos
    Alzahrani, Bander A.
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2018, 28 (01)
  • [7] Achieving Secure and Scalable Data Access Control in Information-Centric Networking
    Zheng, Qingji
    Wang, Guoqiang
    Ravindran, Ravishankar
    Azgin, Aytac
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 5367 - 5373
  • [8] INFORMATION-CENTRIC NETWORKING
    Pentikousis, Kostas
    Chemouil, Prosper
    Nichols, Kathleen
    Pavlou, George
    Massey, Dan
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (07) : 22 - 25
  • [9] Name-Based Security for Information-Centric Networking Architectures
    Fotiou, Nikos
    Polyzos, George C.
    [J]. FUTURE INTERNET, 2019, 11 (11):
  • [10] Optimized Access Control Enforcement Over Encrypted Content in Information-centric Networks
    Mannes, Elisa
    Maziero, Carlos
    Lassance, Luiz
    Borges, Fabio
    [J]. 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 924 - 929