2015 IEEE International Conference on Communications (ICC) 2015
DOI: 10.1109/icc.2015.7249177
|View full text |Cite
|
Sign up to set email alerts
|

Achieving secure and scalable data access control in information-centric networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 19 publications
0
11
0
Order By: Relevance
“…It compares the existing mechanisms on the basis of their overhead: communication and computation, and the entities that bear the computation burden. Client revocation method, ability of cache utilization, and the entities that enforce AC are other comparison features in Table X. In this section, we reviewed the existing research in ICN AC enforcement and specifically focused on models including broadcast encryption-based [112], [113], attribute-based [121]- [125], identity-based [126]- [128] session-based [114]- [116], proxy re-encryption-based [117]- [119], and others [130]- [134] models. Although almost all the proposed mechanisms introduce communication overhead, some of the proposed mechanisms [128], [130] require extensive interactions between an AC manager and other network entities in order to enforce access constraints.…”
Section: Summary and Future Directions In Access Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…It compares the existing mechanisms on the basis of their overhead: communication and computation, and the entities that bear the computation burden. Client revocation method, ability of cache utilization, and the entities that enforce AC are other comparison features in Table X. In this section, we reviewed the existing research in ICN AC enforcement and specifically focused on models including broadcast encryption-based [112], [113], attribute-based [121]- [125], identity-based [126]- [128] session-based [114]- [116], proxy re-encryption-based [117]- [119], and others [130]- [134] models. Although almost all the proposed mechanisms introduce communication overhead, some of the proposed mechanisms [128], [130] require extensive interactions between an AC manager and other network entities in order to enforce access constraints.…”
Section: Summary and Future Directions In Access Controlmentioning
confidence: 99%
“…Although we believe that the latter approach is more acceptable, as it imposes less complexity, efficient access revocation is a key design factor for scalable AC in ICNs. Some of the proposed mechanisms [114], [119], [120], [124], [127], [130], [131], [133] require the network (routers) to enforce AC and authenticate clients. The fact that the intermediate routers have to perform authentication procedure undermines the scalability of these mechanisms.…”
Section: Summary and Future Directions In Access Controlmentioning
confidence: 99%
“…In other work [16], author proposed a content access control scheme based on proxy re-encryption. In proxy reencryption the content is re-encrypted by an intermediate node.…”
Section: Related Workmentioning
confidence: 99%
“…The logic belief proves that N i is confident and believes that K i S is issued by M ; moreover, the freshness of the key from (16) also suggests that M is alive and running the protocol with N i . Further, from (15), (16) and (17), N i has guaranteed that M has been running the protocol, apparently with N i and P j . This also proves that M and N i are also agree on the nonce values corresponding to all the nonce in M4.…”
Section: (X) Ymentioning
confidence: 99%
“…The proposed solution uses a single P KG. This solution is used in an ICN context by Wood and Uzun [22] to implement a DRM-like solution for the CCN architecture as well as by Zheng et al [24] to implement an access control mechanism for ICN. Our work extends these previous works by considering userspecific P KGs.…”
Section: Related Workmentioning
confidence: 99%