2015 IEEE Symposium on Computers and Communication (ISCC) 2015
DOI: 10.1109/iscc.2015.7405632
|View full text |Cite
|
Sign up to set email alerts
|

Optimized access control enforcement over encrypted content in information-centric networks

Abstract: The Information-centric Network (ICN) paradigm is an important initiative toward an Internet architecture more suitable for content distribution. The change it imposes by naming, routing, and forwarding content directly on the network layer empowers the architecture with several interesting characteristics, such as in-network caching. As contents are meaningful for different users, they can be opportunistically cached and easily accessed by them, which improves content delivery and user experience. However, th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…Owing to replication of contents across the network, in ICN this assumption has minor effect. Still, for the additional proof of the strength of the SDPC protocol suite, we implemented SDPC, EU-RE [18], and MCAC [17] in an automated security protocol analysis tool, Scyther [21]. We considered four claims: 1) aliveness, 2) weak agreement, 3) non-injective agreement, and 4) non-injective synchronization [20].…”
Section: G Scyther Implementation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Owing to replication of contents across the network, in ICN this assumption has minor effect. Still, for the additional proof of the strength of the SDPC protocol suite, we implemented SDPC, EU-RE [18], and MCAC [17] in an automated security protocol analysis tool, Scyther [21]. We considered four claims: 1) aliveness, 2) weak agreement, 3) non-injective agreement, and 4) non-injective synchronization [20].…”
Section: G Scyther Implementation Resultsmentioning
confidence: 99%
“…In another study [18], the authors presented an access control scheme for the encrypted content in ICN, which is based on the efficient unidirectional proxy re-encryption (EU-PRE) proposed by [19]. The proposed scheme, named efficient unidirectional re-encryption (EU-RE), simplifies EU-PRE by eliminating the need of proxies in the re-encryption operation.…”
Section: Related Workmentioning
confidence: 99%
“…Even NDN packets do not contain any information about the source host where they were originally sent; contents security and privacy are still needed. Different cryptographic approaches have been explored in access control solutions for NDN, such as attribute-based encryption, broadcast encryption [ 32 , 33 ], role-based encryption, identity-based encryption [ 30 , 34 ], proxy re-encryption [ 31 , 35 , 36 ], and so on [ 7 , 37 , 38 ]. These approaches are examined below.…”
Section: Related Workmentioning
confidence: 99%
“…These approaches are examined below. The key problem of [ 30 , 31 , 34 , 35 , 39 ] these schemes are the computational and communication overhead for the content producer and the consumer, while other schemes [ 32 , 33 , 36 , 40 ] do not consider user or key revocation.…”
Section: Related Workmentioning
confidence: 99%
“…This approach is not sufficient since the name of the content can be easily identified. To improve upon access control mechanisms in CCN (securing the content and its name) from unauthorized users, several mechanisms have been proposed, such as attribute encryption access, [33][34][35] proxy re-encryptions, and broadcast encryption access control schemes [36,37].…”
Section: Secured Content Centric Network (Ccn/ndn)mentioning
confidence: 99%