Proceedings of the 3rd ACM SIGCOMM Workshop on Information-Centric Networking 2013
DOI: 10.1145/2491224.2491228
|View full text |Cite
|
Sign up to set email alerts
|

Secure content delivery in information-centric networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
0
2

Year Published

2015
2015
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 86 publications
(47 citation statements)
references
References 9 publications
0
45
0
2
Order By: Relevance
“…Each name is unique and the complete set of chunks creates a whole content. The chunk numbers are usually assigned using two numbering schemes: sequential numbering and random numbering [21] . In figure 11 the final part of the content name is the chunk number denoted by s such that s {001,002,003…}.…”
Section: Namingmentioning
confidence: 99%
“…Each name is unique and the complete set of chunks creates a whole content. The chunk numbers are usually assigned using two numbering schemes: sequential numbering and random numbering [21] . In figure 11 the final part of the content name is the chunk number denoted by s such that s {001,002,003…}.…”
Section: Namingmentioning
confidence: 99%
“…Our system treats the content fingerprint as a unique and global identifier to associate the related chunks privately in the encrypted fingerprint index. Besides, our system can function compatibly on top of various data encryption schemes, e.g., standard encryption (AES), access control enforced encryption, e.g., attributed-based encryption [25] and broadcast encryption [12], or even encryption for secure deduplication [26]. Those schemes can be naturally adopted in our proposed framework to enable more rich features.…”
Section: A System Overviewmentioning
confidence: 99%
“…As shown in Algorithm 2, given the sequence number of the chunk and the secure token, the request handler can immediately obtain the pyn of the targeted chunk without processing the previous chunks. Access control mechanisms: To defend against copyright infringement, our system readily supports existing one-to-many encryption schemes, e.g., proxy re-encryption (PRE) [22], attributed-based encryption (ABE) [14], [33], broadcast encryption (BE) [12], etc. For efficiency, the video chunks are still encrypted via standard symmetric encryption, while the video encryption keys are protected via PRE or ABE schemes, which can only be decrypted by authorized users.…”
Section: E Practical Considerationsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the cryptographic scheme should be carefully chosen, as some of them may hinder the caching (like traditional symmetric key cryptographic schemes, in which a content encrypted to a given user may not be useful to any other user [13]). Different cryptographic approaches have been explored in access control solutions for ICN, such as attribute-based encryption [3], [5], [14] and broadcast encryption [4]. The idea of such solutions is to create groups of users to share keys for decrypting content, consequently optimizing caching over the network.…”
Section: A Access Control In Information-centric Networkmentioning
confidence: 99%