TY - GEN
T1 - Attribute-based access control for ICN naming scheme
AU - Li, Bing
AU - Prabhu Verleker, Ashwin
AU - Huang, Dijiang
AU - Wang, Zhijie
AU - Zhu, Yan
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/12/23
Y1 - 2014/12/23
N2 - Information Centric Networking (ICN) is a new network architecture that aims to overcome the weakness of existing IP-based networking architecture. Instead of establishing a connection between the communicating hosts, ICN focuses on the content, i.e. data, transmitted in network. Content copies in ICN can be cached at different locations. The content is out of the owner's control once it's published. Thus, enforcing access control policies on distributed content copies is crucial in ICN. Attribute-Based Encryption (ABE) is a feasible approach to enforce such control mechanisms. However, applying ABE in ICN has two challenges: from management perspective, managing attributes is complicated in distributed manners; from privacy perspective, unlike in traditional networks, the enforced content access policies are public to all the ICN users. Thus, it is desirable that unauthorized content viewers are not able to retrieve the access policy. To this end, a privacy-preserving access control scheme for ICN and associated attribute management solution are presented in this paper. This proposed approach is compatible with existing flat name based ICN architectures.
AB - Information Centric Networking (ICN) is a new network architecture that aims to overcome the weakness of existing IP-based networking architecture. Instead of establishing a connection between the communicating hosts, ICN focuses on the content, i.e. data, transmitted in network. Content copies in ICN can be cached at different locations. The content is out of the owner's control once it's published. Thus, enforcing access control policies on distributed content copies is crucial in ICN. Attribute-Based Encryption (ABE) is a feasible approach to enforce such control mechanisms. However, applying ABE in ICN has two challenges: from management perspective, managing attributes is complicated in distributed manners; from privacy perspective, unlike in traditional networks, the enforced content access policies are public to all the ICN users. Thus, it is desirable that unauthorized content viewers are not able to retrieve the access policy. To this end, a privacy-preserving access control scheme for ICN and associated attribute management solution are presented in this paper. This proposed approach is compatible with existing flat name based ICN architectures.
KW - Attribute management
KW - access control
KW - information centric networking
KW - naming
KW - privacy
UR - http://www.scopus.com/inward/record.url?scp=84921518293&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84921518293&partnerID=8YFLogxK
U2 - 10.1109/CNS.2014.6997508
DO - 10.1109/CNS.2014.6997508
M3 - Conference contribution
AN - SCOPUS:84921518293
T3 - 2014 IEEE Conference on Communications and Network Security, CNS 2014
SP - 391
EP - 399
BT - 2014 IEEE Conference on Communications and Network Security, CNS 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 IEEE Conference on Communications and Network Security, CNS 2014
Y2 - 29 October 2014 through 31 October 2014
ER -