An encryption and probability based access control model for named data networking

Tao Chen, Kai Lei, Kuai Xu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Scopus citations

Abstract

The new named data networking (NDN) has shifted the Internet from today's IP-based packet-delivery model to the name-based data retrieval model. The architecture shift from IP addresses to named data results in effective content delivery via in-networking cache and direct object retrieval. However, this shift has also created challenges and obstacles for securing data objects and providing appropriate access control on named data due to broad data replications and the loss of network perimeters. This paper designs, implements, and evaluates an encryption and probability based access control model for NDN with video streaming service as a case study. In particularly, we explore a combination of public-key cryptography and symmetric ciphers to encrypt video data for preventing unauthorized access. In addition, we build a bloom-filter probabilistic data structure for pre-filtering Interests from consumers without desired credentials. Our experimental results have demonstrated the capabilities of the proposed model for providing access control while incurring low system and performance overhead on producers and consumers.

Original languageEnglish (US)
Title of host publication2014 IEEE 33rd International Performance Computing and Communications Conference, IPCCC 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479975754
DOIs
StatePublished - Jan 20 2015
Event33rd IEEE International Performance Computing and Communications Conference, IPCCC 2014 - Austin, United States
Duration: Dec 5 2014Dec 7 2014

Publication series

Name2014 IEEE 33rd International Performance Computing and Communications Conference, IPCCC 2014

Other

Other33rd IEEE International Performance Computing and Communications Conference, IPCCC 2014
Country/TerritoryUnited States
CityAustin
Period12/5/1412/7/14

ASJC Scopus subject areas

  • Software
  • Computational Theory and Mathematics
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'An encryption and probability based access control model for named data networking'. Together they form a unique fingerprint.

Cite this