TY - GEN
T1 - An encryption and probability based access control model for named data networking
AU - Chen, Tao
AU - Lei, Kai
AU - Xu, Kuai
PY - 2015/1/20
Y1 - 2015/1/20
N2 - The new named data networking (NDN) has shifted the Internet from today's IP-based packet-delivery model to the name-based data retrieval model. The architecture shift from IP addresses to named data results in effective content delivery via in-networking cache and direct object retrieval. However, this shift has also created challenges and obstacles for securing data objects and providing appropriate access control on named data due to broad data replications and the loss of network perimeters. This paper designs, implements, and evaluates an encryption and probability based access control model for NDN with video streaming service as a case study. In particularly, we explore a combination of public-key cryptography and symmetric ciphers to encrypt video data for preventing unauthorized access. In addition, we build a bloom-filter probabilistic data structure for pre-filtering Interests from consumers without desired credentials. Our experimental results have demonstrated the capabilities of the proposed model for providing access control while incurring low system and performance overhead on producers and consumers.
AB - The new named data networking (NDN) has shifted the Internet from today's IP-based packet-delivery model to the name-based data retrieval model. The architecture shift from IP addresses to named data results in effective content delivery via in-networking cache and direct object retrieval. However, this shift has also created challenges and obstacles for securing data objects and providing appropriate access control on named data due to broad data replications and the loss of network perimeters. This paper designs, implements, and evaluates an encryption and probability based access control model for NDN with video streaming service as a case study. In particularly, we explore a combination of public-key cryptography and symmetric ciphers to encrypt video data for preventing unauthorized access. In addition, we build a bloom-filter probabilistic data structure for pre-filtering Interests from consumers without desired credentials. Our experimental results have demonstrated the capabilities of the proposed model for providing access control while incurring low system and performance overhead on producers and consumers.
UR - http://www.scopus.com/inward/record.url?scp=84923163779&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84923163779&partnerID=8YFLogxK
U2 - 10.1109/PCCC.2014.7017100
DO - 10.1109/PCCC.2014.7017100
M3 - Conference contribution
AN - SCOPUS:84923163779
T3 - 2014 IEEE 33rd International Performance Computing and Communications Conference, IPCCC 2014
BT - 2014 IEEE 33rd International Performance Computing and Communications Conference, IPCCC 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 33rd IEEE International Performance Computing and Communications Conference, IPCCC 2014
Y2 - 5 December 2014 through 7 December 2014
ER -