[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2810156.2810174acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Interest-Based Access Control for Content Centric Networks

Published: 30 September 2015 Publication History

Abstract

Content-Centric Networking (CCN) is an emerging network architecture designed to overcome limitations of the current IP-based Internet. One of the fundamental tenets of CCN is that content is named and addressable. Consumers request content by issuing interests with the desired content name. These interests are forwarded by routers to producers, and the requested content is returned and optionally cached at each router along the path.
In-network caching makes it difficult to enforce access control policies on sensitive content since routers only use interest information for forwarding decisions. This motives our work on Interest-Based Access Control (IBAC) -- a scheme for access control enforcement using only information contained in interest messages. IBAC makes sensitive content names unpredictable to unauthorized parties. It supports both hash- and encryption-based name obfuscation. Interest replay attacks are addressed by formulating a mutual trust framework between producers and consumers that enables routers to perform authorization checks before satisfying interests from local caches. We assess computational, storage, and bandwidth costs of each IBAC variant. Proposed design is flexible and allows producers to arbitrarily specify and enforce any type of content access control, without having to deal with content encryption and key distribution. This is the first comprehensive CCN access control design that only uses information contained in interest messages.

References

[1]
Microsoft PlayReady. http://www.microsoft.com/playready/.
[2]
T. Berners-Lee, R. Fielding, and L. Masinter. RFC 3986: Uniform resource identifier (URI): Generic syntax. 2005.
[3]
G. Carofiglio, M. Gallo, L. Muscariello, and D. Perino. Modeling data transfer in content-centric networking. In ITC, 2011.
[4]
D. Cooper. RFC 3280: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. 2008.
[5]
N. Fotiou, G. F. Marias, and G. C. Polyzos. Access control enforcement delegation for information-centric networking architectures. In ICN Workshop, 2012.
[6]
P. Gasti, G. Tsudik, E. Uzun, and L. Zhang. DoS DDoS in named-data networking. In ICCCN, 2013.
[7]
C. Ghali, M. A. Schlosberg, G. Tsudik, and C. A. Wood. Interest-based access control for content centric networks (extended version). arXiv, 2015.
[8]
C. Ghali, G. Tsudik, and E. Uzun. Needle in a haystack: Mitigating content poisoning in named-data networking. In NDSS SENT Workshop, 2014.
[9]
C. Ghali, G. Tsudik, and E. Uzun. Network-layer trust in named-data networking. CCR, 2014.
[10]
D. Gross. Fundamentals of queueing theory. John Wiley & Sons, 2008.
[11]
M. Ion, J. Zhang, and E. M. Schooler. Toward content-centric privacy in ICN: Attribute-based encryption and routing. In ICN, 2013.
[12]
V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard. Networking named content. In CoNext, 2009.
[13]
S. Jahid, P. Mittal, and N. Borisov. EASiER: Encryption-based access control in social networks with efficient revocation. In ASIACCS, 2011.
[14]
S. Kamara and K. Lauter. Cryptographic cloud storage. In FC, 2010.
[15]
J. Katz and Y. Lindell. Introduction to modern cryptography. CRC Press, 2014.
[16]
H. Krawczyk, R. Canetti, and M. Bellare. RFC 2104: HMAC: Keyed-hashing for message authentication. 1997.
[17]
J. Kurihara, C. Wood, and E. Uzuin. An encryption-based access control framework for content-centric networking. IFIP, 2015.
[18]
S. Misra, R. Tourani, and N. E. Majd. Secure content delivery in information-centric networks: Design, implementation, and analyses. In ICN, 2013.
[19]
M. Mosko, I. Solis, and E. Uzun. CCN 1.0 protocol architecture.
[20]
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. RFC 2560: Online certificate status protocol - OCSP. 1999.
[21]
D. K. Smetters, P. Golle, and J. D. Thornton. CCNx access control specifications. Technical report, PARC, July 2010.
[22]
G. Wang, Q. Liu, and J. Wu. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In CCS, 2010.
[23]
C. A. Wood and E. Uzun. Flexible end-to-end content security in CCN. In CCNC, 2014.
[24]
S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, 2010.
[25]
L. Zhang, A. Afanasyev, J. Burke, V. Jacobson, P. Crowley, C. Papadopoulos, L. Wang, B. Zhang, et al. Named data networking. CCR, 2014.
[26]
L. Zhou, V. Varadharajan, and M. Hitchens. Achieving secure role-based access control on encrypted data in cloud storage. Transactions on Information Forensics and Security, 2013.

Cited By

View all
  • (2023)Security Bootstrapping for Securing Data Plane and Control Plane in Named Data NetworkingIEEE Transactions on Network and Service Management10.1109/TNSM.2022.323235920:3(3765-3781)Online publication date: Sep-2023
  • (2023)Security and Integrity Attacks in Named Data Networking: A SurveyIEEE Access10.1109/ACCESS.2023.323873211(7984-8004)Online publication date: 2023
  • (2023)ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation InternetWireless Personal Communications10.1007/s11277-023-10625-8132:1(571-607)Online publication date: 29-Jul-2023
  • Show More Cited By

Index Terms

  1. Interest-Based Access Control for Content Centric Networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ACM-ICN '15: Proceedings of the 2nd ACM Conference on Information-Centric Networking
      September 2015
      236 pages
      ISBN:9781450338554
      DOI:10.1145/2810156
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 30 September 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. access control
      2. content-centric networks
      3. name obfuscation

      Qualifiers

      • Research-article

      Funding Sources

      • National Science Foundation

      Conference

      ICN'15
      Sponsor:
      ICN'15: 2nd International Conference on Information-Centric Networking
      September 30 - October 2, 2015
      California, San Francisco, USA

      Acceptance Rates

      ACM-ICN '15 Paper Acceptance Rate 18 of 55 submissions, 33%;
      Overall Acceptance Rate 133 of 482 submissions, 28%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 12 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Security Bootstrapping for Securing Data Plane and Control Plane in Named Data NetworkingIEEE Transactions on Network and Service Management10.1109/TNSM.2022.323235920:3(3765-3781)Online publication date: Sep-2023
      • (2023)Security and Integrity Attacks in Named Data Networking: A SurveyIEEE Access10.1109/ACCESS.2023.323873211(7984-8004)Online publication date: 2023
      • (2023)ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation InternetWireless Personal Communications10.1007/s11277-023-10625-8132:1(571-607)Online publication date: 29-Jul-2023
      • (2022)An interest‐based access control scheme via edge verification in Named Data NetworkingInternational Journal of Communication Systems10.1002/dac.516935:10Online publication date: 6-Apr-2022
      • (2021)Enforcing Access Control in Information-Centric Edge NetworkingIEEE Transactions on Communications10.1109/TCOMM.2020.302638069:1(353-364)Online publication date: Jan-2021
      • (2021)Secure Sharing of Spatio-Temporal Data through Name-based Access ControlIEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFOCOMWKSHPS51825.2021.9484557(1-7)Online publication date: 10-May-2021
      • (2020)ESAC: An Efficient and Secure Access Control Scheme in Vehicular Named Data NetworkingIEEE Transactions on Vehicular Technology10.1109/TVT.2020.300445969:9(10252-10263)Online publication date: Sep-2020
      • (2020)HAC: Enable High Efficient Access Control for Information-Centric Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2020.29893617:10(10347-10360)Online publication date: Oct-2020
      • (2020)SBACJournal of Network and Computer Applications10.1016/j.jnca.2019.102444149:COnline publication date: 1-Jan-2020
      • (2020)Optimized in-network authentication against pollution attacks in software-defined-named data networkingJournal of Information Security and Applications10.1016/j.jisa.2019.10240950:COnline publication date: 1-Feb-2020
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media