[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3125719.3132102acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
poster
Public Access

NAC: name-based access control in named data networking

Published: 26 September 2017 Publication History

Abstract

As a proposed Internet architecture, Named Data Networking must provide effective security support: data authenticity, confidentiality, and availability. This poster focuses on supporting data confidentiality via encryption. The main challenge is to provide an easy-to-use key management mechanism that ensures only authorized parties are given the access to protected data. We describe the design of name-based access control (NAC) which provides automated key management by developing systematic naming conventions for both data and cryptographic keys. We also discuss an enhanced version of NAC that leverages attribute-based encryption mechanisms (NAC-ABE) to improve the flexibility of data access control and reduce communication, storage, and processing overheads.

References

[1]
John Bethencourt, Amit Sahai, and Brent Waters. 2007. Ciphertext-policy attribute-based encryption. In Proc. of IEEE Symposium on Security and Privacy.
[2]
Mihaela Ion, Jianqing Zhang, and Eve M. Schooler. 2013. Toward Content-centric Privacy in ICN: Attribute-based Encryption and Routing. In Proceedings of the 3rd ACM SIGCOMM Workshop on Information-centric Networking.
[3]
Amit Sahai and Brent Waters. 2005. Fuzzy identity-based encryption. In Proc. of Conference on the Theory and Applications of Cryptographic Techniques. 457--473.
[4]
Jeff Thompson et al. 2017. NDN-CCL API. https://github.com/named-data/NDN-CCL-API. (2017).
[5]
Yingdi Yu, Alexander Afanasyev, and Lixia Zhang. 2016. Name-based access control. Technical Report NDN-0034, Revision 2.
[6]
Lixia Zhang, Alexander Afanasyev, Jeffrey Burke, Van Jacobson, Patrick Crowley, Christos Papadopoulos, Lan Wang, Beichuan Zhang, et al. 2014. Named Data Networking. ACM SIGCOMM Computer Communication Review (2014).
[7]
Zhiyi Zhang and Yukai Tu. 2017. NAC-ABE Codebase. https://github.com/Zhiyi-Zhang/NAC-ABE. (2017).

Cited By

View all
  • (2023)NACDA: Naming-Based Access Control and Decentralized Authorization for Secure Many-to-Many Data SharingElectronics10.3390/electronics1207165112:7(1651)Online publication date: 31-Mar-2023
  • (2023)Security Bootstrapping for Securing Data Plane and Control Plane in Named Data NetworkingIEEE Transactions on Network and Service Management10.1109/TNSM.2022.323235920:3(3765-3781)Online publication date: Sep-2023
  • (2023)An ICN-Based Data Marketplace Model Based on a Game Theoretic Approach Using Quality-Data Discovery and Profit OptimizationIEEE Transactions on Cloud Computing10.1109/TCC.2022.318844711:2(2110-2126)Online publication date: 1-Apr-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICN '17: Proceedings of the 4th ACM Conference on Information-Centric Networking
September 2017
239 pages
ISBN:9781450351225
DOI:10.1145/3125719
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 September 2017

Check for updates

Author Tags

  1. ABE
  2. NDN
  3. access control

Qualifiers

  • Poster

Funding Sources

Conference

ICN '17
Sponsor:

Acceptance Rates

Overall Acceptance Rate 133 of 482 submissions, 28%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)113
  • Downloads (Last 6 weeks)14
Reflects downloads up to 10 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)NACDA: Naming-Based Access Control and Decentralized Authorization for Secure Many-to-Many Data SharingElectronics10.3390/electronics1207165112:7(1651)Online publication date: 31-Mar-2023
  • (2023)Security Bootstrapping for Securing Data Plane and Control Plane in Named Data NetworkingIEEE Transactions on Network and Service Management10.1109/TNSM.2022.323235920:3(3765-3781)Online publication date: Sep-2023
  • (2023)An ICN-Based Data Marketplace Model Based on a Game Theoretic Approach Using Quality-Data Discovery and Profit OptimizationIEEE Transactions on Cloud Computing10.1109/TCC.2022.318844711:2(2110-2126)Online publication date: 1-Apr-2023
  • (2023)SPA: A Scalable Pedestrian-awareness Application using NDN over CV2X2023 International Conference on Computing, Networking and Communications (ICNC)10.1109/ICNC57223.2023.10074070(249-253)Online publication date: 20-Feb-2023
  • (2023)Blockchain-based key management system in Named Data Networking: A surveyJournal of Network and Computer Applications10.1016/j.jnca.2023.103732220(103732)Online publication date: Nov-2023
  • (2022)Selective Content Retrieval in Information-Centric NetworkingSensors10.3390/s2222874222:22(8742)Online publication date: 12-Nov-2022
  • (2022)DICerProceedings of the 9th ACM Conference on Information-Centric Networking10.1145/3517212.3558084(45-55)Online publication date: 6-Sep-2022
  • (2022)CertRevokeProceedings of the 9th ACM Conference on Information-Centric Networking10.1145/3517212.3558079(80-90)Online publication date: 6-Sep-2022
  • (2022)Blockchain Document Forwarding and Proof Method Based on NDN NetworkIEEE Access10.1109/ACCESS.2022.317899210(75312-75322)Online publication date: 2022
  • (2022)Self-protected content for information-centric networking architectures using verifiable credentialsTelecommunication Systems10.1007/s11235-021-00874-yOnline publication date: 9-Jan-2022
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media