Secure Identifier Management Based on Blockchain Technology in NDN Environment

With the recent increase in the number of IoT devices and the development of centralized management systems, risks in cyber space, including personal information phishing, malicious code infection, hacking, and DDos attack, are becoming major issues in the real world. The recently developed distributed data management technology, blockchain, provides reliability in transactions without the intervention of a third party. This new technology, blockchain, promotes integrity and reliability of transaction records by allowing for all network participants to jointly own and verify data, which was previously done by a central server. Due to distributed data management, the technology can reduce brokerage fees and construction costs, and guarantees high levels of integrity and security of data. This paper examines the effective identifier management using blockchain technology under the named data networking environment. The proposed system does not expose a specific user’s identifier by creating a transaction using the content name of the identifier. The identifier can be safely stored and managed through such an identifier split management technique.

[1]  R.T.Subhalakshmi,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption , 2016 .

[2]  Hiroshi Maruyama Edge-Heavy Data and architecture in the big data era , 2013 .

[3]  Arun Venkataramani,et al.  MobilityFirst: a robust and trustworthy mobility-centric architecture for the future internet , 2012, MOCO.

[4]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[5]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[6]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[7]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[8]  Ravishankar Ravindran,et al.  A comparative study of MobilityFirst and NDN based ICN-IoT architectures , 2014, 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness.

[9]  Sandip Roy,et al.  A Fog-Based DSS Model for Driving Rule Violation Monitoring Framework on the Internet of Things , 2015 .

[10]  Paul Haynes,et al.  Governance in Blockchain Technologies & Social Contract Theories , 2016, Ledger.

[11]  P. Venkata Krishna,et al.  Learning Automata-Based QoS Framework for Cloud IaaS , 2014, IEEE Transactions on Network and Service Management.

[12]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[13]  Priya Mahadevan,et al.  Interest flooding attack and countermeasures in Named Data Networking , 2013, 2013 IFIP Networking Conference.

[14]  Daniel Massey,et al.  Routing policies in named data networking , 2011, ICN '11.

[15]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[16]  Wei Jiang,et al.  Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.

[17]  Sarah Underwood,et al.  Blockchain beyond bitcoin , 2016, Commun. ACM.

[18]  Jiang Zhu,et al.  Fog Computing: A Platform for Internet of Things and Analytics , 2014, Big Data and Internet of Things.

[19]  Nikos Fotiou,et al.  A Survey of Information-Centric Networking Research , 2014, IEEE Communications Surveys & Tutorials.

[20]  Holger Paul Keeler,et al.  Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.

[21]  Antonio Iera,et al.  Named data networking for IoT: An architectural perspective , 2014, 2014 European Conference on Networks and Communications (EuCNC).