Attribute Based Content Security and Caching in Information Centric IoT

Information-centric networking (ICN) is a Future Internet paradigm which uses named information (data objects) instead of host-based end-to-end communications. In-network caching is a key pillar of ICN. Basically, data objects are cached in ICN routers and retrieved from these network elements upon availability when they are requested. It is a particularly promising networking approach due to the expected benefits of data dissemination efficiency, reduced delay and improved robustness for challenging communication scenarios in IoT domain. From the security perspective, ICN concentrates on securing data objects instead of ensuring the security of end-to-end communication link. However, it inherently involves the security challenge of access control for content. Thus, an efficient access control mechanism is crucial to provide secure information dissemination. In this work, we investigate Attribute Based Encryption (ABE) as an access control apparatus for information centric IoT. Moreover, we elaborate on how such a system performs for different parameter settings such as different numbers of attributes and file sizes.

[1]  Meng Zhang,et al.  A Survey of Caching Mechanisms in Information-Centric Networking , 2015, IEEE Communications Surveys & Tutorials.

[2]  Dijiang Huang,et al.  Attribute-based Access Control for ICN Naming Scheme , 2014, IEEE Transactions on Dependable and Secure Computing.

[3]  Gürkan Gür Energy-aware cache management at the wireless network edge for information-centric operation , 2015, J. Netw. Comput. Appl..

[4]  Börje Ohlman,et al.  Attribute-Based Encryption on a Resource Constrained Sensor in an Information-Centric Network , 2016, ICN.

[5]  Nouha Oualha,et al.  Lightweight Attribute-Based Encryption for the Internet of Things , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[6]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[7]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[8]  Sasu Tarkoma,et al.  IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[9]  Dong Hoon Lee,et al.  Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System , 2016, Journal of Medical Systems.

[10]  Jianqing Zhang,et al.  Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT , 2014, 2014 IEEE International Conference on Communications (ICC).

[11]  Tooska Dargahi,et al.  On the Feasibility of Attribute-Based Encryption on Smartphone Devices , 2015, IoT-Sys@MobiSys.

[12]  Satyajayant Misra,et al.  Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[13]  Jianqing Zhang,et al.  Toward content-centric privacy in ICN: attribute-based encryption and routing , 2013, SIGCOMM 2013.

[14]  Gürkan Gür,et al.  Software-Defined Edge Defense Against IoT-Based DDoS , 2017, 2017 IEEE International Conference on Computer and Information Technology (CIT).

[15]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[16]  Edith C. H. Ngai,et al.  Employing attribute-based encryption in systems with resource constrained devices in an information-centric networking context , 2017, 2017 Global Internet of Things Summit (GIoTS).