A scalable approach for managing access control in Information Centric Networks

One of the main challenges in Information Centric Networks (ICN) is providing access control to content publication and retrieval. Most of the existing approaches often consider a single user acting as publisher within a group. When dealing with multiple publishers, they may lead to a combinatorial explosion of cryptographic keys. Approaches that focus on multiple publishers, on the other hand, rely on specific network architectures and/or changes to operate. In this paper we propose a novel solution, supported by attribute-based encryption, for managing content access control. In our solution, we introduce secure content distribution groups, in which any member user can publish to and retrieve from. Unlike previous work, our solution keeps the number of cryptographic keys proportional to the number of group members, and may even be adopted gradually in any ICN architecture. The proposed solution is evaluated with respect to the overhead it imposes, number of required keys, and efficiency of content dissemination. In contrast to existing approaches, it offers higher access control flexibility, while reducing key management process complexity (in some scenarios, resulting in 97% less keys and objects in the network).

[1]  Sapna Singh,et al.  A Trust Based Approach For Secure Access Control In Information Centric Network , 2012 .

[2]  Satyajayant Misra,et al.  Secure content delivery in information-centric networks: design, implementation, and analyses , 2013, ICN '13.

[3]  Giannis F. Marias,et al.  Access control enforcement delegation for information-centric networking architectures , 2012, CCRV.

[4]  Dimitra I. Kaklamani,et al.  On the use of Attribute‐Based Encryption for multimedia content protection over Information‐Centric Networks , 2014, Trans. Emerg. Telecommun. Technol..

[5]  Daniel Massey,et al.  Information-Centric Networking , 2019, Advances in Computer and Electrical Engineering.

[6]  Nikos Fotiou,et al.  Securing Content Sharing over ICN , 2016, ICN.

[7]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[8]  Gene Tsudik,et al.  Interest-Based Access Control for Content Centric Networks , 2015, ICN.

[9]  Bengt Ahlgren,et al.  A survey of information-centric networking , 2012, IEEE Communications Magazine.

[10]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[11]  Christopher A. Wood,et al.  Flexible end-to-end content security in CCN , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).

[12]  Nikos Fotiou,et al.  A Survey of Information-Centric Networking Research , 2014, IEEE Communications Surveys & Tutorials.

[13]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[14]  Sihem Guemara El Fatmi,et al.  Data-based access control in named data networking , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.