Secure Distribution of Protected Content in Information-Centric Networking

@article{Bilal2020SecureDO,
  title={Secure Distribution of Protected Content in Information-Centric Networking},
  author={Muhammad Bilal and S. Pack},
  journal={IEEE Systems Journal},
  year={2020},
  volume={14},
  pages={1921-1932}
}
The benefits of the ubiquitous caching in information centric networking (ICN) are profound; even though such features make ICN promising for content distribution, but it also introduces a challenge to content protection against the unauthorized access. The protection of a content against unauthorized access requires consumer authentication and involves the conventional end-to-end encryption. However, in ICN, such end-to-end encryption makes the content caching ineffective since encrypted… Expand
Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure
TLDR
This paper proposes secure content dissemination architecture for CCN using elliptic curve cryptography based public key infrastructure (ECC-PKI) and a formal security verification concludes that the proposed scheme is secure against the existing relevant cryptographic attacks. Expand
An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation
TLDR
A novel encryption-based access control scheme to address the access control issues in Named Data Networking (NDN), and the performance analysis shows that the scheme achieves better results than existing schemes in terms of functionality, computation, storage, and communication overhead. Expand
Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks
TLDR
The scheme utilizes the homomorphic multiplication property of the improved HRES algorithm to compute the cosine result between the normalized vectors as the standard for measuring the users’ proximity, and can effectively improve the social experience of users. Expand
Novel one round message authentication scheme for constrained IoT devices
TLDR
A lightweight MAA that provides data integrity and source authentication based on a dynamic key structure with a single round and simple operations that is immune against existing attacks and require low overhead in terms of computational and storage resources is proposed. Expand
What do information centric networks, trusted execution environments, and digital watermarking have to do with privacy, the data economy, and their future?
TLDR
This opinion article discusses how ICNs combined with trusted execution environments and digital watermarking, can be combined to build a personal data overlay inter-network in which users will be able to control who gets access to their personal data, know where each copy of said data is, and establish accountability for data leakages due to malfunctions or malice. Expand

References

SHOWING 1-10 OF 47 REFERENCES
Effective Caching for the Secure Content Distribution in Information-Centric Networking
TLDR
The Secure Distribution of Protected Content (SDPC) is a lightweight authentication and key distribution protocol that allows consumer nodes to verify the originality of the published article by using a symmetric key encryption. Expand
Optimized access control enforcement over encrypted content in information-centric networks
TLDR
This work proposes an access control solution for ICN by adapting and optimizing a proxy re-encryption scheme, reducing up to 33% the processing time and simultaneously ensuring content protection against unauthorized access of contents retrieved from unrestricted in-network caches as well as access control policies enforcement for legitimate users. Expand
Flexible end-to-end content security in CCN
TLDR
This paper presents a secure content distribution architecture for CCN that is based on proxy re-encryption, and provides strong end-to-end content security and reduces the number of protocol messages required for user authentication and key retrieval. Expand
Achieving secure and scalable data access control in information-centric networking
TLDR
The new proposed dual-phase encryption that uniquely combines the ideas from one-time decryption key, proxy re-encryption and all-or-nothing transformation, while still being able to leverage ICN's features is presented. Expand
Mandatory Content Access Control for Privacy Protection in Information Centric Networks
TLDR
This paper proposes Mandatory Content Access Control (MCAC), a distributed information flow control mechanism to enable a content provider to control which network nodes can cache its contents, and proposes a design of a trusted architecture by extending existing mainstream router architectures. Expand
Copyright protection scheme for Information-Centric Networking base on the linear network coding
As a novel network architecture, Information-Centric Networking(ICN) has a good performance in security, mobility and scalability. Although in-network cache used in ICN can effectively solve theExpand
Copyright protection scheme for Information-Centric Networking base on the linear network coding
TLDR
A novel scheme to solve the problem of copyright protection by taking the method of the network encoding and splitting the large-sized content into N blocks and shows that the scheme has a good performance in copyright protection. Expand
A Survey of Security Attacks in Information-Centric Networking
TLDR
This paper provides a survey of attacks unique to ICN architectures and other generic attacks that have an impact on ICN and provides a taxonomy of these attacks in ICN, which are classified into four main categories. Expand
Secure content delivery in information-centric networks: design, implementation, and analyses
TLDR
A novel secure content delivery framework, for an information-centric network, which will enable content providers to securely disseminate their content to legitimate users via content distribution networks (CDNs) and Internet service providers (ISPs). Expand
AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge
TLDR
This paper proposes an efficient access control framework for ICN, which allows legitimate users to access and use the cached content directly, and does not require verification/authentication by an online provider authentication server or the content serving router. Expand
...
1
2
3
4
5
...