Secure content delivery in information-centric networks: design, implementation, and analyses

@inproceedings{Misra2013SecureCD,
  title={Secure content delivery in information-centric networks: design, implementation, and analyses},
  author={Satyajayant Misra and Reza Tourani and Nahid Ebrahimi Majd},
  booktitle={ICN '13},
  year={2013}
}
In this paper, we propose a novel secure content delivery framework, for an information-centric network, which will enable content providers (e.g., Netflix and Youtube) to securely disseminate their content to legitimate users via content distribution networks (CDNs) and Internet service providers (ISPs). Use of our framework will enable legitimate users to receive/consume encrypted content cached at a nearby router (CDN or ISP), even when the providers are offline. Our framework would slash… 

Figures from this paper

CSEVP: A Collaborative, Secure, and Efficient Content Validation Protection Framework for Information Centric Networking
TLDR
A collaborative, secure, and efficient content validation protection framework, named CSEVP, to implement a multi-router collaborative defense mechanism for ICN and can achieve efficient content validity verification among multiple routers with acceptable low communication and storage overhead.
Flexible end-to-end content security in CCN
TLDR
This paper presents a secure content distribution architecture for CCN that is based on proxy re-encryption, and provides strong end-to-end content security and reduces the number of protocol messages required for user authentication and key retrieval.
Mobile sessions in content-centric networks
TLDR
The design and implementation of the CCNx Key Exchange Protocol is presented — the first protocol design for bootstrapping encrypted service-centric sessions in CCN and it is indicated that session encryption adds, on average, a 30% data transfer latency compared to unencrypted traffic using the prototype implementation.
Session-based access control in information-centric networks: Design and analyses
TLDR
This paper proposes a session-based access control (SAC) mechanism for ICN scenario to bridge the gap in communication security and privacy protection, and employs a dynamic naming scheme to enhance user privacy.
AccConF: An Access Control Framework for Leveraging In-Network Cached Data in ICNs
TLDR
This paper proposes an efficient access control framework for ICN, which allows legitimate users to access and use the cached content directly, and does not require verification/authentication by an online provider authentication server or the content serving router.
Secure Content Delivery Scheme Based on Yaksha System for CCMANETs
TLDR
Secure Content Delivery scheme based on Yaksha (YSCD) for CCMANET is proposed and it is guaranteed that only the legitimate users can publish to the network and access the content cached on the network.
Secure off-path replication in content-centric networks
TLDR
This work presents SCR, a secure content replication protocol for the Content-Centric Networking (CCN) architecture, and shows that the scheme can outperform blind caching due to less protocol complexity and message overhead, faster session establishment, and the ability to obtain data in parallel from multiple, independent replicas.
AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge
TLDR
This paper proposes an efficient access control framework for ICN, which allows legitimate users to access and use the cached content directly, and does not require verification/authentication by an online provider authentication server or the content serving router.
Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking
TLDR
Two cryptographic protocols for content sharing and aggregation are proposed: 1) cryptographic protocol to exchange the encrypted content (CPE2C) and 2) privacy-preserving aggregation over distributed content (PDAC) which can share and aggregate the content securely.
Assessing the impact of cryptographic access control solutions on multimedia delivery in information-centric networks
TLDR
It is shown that leveraging cache efficiency, computational load to encrypt and decrypt content, and user revocation are the biggest challenges for the enforcement of access control policies on ICN.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 24 REFERENCES
Privacy in content-oriented networking: threats and countermeasures
TLDR
A systematic privacy analysis of Content-Oriented Networking and the common building blocks among its various architectural instances is provided in order to highlight emerging privacy threats, and analyze a few potential countermeasures.
Secure group communications using key graphs
TLDR
It is shown that the group key management service, using any of the three rekeying strategies, is scalable to large groups with frequent joins and leaves, and the average measured processing time per join/leave increases linearly with the logarithm of group size.
Networking named content
TLDR
Content-Centric Networking (CCN) is presented which uses content chunks as a primitive---decoupling location from identity, security and access, and retrieving chunks of content by name, and simultaneously achieves scalability, security, and performance.
Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures
TLDR
This technical report discusses several privacy attacks related to the ubiquitous presence of caching in Content-Centric Networking, and identifies the architectural features and protocol functions that make these attacks possible, and recommends measures to mitigate cache-based attacks.
Developing Information Networking Further: From PSIRP to PURSUIT
TLDR
The project has developed, implemented, and preliminarily evaluated solutions for rendezvous, topology formation and routing, and information forwarding, with ongoing work currently focusing in experimenting.
The Publish/Subscribe Internet Routing Paradigm (PSIRP): Designing the Future Internet Architecture
TLDR
Through its application of pub/sub communications and efficient network design emphasizing end-to-end trust, it is believed that the PSIRP-reengineered Internet may resolve many of the problems plaguing the current Internet and provide a powerful and flexible network infrastructure with a high degree of resiliency.
NetInf: An Information-Centric Design for the Future Internet
TLDR
A new, information-centric network architecture called Network of Information (NetInf) is developed in the context of the FP7 EU-funded 4WARD project which can significantly improve large scale information distribution and supports future mobile networks in situations with intermittent and heterogeneous connectivity.
Enhancing cache robustness for content-centric networking
TLDR
CacheShield can effectively improve cache performance under normal circumstances, and more importantly, shield CCN routers from cache pollution attacks, and is effective for both CCN and today's cache servers.
Scalable Secure Bidirectional Group Communication
  • Yitao Duan, J. Canny
  • Computer Science
    IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications
  • 2007
TLDR
This paper presents a secure group communication scheme based on a new cryptosystem that admits a rigorous proof of security against adaptive chosen ciphertext attack (IND-CCA2), and shows that this protection is more effective and more efficient than existing solutions.
Revocation and Tracing Schemes for Stateless Receivers
TLDR
The main improvements of these methods over previously suggested methods are reducing the message length to O(r) regardless of the coalition size while maintaining a single decryption at the user's end and providing a seamless integration between the revocation and tracing so that the tracing mechanisms does not require any change to the revocation algorithm.
...
1
2
3
...