2019
DOI: 10.1109/tnet.2019.2914189
|View full text |Cite
|
Sign up to set email alerts
|

A Secure, Efficient, and Accountable Edge-Based Access Control Framework for Information Centric Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(16 citation statements)
references
References 32 publications
0
16
0
Order By: Relevance
“…Edge computing can handle a large number of data calculations. When edge computing nodes keep good quality, they have lower latency and better broadband than cloud nodes [34]. The edge can perform operations such as computing, offloading, data storage, caching, and processing.…”
Section: Edge Computingmentioning
confidence: 99%
“…Edge computing can handle a large number of data calculations. When edge computing nodes keep good quality, they have lower latency and better broadband than cloud nodes [34]. The edge can perform operations such as computing, offloading, data storage, caching, and processing.…”
Section: Edge Computingmentioning
confidence: 99%
“…Such decisions will depend a lot on whether PD-ICN nodes will be realized as standalone routers, or will be software driven hosted at a datacenter/IXP. Open Questions: Different privacy preserving naming schemes already exists based on different encryption schemes, such as, hash chain [58] and symmetric encryption [3,48], nevertheless, due to the complex functionality of PD-ICN, two open question need to be answered. (1) How to construct a general purpose naming scheme for personal data that allows all the different functionalities that PD-ICN provides?…”
Section: Data Layer (Dl)mentioning
confidence: 99%
“…Open Questions: Data encryption in ICN networks is heavily depended on the Naming and Routing scheme [3,48,53,58]. In addition, in PD-ICN we also have to deal with additional constrains.…”
Section: Data Layer (Dl)mentioning
confidence: 99%
“…Also, they can transfer heavy computation to the user equipment. To reduce computation overhead and delay in Information-Centric Networking (ICN) authentication, a secure, efficient, and accountable edge access control scheme was designed by adopting group signature and hash chain techniques [31]. This framework not only reduced overhead but also provided service accountability.…”
Section: B Access Control Technologymentioning
confidence: 99%