2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) 2015
DOI: 10.1109/ccnc.2015.7157958
|View full text |Cite
|
Sign up to set email alerts
|

An access control mechanism to ensure privacy in named data networking using attribute-based encryption with immediate revocation of privileges

Abstract: For future Internet, information-centric networking (ICN) is considered a potential solution to many of its current problems. However, concern regarding the protection of user data persists. This paper presents an access control mechanism that will allow users to set fine-grained access policies for applications in named data networking (NDN), a popular ICN architecture. Using an attribute-based encryption scheme with an immediate revocation of privileges, data security is guaranteed. The mechanism inserts a p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(24 citation statements)
references
References 12 publications
0
24
0
Order By: Relevance
“…Da Silva et al [124] proposed an AC mechanism using attribute-based encryption for instantaneous access revocation. The authors suggested the use of Ciphertext-policy ABE, in which the access policy, generated by the provider, is embedded inside the encrypted content.…”
Section: A Encryption-based Access Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…Da Silva et al [124] proposed an AC mechanism using attribute-based encryption for instantaneous access revocation. The authors suggested the use of Ciphertext-policy ABE, in which the access policy, generated by the provider, is embedded inside the encrypted content.…”
Section: A Encryption-based Access Controlmentioning
confidence: 99%
“…Although we believe that the latter approach is more acceptable, as it imposes less complexity, efficient access revocation is a key design factor for scalable AC in ICNs. Some of the proposed mechanisms [114], [119], [120], [124], [127], [130], [131], [133] require the network (routers) to enforce AC and authenticate clients. The fact that the intermediate routers have to perform authentication procedure undermines the scalability of these mechanisms.…”
Section: Summary and Future Directions In Access Controlmentioning
confidence: 99%
“…a ciphertext can be decrypted by the users who have the 'CS' AND 'student' OR 'professor' attributes. ABE has been widely used for implementing contemporary systems with distributed content sharing capabilities (e.g., [3], [20]) and has received considerable attention by the ICN community (e.g., [14], [18], [6]) . In these systems users use attributes to describe groups of trusted peers (e.g., 'friends', 'colleagues' etc.…”
Section: Related Workmentioning
confidence: 99%
“…(3) The encryption method proposed in the literature [6,7] can protect the privacy of content, but it cannot play the advantage of the universal cache of nodes. The strategy of this paper does not add extra time delay to response time, and there is also no additional proxy servers.…”
Section: Protocol Security Analysismentioning
confidence: 99%
“…Mohaisen A et al [6] proposed to increase response time to protect the cache privacy, but it would bring additional response delay and reduce the network transmission performance. Silva R S D et al [7] proposed a content data access control mechanism by using attribute encryption algorithm, which needs to configure a trusted proxy server. Feng T et al [8] proposed bidirectional anonymous identity-based ring signcryption for multiple receiver's scheme.…”
Section: Introductionmentioning
confidence: 99%