2020
DOI: 10.1109/jsyst.2019.2931813
|View full text |Cite
|
Sign up to set email alerts
|

Secure Distribution of Protected Content in Information-Centric Networking

Abstract: The benefits of the ubiquitous caching in ICN are profound, such features make ICN promising for content distribution, but it also introduces a challenge to content protection against the unauthorized access. The protection of a content against unauthorized access requires consumer authentication and involves the conventional end-to-end encryption. However, in information-centric networking (ICN), such end-to-end encryption makes the content caching ineffective since encrypted contents stored in a cache are us… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(9 citation statements)
references
References 40 publications
0
9
0
Order By: Relevance
“…Muhammed et al [36] presented a new scheme called the secure distribution of protected content (SDPC) to ensure that only authenticated consumers can access the content. Furthermore, the paper presented all relevant security issues in the ICN by performing a formal analysis using BAN logic Scyther implementation.…”
Section: Threats To the Icnmentioning
confidence: 99%
“…Muhammed et al [36] presented a new scheme called the secure distribution of protected content (SDPC) to ensure that only authenticated consumers can access the content. Furthermore, the paper presented all relevant security issues in the ICN by performing a formal analysis using BAN logic Scyther implementation.…”
Section: Threats To the Icnmentioning
confidence: 99%
“…Such decisions will depend a lot on whether PD-ICN nodes will be realized as standalone routers, or will be software driven hosted at a datacenter/IXP. Open Questions: Different privacy preserving naming schemes already exists based on different encryption schemes, such as, hash chain [58] and symmetric encryption [3,48], nevertheless, due to the complex functionality of PD-ICN, two open question need to be answered. (1) How to construct a general purpose naming scheme for personal data that allows all the different functionalities that PD-ICN provides?…”
Section: Data Layer (Dl)mentioning
confidence: 99%
“…Open Questions: Data encryption in ICN networks is heavily depended on the Naming and Routing scheme [3,48,53,58]. In addition, in PD-ICN we also have to deal with additional constrains.…”
Section: Data Layer (Dl)mentioning
confidence: 99%
“…Re-encryption technology supports a proxy transferring decryption authority without decrypting ciphertext [24]. On this basis, homomorphic re-encryption supports homomorphic operation on ciphertext, which is more suitable for data dissemination in networks with special needs.…”
Section: Homomorphic Re-encryptionmentioning
confidence: 99%