Proceedings of the 3rd ACM Conference on Information-Centric Networking 2016
DOI: 10.1145/2984356.2984376
|View full text |Cite
|
Sign up to set email alerts
|

Securing Content Sharing over ICN

Abstract: The emerging Information-Centric Networking (ICN) paradigm is expected to facilitate content sharing among users. ICN will make it easy for users to appoint storage nodes, in various network locations, perhaps owned or controlled by them, where shared content can be stored and disseminated from. These storage nodes should be (somewhat) trusted since not only they have (some level of) access to user shared content, but they should also properly enforce access control. Traditional forms of encryption introduce s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 25 publications
0
15
0
Order By: Relevance
“…For this solution, we leverage IB-PRE to provide access control on content items stored in network endpoints outside the administrative realm of the content owner, as in [19]. We assume that each content item is encrypted by the content owner using a symmetric encryption algorithm (each item with a different key) and each item is protected by an access control policy.…”
Section: Access Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…For this solution, we leverage IB-PRE to provide access control on content items stored in network endpoints outside the administrative realm of the content owner, as in [19]. We assume that each content item is encrypted by the content owner using a symmetric encryption algorithm (each item with a different key) and each item is protected by an access control policy.…”
Section: Access Controlmentioning
confidence: 99%
“…Moreover, storage endpoints learn no secret information. For a more thorough security analysis of this solution, interested readers are referred to [19].…”
Section: Security Evaluationmentioning
confidence: 99%
“…We argue that local processing of data within an edge IoT domain can provide better privacy and security compared to cloud-based systems that perform both storage and processing in the cloud. To that end, we envision a proxy reencryption (PRE) based access control scheme similar to the one proposed by Fotiou et al [17], which would allow encryption of processed IoT data before sending it to untrusted parties for better privacy and security. Using the proxy reencryption mechanism, a delegator (e.g., local processing node) can enforce the data access control policies of the IoT domain at an untrusted delegatee (e.g., remote storage services) when encrypted data are shared.…”
Section: Privacy and Security Considerationsmentioning
confidence: 99%
“…Although our solution is specific to PSI, it can be generalized to any rendezvous‐based ICN architecture, ie, an architecture where a centralized network entity mediates content demand and supply. Our solution is built on our previous works described in Fotiou et al and Fotiou and Polyzos . In particular, the security mechanisms discussed in Fotiou and Polyzos are applied to the solution presented in Fotiou et al so as to remove the need for a trusted entity (in Fotiou et al, this entity is referred to as the Access Control Provider ).…”
Section: Introductionmentioning
confidence: 99%
“…Our solution is built on our previous works described in Fotiou et al and Fotiou and Polyzos . In particular, the security mechanisms discussed in Fotiou and Polyzos are applied to the solution presented in Fotiou et al so as to remove the need for a trusted entity (in Fotiou et al, this entity is referred to as the Access Control Provider ). As a consequence, this work adds significant less communication overhead compared to Fotiou et al…”
Section: Introductionmentioning
confidence: 99%