skip to main content
10.1145/2486001.2491717acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
poster
Free access

Toward content-centric privacy in ICN: attribute-based encryption and routing

Published: 27 August 2013 Publication History

Abstract

We design a content-centric privacy scheme for Information-Centric Networking (ICN). We enhance ICN's ability to support data confidentiality by introducing attribute-based encryption into ICN and making it specific to the data attributes. Our approach is unusual in that it preserves ICN's goal to decouple publishers and subscribers for greater data accessibility, scalable multiparty communication and efficient data distribution. Inspired by application-layer publish-subscribe, we enable fine-grained access control with more expressive policies. Moreover, we propose an attribute-based routing scheme that offers interest confidentiality. A prototype system is implemented based on CCNx, a popular open source version of ICN, to showcase privacy preservation in Smart Neighborhood and Smart City applications.

References

[1]
B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman. A Survey of Information-Centric Networking. IEEE Communications Magazine 50(7):26--36, July 2012.
[2]
Palo Alto Research Center (PARC). Content Centric Networking (CCNx). https://www.ccnx.org/.
[3]
J. Zhang, Q. Li, and E. M. Schooler. iHEMS: An Information-Centric Approach to Secure Home Energy Management. In 3rd IEEE Conf. SmartGridComm, Nov 2012.
[4]
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In The 13th ACM Conf. CCS, Oct 2006.
[5]
J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, pp. 321--334, 2007.
[6]
C. Dong, G. Russello, and N. Dulay. Shared and Searchable Encrypted Data for Untrusted Servers. Journal Computer Security, 19(3):367--397, 2011.
[7]
M. Ion, G. Russello, and B. Crispo. Design and Implementation of a Confidentiliaty and Access Control Solution for Publish/Subscribe Systems. Computer Network, 56(7):2014--2037, May 2012.

Cited By

View all
  • (2023)A System for Collaboration and Information Sharing in Disaster ManagementDisaster Management and Information Technology10.1007/978-3-031-20939-0_4(53-64)Online publication date: 1-Apr-2023
  • (2022)AI-Based Mobile Edge Computing for IoT: Applications, Challenges, and Future ScopeArabian Journal for Science and Engineering10.1007/s13369-021-06348-247:8(9801-9831)Online publication date: 3-Jan-2022
  • (2022)Self-protected content for information-centric networking architectures using verifiable credentialsTelecommunication Systems10.1007/s11235-021-00874-yOnline publication date: 9-Jan-2022
  • Show More Cited By

Index Terms

  1. Toward content-centric privacy in ICN: attribute-based encryption and routing

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGCOMM '13: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
    August 2013
    580 pages
    ISBN:9781450320566
    DOI:10.1145/2486001
    • cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 43, Issue 4
      October 2013
      595 pages
      ISSN:0146-4833
      DOI:10.1145/2534169
      Issue’s Table of Contents
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 August 2013

    Check for updates

    Author Tags

    1. attribute-based encryption
    2. icn
    3. privacy
    4. security

    Qualifiers

    • Poster

    Conference

    SIGCOMM'13
    Sponsor:
    SIGCOMM'13: ACM SIGCOMM 2013 Conference
    August 12 - 16, 2013
    Hong Kong, China

    Acceptance Rates

    SIGCOMM '13 Paper Acceptance Rate 38 of 246 submissions, 15%;
    Overall Acceptance Rate 462 of 3,389 submissions, 14%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)66
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 20 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)A System for Collaboration and Information Sharing in Disaster ManagementDisaster Management and Information Technology10.1007/978-3-031-20939-0_4(53-64)Online publication date: 1-Apr-2023
    • (2022)AI-Based Mobile Edge Computing for IoT: Applications, Challenges, and Future ScopeArabian Journal for Science and Engineering10.1007/s13369-021-06348-247:8(9801-9831)Online publication date: 3-Jan-2022
    • (2022)Self-protected content for information-centric networking architectures using verifiable credentialsTelecommunication Systems10.1007/s11235-021-00874-yOnline publication date: 9-Jan-2022
    • (2022)Distributed access control for information-centric networking architectures using verifiable credentialsInternational Journal of Information Security10.1007/s10207-022-00649-922:2(467-478)Online publication date: 7-Dec-2022
    • (2020)Efficient Lattice CP-ABE AC Scheme Supporting Reduced-OBDD Structure for CCN/NDNSymmetry10.3390/sym1201016612:1(166)Online publication date: 14-Jan-2020
    • (2020)Blockchain-Based Cache Poisoning Security Protection and Privacy-Aware Access Control in NDN Vehicular Edge Computing NetworksJournal of Grid Computing10.1007/s10723-020-09531-1Online publication date: 25-Aug-2020
    • (2018)Blockchain‐based efficient privacy preserving and data sharing scheme of content‐centric network in 5GIET Communications10.1049/iet-com.2017.061912:5(527-532)Online publication date: 28-Feb-2018
    • (2017)Can We Make a Cake and Eat it Too? A Discussion of ICN Security and PrivacyACM SIGCOMM Computer Communication Review10.1145/3041027.304103447:1(49-54)Online publication date: 17-Jan-2017
    • (2017)A Constant-Factor Approximation for Bounded Task Allocation Problem in CrowdsourcingGLOBECOM 2017 - 2017 IEEE Global Communications Conference10.1109/GLOCOM.2017.8254430(1-6)Online publication date: Dec-2017
    • (2017)Towards Access Control for Network Coding-Based Named Data NetworkingGLOBECOM 2017 - 2017 IEEE Global Communications Conference10.1109/GLOCOM.2017.8254005(1-6)Online publication date: Dec-2017
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media