skip to main content
10.1145/2984356.2984366acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Open access

Access-Controlled In-Network Processing of Named Data

Published: 26 September 2016 Publication History

Abstract

In content-based security, encrypted content as well as wrapped access keys are made freely available by an Information Centric Network: Only those clients which are able to unwrap the encryption key can access the protected content. In this paper we extend this model to computation chains where derived data (e.g. produced by a Named Function Network) also has to comply to the content-based security approach. A central problem to solve is the synchronized on-demand publishing of encrypted results and wrapped keys as well as defining the set of consumers which are authorized to access the derived data. In this paper we introduce "content-attendant policies" and report on a running prototype that demonstrates how to enforce data owner-defined access control policies despite fully decentralized and arbitrarily long computation chains.

References

[1]
CCN-Lite, 2016. http://ccn-lite.net.
[2]
Named Data Networking, 2016. http://named-data.net.
[3]
NFN-Scala, 2016. https://github.com/cn-uofbasel/nfn-scala.
[4]
Church, A. An unsolvable problem of elementary number theory. American Journal of Mathematics 58, 2 (April 1936), 345–363.
[5]
Dierks, T. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, Oct. 2015.
[6]
Hu, V. C., Ferraiolo, D., Kuhn, R., Friedman, A. R., Lang, A. J., Cogdell, M. M., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K., et al. Guide to attribute based access control (abac) definition and considerations (draft). NIST Special Publication 800, 162 (2013).
[7]
Jacobson, V., Smetters, D. K., Thornton, J. D., Plass, M. F., Briggs, N. H., and Braynard, R. L. Networking named content. In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (New York, NY, USA, 2009), CoNEXT '09, ACM, pp. 1–12.
[8]
Sifalakis, M., Kohler, B., Scherb, C., and Tschudin, C. An information centric network for computing the distribution of computations. In Proceedings of the 1st International Conference on Information-centric Networking (New York, NY, USA, 2014), ICN '14, ACM, pp. 137–146.
[9]
Smetters, D. K., and Jacobson, V. Securing network content. Tech. rep., PARC, October 2009.

Cited By

View all
  • (2024)CyMed: A Framework for Testing Connected Medical DevicesSociety 5.010.1007/978-3-031-71412-2_22(293-304)Online publication date: 12-Oct-2024
  • (2021)Drone Swarms as Networked Control Systems by Integration of Networking and ComputingSensors10.3390/s2108264221:8(2642)Online publication date: 9-Apr-2021
  • (2021)Access Control Mechanisms in Named Data NetworksACM Computing Surveys10.1145/344215054:3(1-35)Online publication date: 17-Apr-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ACM-ICN '16: Proceedings of the 3rd ACM Conference on Information-Centric Networking
September 2016
275 pages
ISBN:9781450344678
DOI:10.1145/2984356
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 September 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. content centric networking
  3. in-network computation
  4. information centric networking
  5. named data networking
  6. named function networking
  7. privacy
  8. security

Qualifiers

  • Research-article

Conference

ICN'16
Sponsor:

Acceptance Rates

ACM-ICN '16 Paper Acceptance Rate 23 of 84 submissions, 27%;
Overall Acceptance Rate 133 of 482 submissions, 28%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)86
  • Downloads (Last 6 weeks)25
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)CyMed: A Framework for Testing Connected Medical DevicesSociety 5.010.1007/978-3-031-71412-2_22(293-304)Online publication date: 12-Oct-2024
  • (2021)Drone Swarms as Networked Control Systems by Integration of Networking and ComputingSensors10.3390/s2108264221:8(2642)Online publication date: 9-Apr-2021
  • (2021)Access Control Mechanisms in Named Data NetworksACM Computing Surveys10.1145/344215054:3(1-35)Online publication date: 17-Apr-2021
  • (2021)Evaluation of Opportunistic Service Provisioning with Ordered ChainingIEEE Transactions on Services Computing10.1109/TSC.2018.284202514:3(724-735)Online publication date: 1-May-2021
  • (2021)SCoIoT: Swarm-Computations for the Internet of Things2021 International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN52240.2021.9522204(1-6)Online publication date: Jul-2021
  • (2019)Fog Computing in IoT Smart Environments via Named Data Networking: A Study on Service Orchestration MechanismsFuture Internet10.3390/fi1111022211:11(222)Online publication date: 24-Oct-2019
  • (2019)Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions2019 15th International Conference on Network and Service Management (CNSM)10.23919/CNSM46954.2019.9012668(1-9)Online publication date: Oct-2019
  • (2019)Execution Plans for Serverless Computing in Information Centric NetworkingProceedings of the 1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms10.1145/3359993.3366765(34-40)Online publication date: 9-Dec-2019
  • (2019)IoT Services Allocation at the Edge via Named Data Networking: From Optimal Bounds to Practical DesignIEEE Transactions on Network and Service Management10.1109/TNSM.2019.290027416:2(661-674)Online publication date: Jun-2019
  • (2018)Secure and Efficient Content Distribution in Crowdsourced Vehicular Content-Centric NetworkingIEEE Access10.1109/ACCESS.2017.27785026(5727-5739)Online publication date: 2018
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media