Visible to the public An efficient KP-ABE scheme for content protection in Information-Centric Networking

TitleAn efficient KP-ABE scheme for content protection in Information-Centric Networking
Publication TypeConference Paper
Year of Publication2016
AuthorsWang, Jinmiao, Lang, Bo
Conference Name2016 IEEE Symposium on Computers and Communication (ISCC)
Date PublishedJune 2016
PublisherIEEE
ISBN Number978-1-5090-0679-3
KeywordsAccess Control, attribute based encryption, attribute-based encryption, cache storage, cached contents, Collaboration, Computer architecture, computer network security, content protection, cryptography, data protection, Data security, efficient key-policy ABE, efficient KP-ABE scheme, Encryption, fast decryption, fast key decryption, fast key generation, FKP-ABE, ICN, indeterminate caches, information-centric networking, Internet, Internet traffic, key policy attribute based encryption, KP-ABE, KP-ABE schemes, policy-based governance, pubcrawl, Scalability, self-contained protection, Streaming media, telecommunication traffic
Abstract

Media streaming has largely dominated the Internet traffic and the trend will keep increasing in the next years. To efficiently distribute the media content, Information-Centric Networking (ICN) has attracted many researchers. Since end users usually obtain content from indeterminate caches in ICN, the publisher cannot reinforce data security and access control depending on the caches. Hence, the ability of self-contained protection is important for the cached contents. Attribute-based encryption (ABE) is considered the preferred solution to achieve this goal. However, the existing ABE schemes usually have problems regarding efficiency. The exponentiation in key generation and pairing operation in decryption respectively increases linearly with the number of attributes involved, which make it costly. In this paper, we propose an efficient key-policy ABE with fast key generation and decryption (FKP-ABE). In the key generation, we get rid of exponentiation and only require multiplications/divisions for each attribute in the access policy. And in the decryption, we reduce the pairing operations to a constant number, no matter how many attributes are used. The efficiency analysis indicates that our scheme has better performance than the existing KP-ABE schemes. Finally, we present an implementation framework that incorporates the proposed FKP-ABE with the ICN architecture.

URLhttps://ieeexplore.ieee.org/document/7543839
DOI10.1109/ISCC.2016.7543839
Citation Keywang_efficient_2016