An efficient KP-ABE scheme for content protection in Information-Centric Networking
Title | An efficient KP-ABE scheme for content protection in Information-Centric Networking |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Wang, Jinmiao, Lang, Bo |
Conference Name | 2016 IEEE Symposium on Computers and Communication (ISCC) |
Date Published | June 2016 |
Publisher | IEEE |
ISBN Number | 978-1-5090-0679-3 |
Keywords | Access Control, attribute based encryption, attribute-based encryption, cache storage, cached contents, Collaboration, Computer architecture, computer network security, content protection, cryptography, data protection, Data security, efficient key-policy ABE, efficient KP-ABE scheme, Encryption, fast decryption, fast key decryption, fast key generation, FKP-ABE, ICN, indeterminate caches, information-centric networking, Internet, Internet traffic, key policy attribute based encryption, KP-ABE, KP-ABE schemes, policy-based governance, pubcrawl, Scalability, self-contained protection, Streaming media, telecommunication traffic |
Abstract | Media streaming has largely dominated the Internet traffic and the trend will keep increasing in the next years. To efficiently distribute the media content, Information-Centric Networking (ICN) has attracted many researchers. Since end users usually obtain content from indeterminate caches in ICN, the publisher cannot reinforce data security and access control depending on the caches. Hence, the ability of self-contained protection is important for the cached contents. Attribute-based encryption (ABE) is considered the preferred solution to achieve this goal. However, the existing ABE schemes usually have problems regarding efficiency. The exponentiation in key generation and pairing operation in decryption respectively increases linearly with the number of attributes involved, which make it costly. In this paper, we propose an efficient key-policy ABE with fast key generation and decryption (FKP-ABE). In the key generation, we get rid of exponentiation and only require multiplications/divisions for each attribute in the access policy. And in the decryption, we reduce the pairing operations to a constant number, no matter how many attributes are used. The efficiency analysis indicates that our scheme has better performance than the existing KP-ABE schemes. Finally, we present an implementation framework that incorporates the proposed FKP-ABE with the ICN architecture. |
URL | https://ieeexplore.ieee.org/document/7543839 |
DOI | 10.1109/ISCC.2016.7543839 |
Citation Key | wang_efficient_2016 |
- KP-ABE
- fast key generation
- FKP-ABE
- ICN
- indeterminate caches
- information-centric networking
- internet
- Internet traffic
- key policy attribute based encryption
- fast key decryption
- KP-ABE schemes
- policy-based governance
- pubcrawl
- Scalability
- self-contained protection
- Streaming media
- telecommunication traffic
- Access Control
- fast decryption
- encryption
- efficient KP-ABE scheme
- efficient key-policy ABE
- Data Security
- Data protection
- Cryptography
- content protection
- computer network security
- computer architecture
- collaboration
- cached contents
- cache storage
- attribute-based encryption
- attribute based encryption