Visible to the public Attribute-Based Accountable Access Control for Multimedia Content with In-Network Caching

TitleAttribute-Based Accountable Access Control for Multimedia Content with In-Network Caching
Publication TypeConference Paper
Year of Publication2019
AuthorsHe, Peixuan, Xue, Kaiping, Xu, Jie, Xia, Qiudong, Liu, Jianqing, Yue, Hao
Conference Name2019 IEEE International Conference on Multimedia and Expo (ICME)
Date Publishedjul
KeywordsAccess Control, access policy based authentication, attribute-based accountable access control scheme, attribute-based encryption, authentication, cryptography, edge router side, Encryption, Human Behavior, in-network caching, in-network content caching, informal security analysis, IP networks, IP traffic, Multimedia communication, multimedia content distribution, multimedia content provider, multimedia content retrieval, Multimedia content security, policy-based governance, pubcrawl, Scalability, secure access control, service accounting, service requirement, Streaming media, telecommunication control, telecommunication network routing, telecommunication security, telecommunication traffic
AbstractNowadays, multimedia content retrieval has become the major service requirement of the Internet and the traffic of these contents has dominated the IP traffic. To reduce the duplicated traffic and improve the performance of distributing massive volumes of multimedia contents, in-network caching has been proposed recently. However, because in-network content caching can be directly utilized to respond users' requests, multimedia content retrieval is beyond content providers' control and makes it hard for them to implement access control and service accounting. In this paper, we propose an attribute-based accountable access control scheme for multimedia content distribution while making the best of in-network caching, in which content providers can be fully offline. In our scheme, the attribute-based encryption at multimedia content provider side and access policy based authentication at the edge router side jointly ensure the secure access control, which is also efficient in both space and time. Besides, secure service accounting is implemented by letting edge routers collect service credentials generated during users' request process. Through the informal security analysis, we prove the security of our scheme. Simulation results demonstrate that our scheme is efficient with acceptable overhead.
DOI10.1109/ICME.2019.00139
Citation Keyhe_attribute-based_2019