Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking
Title | Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Goldman, A.D., Uluagac, A.S., Copeland, J.A. |
Conference Name | Local Computer Networks (LCN), 2014 IEEE 39th Conference on |
Date Published | Sept |
Keywords | CCFS, content authentication, Content Centric Networking (CCN), Cryptographically Curated File System (CCFS), cryptographically strong content identifiers, cryptographically-curated file system, Delay Tolerant Networking (DTN), file hashes, File systems, Google, Information Centric Networks (ICN), information networks, information-centric networking, integrity verification, Inter-operable Heterogeneous Storage, IP networks, Name Orientated Networking (NON), network layer, Prototypes, Public key, public key cryptography, public keys, Self Certifying File Systems, Servers, storage management, storage systems, storage technologies, trust boundaries |
Abstract | Cryptographically-Curated File System (CCFS) proposed in this work supports the adoption of Information-Centric Networking. CCFS utilizes content names that span trust boundaries, verify integrity, tolerate disruption, authenticate content, and provide non-repudiation. Irrespective of the ability to reach an authoritative host, CCFS provides secure access by binding a chain of trust into the content name itself. Curators cryptographically bind content to a name, which is a path through a series of objects that map human meaningful names to cryptographically strong content identifiers. CCFS serves as a network layer for storage systems unifying currently disparate storage technologies. The power of CCFS derives from file hashes and public keys used as a name with which to retrieve content and as a method of verifying that content. We present results from our prototype implementation. Our results show that the overhead associated with CCFS is not negligible, but also is not prohibitive. |
URL | https://ieeexplore.ieee.org/document/6925766 |
DOI | 10.1109/LCN.2014.6925766 |
Citation Key | 6925766 |
- Inter-operable Heterogeneous Storage
- trust boundaries
- storage technologies
- storage systems
- storage management
- Servers
- Self Certifying File Systems
- public keys
- public key cryptography
- Public key
- Prototypes
- network layer
- Name Orientated Networking (NON)
- IP networks
- CCFS
- integrity verification
- information-centric networking
- information networks
- Information Centric Networks (ICN)
- File systems
- file hashes
- Delay Tolerant Networking (DTN)
- cryptographically-curated file system
- cryptographically strong content identifiers
- Cryptographically Curated File System (CCFS)
- Content Centric Networking (CCN)
- content authentication