Towards Access Control for Network Coding-Based Named Data Networking
Title | Towards Access Control for Network Coding-Based Named Data Networking |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Wu, D., Xu, Z., Chen, B., Zhang, Y. |
Conference Name | GLOBECOM 2017 - 2017 IEEE Global Communications Conference |
Date Published | dec |
Publisher | IEEE |
ISBN Number | 978-1-5090-5019-2 |
Keywords | Access Control solution, authorisation, Authorization, authorization key, composability, computational overhead, computer network security, content delivery, content delivery effectiveness, content producer, content-oriented future Internet architecture, cryptography, encoding, encoding matrix, Encryption, in-network caching, information-intensive application, Internet, linear all-or-nothing transform, linear AONT, matrix algebra, Metrics, Mobile Application, mobile computing, ndnSIM, network coding, network coding-based named data networking, network coding-based NDN, pubcrawl, resilience, Resiliency, security analysis, telecommunication network routing, Transforms |
Abstract | Named Data Networking (NDN) is a content-oriented future Internet architecture, which well suits the increasingly mobile and information-intensive applications that dominate today's Internet. NDN relies on in-network caching to facilitate content delivery. This makes it challenging to enforce access control since the content has been cached in the routers and the content producer has lost the control over it. Due to its salient advantages in content delivery, network coding has been introduced into NDN to improve content delivery effectiveness. In this paper, we design ACNC, the first Access Control solution specifically for Network Coding-based NDN. By combining a novel linear AONT (All Or Nothing Transform) and encryption, we can ensure that only the legitimate user who possesses the authorization key can successfully recover the encoding matrix for network coding, and hence can recover the content being transmitted. In addition, our design has two salient merits: 1) the linear AONT well suits the linear nature of network coding; 2) only one vector of the encoding matrix needs to be encrypted/decrypted, which only incurs small computational overhead. Security analysis and experimental evaluation in ndnSIM show that our design can successfully enforce access control on network coding-based NDN with an acceptable overhead. |
URL | https://ieeexplore.ieee.org/document/8254005/ |
DOI | 10.1109/GLOCOM.2017.8254005 |
Citation Key | wu_towards_2017 |
- network coding-based named data networking
- linear all-or-nothing transform
- linear AONT
- matrix algebra
- Metrics
- Mobile Application
- mobile computing
- ndnSIM
- network coding
- internet
- network coding-based NDN
- pubcrawl
- resilience
- Resiliency
- Security analysis
- telecommunication network routing
- Transforms
- content producer
- authorisation
- authorization
- authorization key
- composability
- computational overhead
- computer network security
- content delivery
- content delivery effectiveness
- Access Control solution
- content-oriented future Internet architecture
- Cryptography
- encoding
- encoding matrix
- encryption
- in-network caching
- information-intensive application