Visible to the public Towards Access Control for Network Coding-Based Named Data Networking

TitleTowards Access Control for Network Coding-Based Named Data Networking
Publication TypeConference Paper
Year of Publication2017
AuthorsWu, D., Xu, Z., Chen, B., Zhang, Y.
Conference NameGLOBECOM 2017 - 2017 IEEE Global Communications Conference
Date Publisheddec
PublisherIEEE
ISBN Number978-1-5090-5019-2
KeywordsAccess Control solution, authorisation, Authorization, authorization key, composability, computational overhead, computer network security, content delivery, content delivery effectiveness, content producer, content-oriented future Internet architecture, cryptography, encoding, encoding matrix, Encryption, in-network caching, information-intensive application, Internet, linear all-or-nothing transform, linear AONT, matrix algebra, Metrics, Mobile Application, mobile computing, ndnSIM, network coding, network coding-based named data networking, network coding-based NDN, pubcrawl, resilience, Resiliency, security analysis, telecommunication network routing, Transforms
Abstract

Named Data Networking (NDN) is a content-oriented future Internet architecture, which well suits the increasingly mobile and information-intensive applications that dominate today's Internet. NDN relies on in-network caching to facilitate content delivery. This makes it challenging to enforce access control since the content has been cached in the routers and the content producer has lost the control over it. Due to its salient advantages in content delivery, network coding has been introduced into NDN to improve content delivery effectiveness. In this paper, we design ACNC, the first Access Control solution specifically for Network Coding-based NDN. By combining a novel linear AONT (All Or Nothing Transform) and encryption, we can ensure that only the legitimate user who possesses the authorization key can successfully recover the encoding matrix for network coding, and hence can recover the content being transmitted. In addition, our design has two salient merits: 1) the linear AONT well suits the linear nature of network coding; 2) only one vector of the encoding matrix needs to be encrypted/decrypted, which only incurs small computational overhead. Security analysis and experimental evaluation in ndnSIM show that our design can successfully enforce access control on network coding-based NDN with an acceptable overhead.

URLhttps://ieeexplore.ieee.org/document/8254005/
DOI10.1109/GLOCOM.2017.8254005
Citation Keywu_towards_2017