An End-To-End Encrypted Cache System with Time-Dependent Access Control

02/22/2023
by   Keita Emura, et al.
0

Due to the increasing use of encrypted communication, such as Transport Layer Security (TLS), encrypted cache systems are a promising approach for providing communication efficiency and privacy. Cache-22 is an encrypted cache system (Emura et al. ISITA 2020) that makes it possible to significantly reduce communication between a cache server and a service provider. In the final procedure of Cache-22, the service provider sends the corresponding decryption key to the user via TLS and this procedure allows the service provider to control which users can access the contents. For example, if a user has downloaded ciphertexts of several episodes of a show, the service provider can decide to provide some of the contents (e.g., the first episode) available for free while requiring a fee for the remaining contents. However, no concrete access control method has been implemented in the original Cache-22 system. In this paper, we add a scalable access control protocol to Cache-22. Specifically, we propose a time-dependent access control that requires a communication cost of O(log T_ max) where T_ max is the maximum time period. Although the protocol is stateful, we can provide time-dependent access control with scalability at the expense of this key management. We present experimental results and demonstrate that the modified system is effective for controlling access rights. We also observe a relationship between cache capacity and network traffic because the number of duplicated contents is higher than that in the original Cache-22 system, due to time-dependent access control.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/26/2019

Secure Distribution of Protected Content in Information-Centric Networking

The benefits of the ubiquitous caching in ICN are profound, such feature...
research
01/29/2020

Cache Allocations for Consecutive Requests of Categorized Contents: Service Provider's Perspective

In wireless caching networks, a user generally has a concrete purpose of...
research
02/01/2022

Access Control of Object Detection Models Using Encrypted Feature Maps

In this paper, we propose an access control method for object detection ...
research
07/19/2017

LRU Cache under Stationary Requests

In this paper we focus on the LRU cache where requests for distinct cont...
research
12/09/2017

Mobile Edge Caching: An Optimal Auction Approach

With the explosive growth of wireless data, the sheer size of the mobile...
research
02/02/2019

Learning-based Dynamic Cache Management in a Cloud

Caches are an important component of modern computing systems given thei...
research
10/11/2018

QUIC and SATCOM

We analyze QUIC transport protocol behavior over a satellite communicati...

Please sign up or login with your details

Forgot password? Click here to reset