KRB-CCN: Lightweight Authentication & Access Control for Private Content-Centric Networks

04/11/2018
by   Ivan O. Nunes, et al.
0

Content-Centric Networking (CCN) is an internetworking paradigm that offers an alternative to today's IP-based Internet Architecture. Instead of focusing on hosts and their locations, CCN emphasizes addressable named content. By decoupling content from its location, CCN allows opportunistic in-network content caching, thus enabling better network utilization, at least for scalable content distribution. However, in order to be considered seriously, CCN must support basic security services, including content authenticity, integrity, confidentiality, authorization and access control. Current approaches rely on content producers to perform authorization and access control. This general approach has several disadvantages. First, consumer privacy vis-a-vis producers is not preserved. Second, identity management and access control impose high computational overhead on producers. Also, unnecessary repeated authentication and access control decisions must be made for each content request. These issues motivate our design of KRB-CCN - a complete authorization and access control system for private CCNs. Inspired by Kerberos in IP-based networks, KRB-CCN involves distinct authentication and authorization authorities. By doing so, KRB-CCN obviates the need for producers to make consumer authentication and access control decisions. KRB-CCN preserves consumer privacy since producers are unaware of consumer identities. Producers are also not required to keep any hard state and only need to perform two symmetric key operations to guarantee that sensitive content is confidentially delivered only to authenticated and authorized consumers. Most importantly, unlike prior designs, KRB-CCN leaves the network (i.e., CCN routers) out of any authorization, access control or confidentiality issues. We describe KRB-CCN design and implementation, analyze its security, and report on its performance.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/01/2018

Effective Caching for the Secure Content Distribution in Information-Centric Networking

The secure distribution of protected content requires consumer authentic...
research
07/26/2019

Secure Distribution of Protected Content in Information-Centric Networking

The benefits of the ubiquitous caching in ICN are profound, such feature...
research
10/26/2018

Content Protection in Named Data Networking: Challenges and Potential Solutions

Information-Centric Networks (ICN) are promising alternatives to current...
research
12/08/2020

Access Control Mechanisms in Named Data Networks: A Comprehensive Survey

Information-Centric Networking (ICN) has recently emerged as a prominent...
research
11/20/2018

Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication

Current authentication methods on the Web have serious weaknesses. First...
research
08/26/2019

Integration of the Captive Portal paradigm with the 802.1X architecture

In a scenario where hotspot wireless networks are increasingly being use...
research
03/11/2019

Transparency and Control in Platforms for Networked Markets

In this work, we analyze the worst case efficiency loss of online platfo...

Please sign up or login with your details

Forgot password? Click here to reset