NAC: Automating Access Control via Named Data

02/26/2019
by   Zhiyi Zhang, et al.
0

In this paper we present the design of Name-based Access Control (NAC) scheme, which supports data confidentiality and access control in Named Data Networking (NDN) architecture by encrypting content at the time of production, and by automating the distribution of encryption and decryption keys. NAC achieves the above design goals by leveraging specially crafted NDN naming conventions to define and enforce access control policies, and to automate the cryptographic key management. The paper also explains how NDN's hierarchically structured namespace allows NAC to support fine-grained access control policies, and how NDN's Interest-Data exchange can help NAC to function in case of intermittent connectivity. Moreover, we show that NAC design can be further extended to support Attribute-based Encryption (ABE), which supports access control with additional levels of flexibility and scalability.

READ FULL TEXT
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 3

page 4

02/21/2021

Content Confidentiality in Named Data Networking

In this paper we present the design of name based access control scheme ...
06/11/2021

A survey on Functional Encryption

Functional Encryption (FE) expands traditional public-key encryption in ...
03/02/2019

Agile Network Access Control in the Container Age

Linux Containers, such as those managed by Docker, are an increasingly p...
03/01/2022

Privacy-Friendly Flexible IoT Health Data Processing with User-Centric Access Control

This paper proposes a novel Single and Multiple user(s) data Aggregation...
04/10/2022

AABAC – Automated Attribute Based Access Control for Genomics Data

The COVID-19 crisis has demonstrated the potential of cutting-edge genom...
05/15/2018

Towards Integrated Modelling of Dynamic Access Control with UML and Event-B

Role-Based Access Control (RBAC) is a popular authorization model used t...
09/24/2019

A Rule-Based Relational XML Access Control Model in the Presence of Authorization Conflicts

There is considerable amount of sensitive XML data stored in relational ...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.