NAC: Automating Access Control via Named Data

02/26/2019
by   Zhiyi Zhang, et al.
0

In this paper we present the design of Name-based Access Control (NAC) scheme, which supports data confidentiality and access control in Named Data Networking (NDN) architecture by encrypting content at the time of production, and by automating the distribution of encryption and decryption keys. NAC achieves the above design goals by leveraging specially crafted NDN naming conventions to define and enforce access control policies, and to automate the cryptographic key management. The paper also explains how NDN's hierarchically structured namespace allows NAC to support fine-grained access control policies, and how NDN's Interest-Data exchange can help NAC to function in case of intermittent connectivity. Moreover, we show that NAC design can be further extended to support Attribute-based Encryption (ABE), which supports access control with additional levels of flexibility and scalability.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/21/2021

Content Confidentiality in Named Data Networking

In this paper we present the design of name based access control scheme ...
research
06/11/2021

A survey on Functional Encryption

Functional Encryption (FE) expands traditional public-key encryption in ...
research
03/02/2019

Agile Network Access Control in the Container Age

Linux Containers, such as those managed by Docker, are an increasingly p...
research
09/21/2019

Graph Model Implementation of Attribute-Based Access Control Policies

Attribute-based access control (ABAC) promises a powerful way of formali...
research
04/10/2022

AABAC – Automated Attribute Based Access Control for Genomics Data

The COVID-19 crisis has demonstrated the potential of cutting-edge genom...
research
05/15/2018

Towards Integrated Modelling of Dynamic Access Control with UML and Event-B

Role-Based Access Control (RBAC) is a popular authorization model used t...
research
10/28/2020

EC-SVC: Secure CAN Bus In-Vehicle Communications with Fine-grained Access Control Based on Edge Computing

In-vehicle communications are not designed for message exchange between ...

Please sign up or login with your details

Forgot password? Click here to reset