skip to main content
10.1145/2818000.2818001acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article
Free access

Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks

Published: 07 December 2015 Publication History

Abstract

As information-centric networks are deployed in increasingly diverse settings, there is a growing need to protect the privacy of participants. We describe the design, implementation, and evaluation of a security framework that achieves this. It ensures the integrity and confidentiality of published content, the associated descriptive metadata, and the interests of subscribers.
Publishers can scope access to the content, as well as which nodes in the network can broker access to it. Subscribers can limit which nodes can see their interests. Scopes are defined as policies over attributes of the individual nodes. The system transparently realizes the policies with suitable cryptographic primitives. It supports deployment in heterogeneous mobile ad hoc environments where trust may derive from multiple independent sources. Further, no external public key infrastructure is assumed. We also report on the overhead that the security adds in actual deployments on Android devices.

References

[1]
Bengt Ahlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher, and Borje Ohlman, A survey of information-centric networking, IEEE Communications Magazine, Vol. 50(7), 2012.
[2]
Jeff Ahrenholz, Comparison of CORE Network Emulation Platforms, 29th IEEE Military Communications Conference, 2010.
[3]
Apple AirDrop, https://www.apple.com/ios/features/#airdrop
[4]
Somaya Arianfar, Teemu Koponen, Barath Raghavan, and Scott Shenker, On preserving privacy in content-oriented networks, ACM SIGCOMM Workshop on Information-Centric Networking, 2011.
[5]
Android Beam, http://developer.android.com/guide/topics/connectivity/nfc/
[6]
Mihir Bellare, Ran Canetti, and Hugo Krawczyk, Keying hash functions for message authentication, 16th Annual International Cryptology Conference on Advances in Cryptology, 1996.
[7]
John Bethencourt, Amit Sahai, and Brent Waters, Ciphertext-policy attribute-based encryption, 28th IEEE Symposium on Security and Privacy, 2006.
[8]
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano, Public key encryption with keyword search, 23rd International Conference on the Theory and Applications of Cryptographic Techniques, Springer, 2004.
[9]
Dan Boneh, Amit Sahai, and Brent Waters, Functional encryption: Definitions and challenges, 8th Theory of Cryptography Conference, Springer, 2011.
[10]
DARPA CBMEN, http://www.darpa.mil/NewsEvents/Releases/2013/08/21.aspx
[11]
PARC CCN, https://www.parc.com/services/focus-area/content-centric-networking/
[12]
David Cheriton and Mark Gritter, TRIAD: A new next-generation Internet architecture, 2000.
[13]
Reza Curtmola, Juan Garay, Seny Kamara, and Rafail Ostrovsky, Searchable symmetric encryption: Improved definitions and efficient constructions, 13th ACM Conference on Computer and Communications Security, 2006.
[14]
Seyed Kaveh Fayazbakhsh, Yin Lin, Amin Tootoonchian, Ali Ghodsi, Teemu Koponen, Bruce Maggs, K.C. Ng, Vyas Sekar, and Scott Shenker, Less pain, most of the gain: incrementally deployable ICN, ACM SIGCOMM Conference, 2013.
[15]
Nikos Fotiou, Giannis Marias, and George Polyzos, Access control enforcement delegation for information-centric networking architectures, 2nd ACM Workshop on Information-Centric Networking, 2012.
[16]
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters, Candidate indistinguishability obfuscation and functional encryption for all circuits, 54th IEEE Symposium on Foundations of Computer Science, 2013.
[17]
Ali Ghodsi, Teemu Koponen, Jarno Rajahalme, Pasi Sarolahti, and Scott Shenker, Naming in content-oriented architectures, 1st ACM Workshop on Information-Centric Networking, 2011.
[18]
Allison Lewko and Brent Waters, Decentralizing attribute-based encryption, 30th International Conference on the Theory and Applications of Cryptographic Techniques, Springer, 2011.
[19]
Van Jacobson, Diana Smetters, James Thornton, Michael Plass, Nicholas Briggs, and Rebecca Braynard, Networking named content, 5th International Conference on Emerging Networking Experiments and Technologies, 2009.
[20]
John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, and Ben Zhao, OceanStore: An architecture for global-scale persistent storage, 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000.
[21]
Erik Nordstrom, Christian Rohner, and Per Gunningberg, Haggle: Opportunistic mobile content sharing using search, Computer Communications, Vol. 48, Elsevier, 2014.
[22]
Ronald Rivest, Adi Shamir, Leonard Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21(2), 1978.
[23]
Amit Sahai and Brent Waters, Fuzzy identity-based encryption, 24th International Conference on the Theory and Applications of Cryptographic Techniques, 2005.
[24]
Transport Layer Security, http://tools.ietf.org/html/rfc5246
[25]
Samuel Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, Mario Gerla, Hamid Sadjadpour, and J.J. Garcia-Luna-Aceves, ICEMAN: A system for efficient, robust and secure situational awareness at the network edge, 32nd IEEE Military Communications Conference, 2013.
[26]
Samuel Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, Mario Gerla, Hamid Sadjadpour, and J.J. Garcia-Luna-Aceves, ICEMAN: A practical architecture for situational awareness at the network edge, Logic, Rewriting, and Concurrency, Lecture Notes in Computer Science, Vol. 9200, Springer, 2015.
[27]
George Xylomenos, Christopher Ververidis, Vasilios Siris, Nikos Fotiou, Christos Tsilopoulos, Xenofon Vasilakos, Konstantinos Katsaros, and George Polyzos, A survey of information-centric networking research, IEEE Communications Surveys and Tutorials, Vol. 16(2), 2014.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACSAC '15: Proceedings of the 31st Annual Computer Security Applications Conference
December 2015
489 pages
ISBN:9781450336826
DOI:10.1145/2818000
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

In-Cooperation

  • ACSA: Applied Computing Security Assoc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 December 2015

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

ACSAC 2015

Acceptance Rates

Overall Acceptance Rate 104 of 497 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)59
  • Downloads (Last 6 weeks)2
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media