Abstract | ||
---|---|---|
A key paradigm of Information Centric Networking (ICN) is that the content-based security, privacy and access control are deployed directly in the network layer. However, there is a gap between security in the network and application layers. This creates a vulnerable space for cyber attacks from inside a device. To address this problem, we discuss and present a guideline on ICN access control. Since a semi-trusted proxy has been seen as an advantageous solution for access control and efficiency in content sharing services, we introduce the proxy in a consumer's device and propose an in-device proxy re-encryption service (IPRES) architecture for efficiency in both access control management and resource usage.
|
Year | DOI | Venue |
---|---|---|
2017 | 10.1145/3125719.3132089 | ICN |
Keywords | Field | DocType |
Information Centric Networking, Access Control | Proxy (climate),Content sharing,Application layer,Architecture,Computer security,Computer science,Network layer,Computer network,Information-centric networking,Access control,Proxy re-encryption | Conference |
ISBN | Citations | PageRank |
978-1-4503-5122-5 | 0 | 0.34 |
References | Authors | |
2 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Kalika Suksomboon | 1 | 26 | 5.55 |
Atsushi Tagami | 2 | 69 | 25.29 |
anirban basu | 3 | 138 | 12.81 |
Jun Kurihara | 4 | 113 | 11.92 |