• DocumentCode
    136335
  • Title

    Flexible end-to-end content security in CCN

  • Author

    Wood, Christopher A. ; Uzun, Ersin

  • Author_Institution
    Palo Alto Res. Center, Palo Alto, CA, USA
  • fYear
    2014
  • fDate
    10-13 Jan. 2014
  • Firstpage
    858
  • Lastpage
    865
  • Abstract
    Content-centric networking (CCN) project, a flavor of information-centric networking (ICN), decouples data from its source by shifting the emphasis from hosts and interfaces to information. As a result, content becomes directly accessible and routable within the network. In this data-centric paradigm, techniques for maintaining content confidentiality and privacy typically rely on cryptographic techniques similar to those used in modern digital rights management (DRM) applications, which often require multiple consumer-to-producer (end-to-end) messages to be transmitted to establish identities, acquire licenses, and access encrypted content. In this paper, we present a secure content distribution architecture for CCN that is based on proxy re-encryption. Our design provides strong end-to-end content security and reduces the number of protocol messages required for user authentication and key retrieval. Unlike widely-deployed solutions, our solution is also capable of utilizing the opportunistic in-network caches in CCN. We also experimentally compare two proxy re-encryption schemes that can be used to implement the architecture, and describe the proof of concept application we developed over CCNx.
  • Keywords
    computer network security; cryptographic protocols; data privacy; digital rights management; information retrieval; internetworking; CCN; DRM applications; ICN; consumer-to-producer end-to-end messages; content confidentiality maintenance; content privacy maintenance; content-centric networking; cryptographic techniques; data decoupling; data source; data-centric paradigm; digital rights management applications; end-to-end content security; flexible end-to-end content security; information hosts; information interfaces; information-centric networking; key retrieval; opportunistic in-network caches; protocol messages; proxy re-encryption; secure content distribution architecture; user authentication; Cloud computing; Computer architecture; Encryption; Identity-based encryption;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th
  • Conference_Location
    Las Vegas, NV
  • Print_ISBN
    978-1-4799-2356-4
  • Type

    conf

  • DOI
    10.1109/CCNC.2014.6940528
  • Filename
    6940528