DocumentCode :
136335
Title :
Flexible end-to-end content security in CCN
Author :
Wood, Christopher A. ; Uzun, Ersin
Author_Institution :
Palo Alto Res. Center, Palo Alto, CA, USA
fYear :
2014
fDate :
10-13 Jan. 2014
Firstpage :
858
Lastpage :
865
Abstract :
Content-centric networking (CCN) project, a flavor of information-centric networking (ICN), decouples data from its source by shifting the emphasis from hosts and interfaces to information. As a result, content becomes directly accessible and routable within the network. In this data-centric paradigm, techniques for maintaining content confidentiality and privacy typically rely on cryptographic techniques similar to those used in modern digital rights management (DRM) applications, which often require multiple consumer-to-producer (end-to-end) messages to be transmitted to establish identities, acquire licenses, and access encrypted content. In this paper, we present a secure content distribution architecture for CCN that is based on proxy re-encryption. Our design provides strong end-to-end content security and reduces the number of protocol messages required for user authentication and key retrieval. Unlike widely-deployed solutions, our solution is also capable of utilizing the opportunistic in-network caches in CCN. We also experimentally compare two proxy re-encryption schemes that can be used to implement the architecture, and describe the proof of concept application we developed over CCNx.
Keywords :
computer network security; cryptographic protocols; data privacy; digital rights management; information retrieval; internetworking; CCN; DRM applications; ICN; consumer-to-producer end-to-end messages; content confidentiality maintenance; content privacy maintenance; content-centric networking; cryptographic techniques; data decoupling; data source; data-centric paradigm; digital rights management applications; end-to-end content security; flexible end-to-end content security; information hosts; information interfaces; information-centric networking; key retrieval; opportunistic in-network caches; protocol messages; proxy re-encryption; secure content distribution architecture; user authentication; Cloud computing; Computer architecture; Encryption; Identity-based encryption;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4799-2356-4
Type :
conf
DOI :
10.1109/CCNC.2014.6940528
Filename :
6940528
Link To Document :
بازگشت