命名數(shù)據(jù)網(wǎng)絡(luò)中可追溯且輕量級(jí)的細(xì)粒度訪問(wèn)控制機(jī)制
doi: 10.11999/JEIT181160
-
1.
重慶郵電大學(xué)通信與信息工程學(xué)院 ??重慶 ??400065
-
2.
重慶郵電大學(xué)電子信息與網(wǎng)絡(luò)工程研究院 ??重慶 ??400065
Traceable Lightweight and Fine-grained Access Control in Named Data Networking
-
1.
School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
-
2.
Electronic Information and Networking Research Institute, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
-
摘要: 由于命名數(shù)據(jù)網(wǎng)絡(luò)(NDN)具有網(wǎng)內(nèi)緩存特點(diǎn),任意用戶(hù)可直接從中間路由節(jié)點(diǎn)獲取數(shù)據(jù),同時(shí),內(nèi)容提供商也無(wú)法得知用戶(hù)的訪問(wèn)信息。針對(duì)這些問(wèn)題,該文結(jié)合基于身份的組合公鑰和Schnorr簽名方法,提出了“三次握手”匿名安全認(rèn)證協(xié)議,同時(shí),采用改進(jìn)的秘密共享方法來(lái)高效分發(fā)內(nèi)容密鑰,實(shí)現(xiàn)了一種可追溯且輕量級(jí)的細(xì)粒度訪問(wèn)控制機(jī)制(TLAC),最后,通過(guò)實(shí)驗(yàn)驗(yàn)證了TLAC機(jī)制的高效性。
-
關(guān)鍵詞:
- 命名數(shù)據(jù)網(wǎng)絡(luò) /
- 內(nèi)容緩存 /
- 訪問(wèn)控制 /
- 可追溯性
Abstract: Due to the feature of in-network caching in Named Data Networking (NDN), any consumer might fetch the cached contents from NDN routers, but the content producers have no idea about details of certain contents being accessed. Considering these problems, a fine-grained Traceable and Lightweight Access Control (TLAC) scheme is presented. In the TLAC scheme, an anonymous and secure " three-way handshake” authentication protocol is presented by collaboratively leveraging the combined public key and the Schnorr signature, and an improved secret sharing method is used to distribute the key efficiently. Finally, the experimental results prove the efficiency of TLAC scheme.-
Key words:
- Named Data Networking (NDN) /
- Content caching /
- Access control /
- Traceability
-
表 1 認(rèn)證時(shí)的計(jì)算開(kāi)銷(xiāo)對(duì)比
對(duì)比項(xiàng)目 TLAC機(jī)制 SEAF機(jī)制 U(無(wú)預(yù)計(jì)算) $5{m_0}{\rm{ + 5}}h$ $3p{\rm{ + }}3e{\rm{ + 9}}{m_0}{\rm{ + }}h$ U(預(yù)計(jì)算后) $3{m_0}{\rm{ + 4}}h$ h R(無(wú)預(yù)計(jì)算) $5{m_0}{\rm{ + 4}}h$ $5p{\rm{ + }}4e{\rm{ + 8}}{m_0}{\rm{ + }}h$ R(預(yù)計(jì)算后) $4{m_0}{\rm{ + 4}}h$ / 下載: 導(dǎo)出CSV
表 2 預(yù)計(jì)算后的時(shí)間開(kāi)銷(xiāo)對(duì)比(ms)
對(duì)比項(xiàng)目 TLAC機(jī)制 SEAF機(jī)制 U 5.15 0.05 R 6.67 13.75 下載: 導(dǎo)出CSV
-
CISCO. Cisco visual networking index: Forecast and methodology, 2016–2021 white paper[EB/OL]. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/global-cloud-index-gci/white-paper-c11-738085.html, 2018. GASTI P and TSUDIK G. Content-centric and named-data networking security: The good, the bad and the rest[C]. 2018 IEEE International Symposium on Local and Metropolitan Area Networks, Washington, USA, 2018: 1–6. TOURANI R, MISRA S, MICK T, et al. Security, privacy, and access control in information-centric networking: A survey[J]. IEEE Communications Surveys & Tutorials, 2018, 20(1): 566–600. doi: 10.1109/COMST.2017.2749508 MISRA S, TOURANI R, and MAJD N E. Secure content delivery in information-centric networks: Design, implementation, and analyses[C]. The 3rd ACM SIGCOMM Workshop on Information-centric Networking, Hong Kong, China, 2013: 73–78. MISRA S, TOURANI R, NATIVIDAD F, et al. AccConF: An access control framework for leveraging in-network cached data in the ICN-enabled wireless edge[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 16(1): 5–17. doi: 10.1109/TDSC.2017.2672991 CHEN Tao, LEI Kai, and XU Kuai. An encryption and probability based access control model for named data networking[C]. The 33rd IEEE International Performance Computing and Communications Conference, Austin, USA, 2014: 1–8. ZHENG Qingji, WANG Guoqiang, RAVINDRAN R, et al. Achieving secure and scalable data access control in information-centric networking[C]. 2015 IEEE International Conference on Communications, London, UK, 2015: 5367–5373. XUE Kaiping, ZHANG Xiang, XIA Qiudong, et al. SEAF: A secure, efficient and accountable access control framework for information centric networking[C]. The IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, Honolulu, USA, 2018: 2213–2221. CHEN Liqun, CHENG Z, and SMART N P. Identity-based key agreement protocols from pairings[J]. International Journal of Information Security, 2007, 6(4): 213–241. doi: 10.1007/s10207-006-0011-9 南湘浩. 組合公鑰(CPK)體制標(biāo)準(zhǔn)(V5.0)[J]. 計(jì)算機(jī)安全, 2010(10): 1–2, 5. doi: 10.3969/j.issn.1671-0428.2010.10.001NAN Xianghao. Combined public key(CPK)cryptosystem standard(V5.0)[J]. Computer Security, 2010(10): 1–2, 5. doi: 10.3969/j.issn.1671-0428.2010.10.001 SCHNORR C P. Efficient signature generation by smart cards[J]. Journal of Cryptology, 1991, 4(3): 161–174. doi: 10.1007/bf00196725 NAOR M and YUNG M. Universal one-way hash functions and their cryptographic applications[C]. The 21st Annual ACM Symposium on Theory of Computing, Seattle, USA, 1989: 33–43. SHAMIR A. Identity-based cryptosystems and signature schemes[C]. The Workshop on the Theory and Application of Cryptographic Techniques, Berlin, Germany, 1984: 47–53. SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612–613. doi: 10.1145/359168.359176 IMINE Y, LOUNIS A, and BOUABDALLAH A. ABR: A new efficient attribute based revocation on access control system[C]. The 13th International Wireless Communications and Mobile Computing Conference, Valencia, Spain, 2017: 735–740. -