IPRES: In-device Proxy Re-Encryption Service for Secure ICN

被引:2
|
作者
Suksomboon, Kalika [1 ]
Tagami, Atsushi [1 ]
Basu, Anirban [1 ]
Kurihara, Jun [2 ]
机构
[1] KDDI Res Inc, Fujimino, Saitama, Japan
[2] KDDI Corp, Tokyo, Japan
关键词
Information Centric Networking; Access Control;
D O I
10.1145/3125719.3132089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A key paradigm of Information Centric Networking (ICN) is that the content-based security, privacy and access control are deployed directly in the network layer. However, there is a gap between security in the network and application layers. This creates a vulnerable space for cyber attacks from inside a device. To address this problem, we discuss and present a guideline on ICN access control. Since a semi-trusted proxy has been seen as an advantageous solution for access control and efficiency in content sharing services, we introduce the proxy in a consumer's device and propose an in-device proxy re-encryption service (IPRES) architecture for efficiency in both access control management and resource usage.
引用
收藏
页码:176 / 177
页数:2
相关论文
共 50 条
  • [1] In-Device Proxy Re-encryption Service for Information-Centric Networking Access Control
    Suksomboon, Kalika
    Tagami, Atsushi
    Basu, Anirban
    Kurihara, Jun
    PROCEEDINGS OF THE 2018 IEEE 43RD CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2018, : 303 - 306
  • [2] Efficient and Secure Certificateless Proxy Re-Encryption
    Liu, Ya
    Wang, Hongbing
    Wang, Chunlu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2254 - 2275
  • [3] Accountable Proxy Re-Encryption for Secure Data Sharing
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    Lan, Xiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 145 - 159
  • [4] Secure Proxy Re-Encryption from CBE to IBE
    CHEN Yan
    Wuhan University Journal of Natural Sciences, 2008, (06) : 657 - 661
  • [5] Secure Certificateless Proxy Re-encryption Without Pairing
    Kuchta, Veronika
    Sharma, Gaurav
    Sahu, Rajeev Anand
    Bhatia, Tarunpreet
    Markowitch, Olivier
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 85 - 101
  • [6] Towards a Secure Certificateless Proxy Re-Encryption Scheme
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    Chen, Cheng
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 330 - 346
  • [7] Chosen-Ciphertext Secure Proxy Re-Encryption
    Canetti, Ran
    Hohenberger, Susan
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 185 - 194
  • [8] Proxy Re-encryption with Unforgeable Re-encryption Keys
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 20 - 33
  • [9] PRE+: dual of proxy re-encryption for secure cloud data sharing service
    Wang, Xu An
    Xhafa, Fatos
    Ma, Jianfeng
    Barolli, Leonard
    Ge, Yunlong
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 44 - 69
  • [10] IoT device security based on proxy re-encryption
    Kim, SuHyun
    Lee, ImYeong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1267 - 1273