skip to main content
10.1145/2491224.2491237acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
poster
Free access

Toward content-centric privacy in ICN: attribute-based encryption and routing

Published: 12 August 2013 Publication History

Abstract

We design a content-centric privacy scheme for Information-Centric Networking (ICN). We enhance ICN's ability to support data confidentiality by introducing attribute-based encryption into ICN and making it specific to the data attributes. Our approach is unusual in that it preserves ICN's goal to decouple publishers and subscribers for greater data accessibility, scalable multiparty communication and efficient data distribution. Inspired by application-layer publish-subscribe, we enable fine-grained access control with more expressive policies. Moreover, we propose an attribute-based routing scheme that offers interest confidentiality. A prototype system is implemented based on CCNx, a popular open source version of ICN, to showcase privacy preservation in Smart Neighborhood and Smart City applications.

References

[1]
B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman. A Survey of Information-Centric Networking. IEEE Communications Magazine 50(7):26--36, July 2012.
[2]
Palo Alto Research Center (PARC). Content Centric Networking (CCNx). https://www.ccnx.org/.
[3]
J. Zhang, Q. Li, and E. M. Schooler. iHEMS: An Information-Centric Approach to Secure Home Energy Management. In 3rd IEEE Conf. SmartGridComm, Nov 2012.
[4]
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In The 13th ACM Conf. CCS, Oct 2006.
[5]
J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, pp. 321--334, 2007.
[6]
C. Dong, G. Russello, and N. Dulay. Shared and Searchable Encrypted Data for Untrusted Servers. Journal Computer Security, 19(3):367--397, 2011.
[7]
M. Ion, G. Russello, and B. Crispo. Design and Implementation of a Confidentiliaty and Access Control Solution for Publish/Subscribe Systems. Computer Network, 56(7):2014--2037, May 2012.

Cited By

View all
  • (2024)Hybrid Cryptosystem using Lattice Permutation and Chaos Logistic Mapping for Image SecurityInternational Journal of Engineering and Advanced Technology10.35940/ijeat.D4441.1304042413:4(34-38)Online publication date: 30-Apr-2024
  • (2024)Exploring the design space of privacy-enhanced content discovery for bitswapComputer Communications10.1016/j.comcom.2024.01.029217(12-24)Online publication date: Mar-2024
  • (2023)Privacy-Enhanced Content Discovery for Bitswap2023 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking57963.2023.10186387(1-9)Online publication date: 12-Jun-2023
  • Show More Cited By

Index Terms

  1. Toward content-centric privacy in ICN: attribute-based encryption and routing

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICN '13: Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking
    August 2013
    88 pages
    ISBN:9781450321792
    DOI:10.1145/2491224
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 August 2013

    Check for updates

    Author Tags

    1. attribute-based encryption
    2. icn
    3. privacy
    4. security

    Qualifiers

    • Poster

    Conference

    SIGCOMM'13
    Sponsor:
    SIGCOMM'13: ACM SIGCOMM 2013 Conference
    August 12, 2013
    Hong Kong, China

    Acceptance Rates

    ICN '13 Paper Acceptance Rate 20 of 57 submissions, 35%;
    Overall Acceptance Rate 133 of 482 submissions, 28%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)124
    • Downloads (Last 6 weeks)19
    Reflects downloads up to 22 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Hybrid Cryptosystem using Lattice Permutation and Chaos Logistic Mapping for Image SecurityInternational Journal of Engineering and Advanced Technology10.35940/ijeat.D4441.1304042413:4(34-38)Online publication date: 30-Apr-2024
    • (2024)Exploring the design space of privacy-enhanced content discovery for bitswapComputer Communications10.1016/j.comcom.2024.01.029217(12-24)Online publication date: Mar-2024
    • (2023)Privacy-Enhanced Content Discovery for Bitswap2023 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking57963.2023.10186387(1-9)Online publication date: 12-Jun-2023
    • (2023)An Effective Access Control Scheme for ICN Based Vehicle Exhaust Monitor System2023 42nd Chinese Control Conference (CCC)10.23919/CCC58697.2023.10240814(6187-6192)Online publication date: 24-Jul-2023
    • (2023)SAFE: Secure and Flexible Encryption for Dynamic Team Communications in Disaster Management2023 IEEE 31st International Conference on Network Protocols (ICNP)10.1109/ICNP59255.2023.10355587(1-12)Online publication date: 10-Oct-2023
    • (2022)Research on Collaborative Machine English Translation Using the HIC TechnologyInternational Journal of Information System Modeling and Design10.4018/IJISMD.30077613:3(1-15)Online publication date: 5-Aug-2022
    • (2022)A Review of Functional Encryption in IoT ApplicationsSensors10.3390/s2219756722:19(7567)Online publication date: 6-Oct-2022
    • (2022)Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart HomeElectronics10.3390/electronics1107108311:7(1083)Online publication date: 30-Mar-2022
    • (2022)FABEOProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560699(2491-2504)Online publication date: 7-Nov-2022
    • (2022)Integration of ICN and MEC in 5G and Beyond Networks: Mutual Benefits, Use Cases, Challenges, Standardization, and Future ResearchIEEE Open Journal of the Communications Society10.1109/OJCOMS.2022.31951253(1382-1412)Online publication date: 2022
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media