Schematized Access Control for Data Cubes and Trees

被引:8
作者
Marxer, Claudio [1 ]
Tschudin, Christian [1 ]
机构
[1] Univ Basel, Basel, Switzerland
来源
PROCEEDINGS OF THE 4TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN 2017) | 2017年
关键词
D O I
10.1145/3125719.3125736
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In classic ICN where delivery of named data cannot be guarded, access control is usually implemented by first encrypting the data and secondly by providing the corresponding data encryption keys (DEKs) to authorized users only: Authorized users will obtain DEKs in encrypted form, wrapped with their public key. This approach has three shortcomings which we address in this paper. (a) Key management is tedious if it has to be done on a per-principle basis, (b) access granularity for single documents should be extended to document collections (e.g. namespace sub-trees) and data cubes (sub-elements within data records), (c) there needs to be support for access right propagation across data aggregation and derivation chains.
引用
收藏
页码:170 / 175
页数:6
相关论文
共 6 条
[1]   Access-Controlled In-Network Processing of Named Data [J].
Marxer, Claudio ;
Scherb, Christopher ;
Tschudin, Christian .
PROCEEDINGS OF THE 2016 3RD ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ACM-ICN '16), 2016, :77-82
[2]  
Sifalakis M, 2014, P 1 ACM C INF CENTR, P137, DOI [10.1145/2660129.2660150, DOI 10.1145/2660129.2660150]
[3]  
Van Jacobson Diana K, P 5 INT C EM NETW EX
[4]  
Yu Y, 2015, P 2 ACM C INFORM CEN, DOI [10.1145/2810156.2810170, DOI 10.1145/2810156.2810170]
[5]  
Yu Yingdi, 2016, TECHNICAL REPORT
[6]  
Zhang L, 2016, NDN0021