SBAC: A secure blockchain-based access control framework for information-centric networking

被引:54
作者
Lyu, Qiuyun [1 ,3 ]
Qi, Yizhen [2 ]
Zhang, Xiaochen [1 ]
Liu, Huaping [4 ]
Wang, Qiuhua [1 ]
Zheng, Ning [1 ,3 ]
机构
[1] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou, Zhejiang, Peoples R China
[2] Hangzhou Dianzi Univ, Sch Commun Engn, Hangzhou, Zhejiang, Peoples R China
[3] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou, Zhejiang, Peoples R China
[4] Oregon State Univ, Sch Elect Engn & Comp Sci, Corvallis, OR 97331 USA
基金
中国国家自然科学基金;
关键词
Access control; Information-centric networking; Blockchain; Access audit; Security; PRIVACY; AUTHENTICATION; INTERNET; SCHEME;
D O I
10.1016/j.jnca.2019.102444
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The information-centric networking (ICN) has been proposed to meet the increasing demand for efficient content delivery. However, the in-network caching mechanism of ICN makes it hard to provide data security and privacy for content providers (CPs). Although many access control schemes are proposed to improve the security of ICN, there are still some problems unsolved. On the one hand, in spite of the centralized access control schemes are proposed to improve the security of data sharing, the single point of failure issue is inevitable. On the other hand, the decentralized access control schemes allow the content provider to control the key distribution for encrypted content, but it is inefficient when they are applied in hierarchical access, and the audit of content access is ignored. In this paper, we propose a secure blockchain-based access control framework which is called as SBAC, to provide a content provider with the ability of sharing, audit and revocation on his content in a secure way. Specifically, we design a matching-based access control model to achieve hierarchical access, and present a blockchain-based access token mechanism to resist the single point of failure and balance privacy and audit. And Cuckoo filter is introduced to achieve efficient query of access token in verification. Furthermore, our SBAC keeps the characteristic of pervasive caching of ICN. The security analysis and experimental results demonstrate that SBAC is suitable in practice.
引用
收藏
页数:17
相关论文
共 45 条
[1]  
AbdAllah E.G., IEEE S COMMUNICATION, DOI [DOI 10.1109/ICC.2016.7511198, 10.1109/ICC.2016.7511198.]
[2]   Privacy-Aware Caching in Information-Centric Networking [J].
Acs, Gergely ;
Conti, Mauro ;
Gasti, Paolo ;
Ghali, Cesar ;
Tsudik, Gene ;
Wood, Christopher A. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (02) :313-328
[3]   A Survey of Information-Centric Networking [J].
Ahlgren, Bengt ;
Dannewitz, Christian ;
Imbrenda, Claudio ;
Kutscher, Dirk ;
Ohlman, Boerje .
IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (07) :26-36
[4]  
Aiash M, 2015, 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, P377
[5]  
Anand A., 2009, P 11 INT JOINT C MEA, P3748, DOI DOI 10.1145/1555349.1555355
[6]  
[Anonymous], IEEE INTERNET THINGS
[7]  
[Anonymous], ETH GAS STAT TX CALC
[8]   M2M-REP: Reputation system for machines in the internet of things [J].
Azad, Muhammad Ajmal ;
Bag, Samiran ;
Hao, Feng ;
Salah, Khaled .
COMPUTERS & SECURITY, 2018, 79 :1-16
[9]   privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams [J].
Azad, Muhammad Ajmal ;
Bag, Samiran ;
Tabassum, Shazia ;
Hao, Feng .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) :313-327
[10]   PrivBox: Verifiable decentralized reputation system for online marketplaces [J].
Azad, Muhammad Ajmal ;
Bag, Samiran ;
Hao, Feng .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 :44-57