Mandatory Content Access Control for Privacy Protection in Information Centric Networks

被引:31
作者
Li, Qi [1 ,2 ]
Sandhu, Ravi [2 ]
Zhang, Xinwen [3 ]
Xu, Mingwei [4 ,5 ]
机构
[1] Tsinghua Univ, Grad Sch Shenzhen, Shenzhen 518055, Peoples R China
[2] Univ Texas San Antonio, Inst Cyber Secur, San Antonio, TX 78249 USA
[3] Samsung Res Ctr, Santa Clara, CA USA
[4] Tsinghua Univ, Dept Comp Sci, Beijing 100084, Peoples R China
[5] Tsinghua Natl Lab Informat Sci & Technol, Beijing 100084, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Access control; privacy protection; information centric networks; SYSTEM;
D O I
10.1109/TDSC.2015.2494049
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Several Information Centric Network (ICN) architectures have been proposed as candidates for the future Internet, aiming to solve several salient problems in the current IP-based Internet architecture such as mobility, content dissemination and multi-path forwarding. In general, security and privacy are considered as essential requirements in ICN. However, existing ICN designs lack built-in privacy protection for content providers (CPs), e.g., any router in an Internet Service Provider in ICN can cache any content, which may result in information leakage. In this paper, we propose Mandatory Content Access Control (MCAC), a distributed information flow control mechanism to enable a content provider to control which network nodes can cache its contents. In MCAC, a CP defines different security labels for different contents, and content routers check these labels to decide if a content object should be cached. To ensure correct enforcement of MCAC, we also propose a design of a trusted architecture by extending existing mainstream router architectures. We evaluate the performance of MCAC in the NS-3 simulator. The simulation results show that enforcing MCAC in routers does not introduce significant overhead in content forwarding.
引用
收藏
页码:494 / 506
页数:13
相关论文
共 41 条
[1]  
Aiello W., 2004, ACM Transactions on Information and Systems Security, V7, P242, DOI 10.1145/996943.996946
[2]  
AMD, 2005, Secure virtual machine architecture reference manual
[3]  
[Anonymous], 2014, MAC FILTERING
[4]  
[Anonymous], 2010, CCNX ACCESS CONTROL
[5]  
[Anonymous], 2009, BUILD SEC SYST US TR
[6]  
[Anonymous], 2014, Summary of the HIPAA Privacy Rule
[7]  
[Anonymous], 2014, NS 3 BAS NAM DAT NET
[8]   INVISIOS: A Lightweight, Minimally Intrusive Secure Execution Environment [J].
Arora, Divya ;
Aaraj, Najwa ;
Raghunathan, Anand ;
Jha, Niraj K. .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2012, 11 (03)
[9]  
Bell E. D., 1976, TECH REP
[10]  
Biba K, 1977, TECH REP