Access-controlled in-network processing of named data
Loading...
Author (Corporation)
Publication date
2016
Typ of student thesis
Course of study
Collections
Type
04B - Conference paper
Editors
Editor (Corporation)
Supervisor
Parent work
ACM-ICN '16. Proceedings of the 3rd ACM Conference on Information-Centric Networking
Special issue
DOI of the original publication
Link
Series
Series number
Volume
Issue / Number
Pages / Duration
77-82
Patent number
Publisher / Publishing institution
ACM
Place of publication / Event location
Kyoto
Edition
Version
Programming language
Assignee
Practice partner / Client
Abstract
In content-based security, encrypted content as well as wrapped access keys are made freely available by an Information Centric Network: Only those clients which are able to unwrap the encryption key can access the protected content. In this paper we extend this model to computation chains where derived data (e.g. produced by a Named Function Network) also has to comply to the content-based security approach. A central problem to solve is the synchronized on-demand publishing of encrypted results and wrapped keys as well as defining the set of consumers which are authorized to access the derived data. In this paper we introduce "content-attendant policies" and report on a running prototype that demonstrates how to enforce data owner-defined access control policies despite fully decentralized and arbitrarily long computation chains.
Keywords
Event
CN'16. 3rd International Conference on Information-Centric Networking
Exhibition start date
Exhibition end date
Conference start date
26.09.2016
Conference end date
28.09.2016
Date of the last check
ISBN
978-1-4503-4467-8
ISSN
Language
Italian
Created during FHNW affiliation
No
Strategic action fields FHNW
Publication status
Published
Review
Peer review of the complete publication
Open access category
Hybrid
Citation
Marxer, C., Scherb, C., & Tschudin, C. (2016). Access-controlled in-network processing of named data. ACM-ICN ’16. Proceedings of the 3rd ACM Conference on Information-Centric Networking, 77–82. https://doi.org/10.1145/2984356.2984366