Skip to main navigation Skip to search Skip to main content

Data-based access control in named data networking

  • Balkis Hamdane
  • , Mounira Msahli
  • , Ahmed Serhrouchni
  • , Sihem Guemara El Fatmi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Named Data Networking (NDN) presents one of the first and most emergent Information Centric Networking (ICN) project. It offers an excellent substrate to solve today's Internet problems. To ensure security challenge, it adopts a data-centric model. The access control represents a fundamental security aspect. It prevents the data publication under any sensitive namespace and the access to any confidential content. In this paper, we use the generic and conceptual access control scheme called UCONABC to propose an optimum and secured data centric access control model. In our proposal, data is protected by encryption and lock password. Its access is managed by a centralized access list (ACL).

Original languageEnglish
Title of host publicationProceedings of the 9th IEEE International Conference on Collaborative Computing
Subtitle of host publicationNetworking, Applications and Worksharing, COLLABORATECOM 2013
Pages531-536
Number of pages6
DOIs
Publication statusPublished - 1 Dec 2013
Event9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013 - Austin, TX, United States
Duration: 20 Oct 201323 Oct 2013

Publication series

NameProceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013

Conference

Conference9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013
Country/TerritoryUnited States
CityAustin, TX
Period20/10/1323/10/13

Keywords

  • Access control
  • Content Centric Networking
  • Named Data Networking
  • UconABC

Fingerprint

Dive into the research topics of 'Data-based access control in named data networking'. Together they form a unique fingerprint.

Cite this