Time Synchronized Decentralized Contextual Attribute and Doubling Kohel Signature Access Control for Information Centric Networks
Keywords:
Information Centric Network, Time Windows Synchronization, Contextual Attribute Assignment, Doubling-oriented, Doche–Icart–Kohel, Digital SignatureAbstract
The internet applications of present data are immensely compassionate and on the other hand, users are found to be more specific about the desired content speed upon comparison to their location being accessed. In such circumstances the targeted users have to be provided finer if the intrinsic network permits to acquire the content being requested without as a matter of course depending on the existing producer of the data. Obviously, both authenticity and security require to be maintained for such types of data being retrieved. The Information Centric Networking (ICN) is intended to validate data access from anywhere taking into account all the requisite safety measures. The ICN is concentrated on minimizing content delivery latency and improving throughput by validating data from any data store upon comparison with the data producers. For the purpose of doing so, numerous changes in the prevailing Internet architecture like decentralized contextual attribute, unique content naming, access control, digital signature, etc. In this work a method called, Time Synchronized Decentralized Contextual Attribute and Doubling Kohel Signature-based access control (TSDCA-DKS) for Information Centric Networks is proposed. The TSDCA-DKS method is split into two sections, namely, Contextual Attribute Assignment using time windows synchronization and digital signature generation using Doubling-oriented Doche–Icart–Kohel model. The validation of the decrypted contextual input vector attribute guarantees data integrity, where the signer or the employer public key is used to ensure authenticity. The proposed method takes shorter access request processing time for the entire signature operation, including signing and verification, compared to other traditional methods. The implementation results of the proposed method manifested encouraging performance in terms of accuracy and robustness. The results confirmed that the proposed method is significant and efficient for employee’s role within an organization and the resources to which they have access to.
Downloads
References
Kaiping Xue, Jiayu Yang, Graduate, Qiudong Xia, David S. L. Wei, Jian Li, Qibin Sun, Jun Lu, “CSEVP: A Collaborative, Secure, and Efficient Content Validation Protection Framework for Information Centric Networking”, IEEE Transactions on Network and Service Management, Vol. 19, No. 2, June 2022 [A Collaborative, Secure, and Efficient Content Validation Protection (CSEVP)]
Ahmad Salehi, Runchao Han, Carsten Rudolph, Marthie Grobler, “DACP: Enforcing a dynamic access control policy in cross-domain Environments”, Computer Networks, Elsevier, Mar 2023 [Dynamic Access Control Policy (DACP)]
Lalitha Chinmayee M. Hurali and Annapurna P. Patil, “Application Areas of Information-Centric Networking: State-of-the-Art and Challenges”, IEEE Access, Nov 2022
Jiancong Zhang, Shining Li, and Changhao Wang, “A Secure Dynamic Content Delivery Scheme in Named Data Networking”, Security and Communication Networks, Wiley, Jun 2022
Bárbara Vieira, Erik Poll, “A security protocol for Information-Centric Networking in smart grids”, ACM, Nov 2013
Keping Yu, Suyong Eum, Toshihiko Kurita, Qiaozhi Hua, Takuro Sato, Hidenori Nakazato, Tohru Asami, Ved P. Kafle, “Information-Centric Networking: Research and Standardization Status”, IEEE Access, Sep 2019
Xuan Hung Le, Terry Doll, Monica Barbosu, Amneris Luque, Dongwen Wang, “An enhancement of the Role-Based Access Control model to facilitate information access management in context of team collaboration and workflow”, Journal of Biomedical Informatics, Elsevier, Jun 2012
Alex Chiquito, Ulf Bodin, Olov Schelen, “Attribute-Based Approaches for Secure Data Sharing in Industrial Contexts”, IEEE Access, Feb 2023
Nitul Dutta, Sudeep Tanwar, Shobhit K. Patel & Gheorghita Ghinea, “SVM-based Analysis for Predicting Success Rate of Interest Packets in Information Centric Networks”, Applied Artificial Intelligence An International Journal, Oct 2022
Zaki Ullah, Samiullah Khan, “DSAC-Digital Signature for Access Control in Information Centric Network”, Sensors, Oct 2021
Danye Wu, Zhiwei Xu, Bo Chen, Yujun Zhang Zhu Han, “Enforcing Access Control in Information-Centric Edge Networking”, IEEE Transactions on Communications, Jul 2020
Tohru Asami, Byambajav Namsraijav, Kohei Sugiyama, Tomohiko Yagyu, Kenichi Nakamura, Toru Hasegawa, “Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking”, ACM, Oct 2015
Cesar Bernardini, Samuel Marchal, Muhammad Rizwan Asghar, Bruno Crispo, “PrivICN: Privacy-preserving content retrieval in information-centric networking”, Computer Networks, Nov 2018
Bing Li, Maode Ma, “An Advanced Hierarchical
Identity‑Based Security Mechanism by Blockchain in Named Data Networking”, Journal of Network and Systems Management, Springer, Nov 2022
Htet Hlaing, Yuki Funamoto, Masahiro Mambo, “Secure Content Distribution with Access Control Enforcement in Named Data Networking”, Sensors, Jun 2021
José Quevedo, Daniel Corujo, “Selective Content Retrieval in Information-Centric Networking”, Sensors, Oct 2022
Eslam G. AbdAllah Mohammad Zulkernine Hossam S. Hassanein, “Preventing unauthorized access in information centric networking”, Security Privacy, Wiley, Oct 2018
Marica Amadeo, Claudia Campolo, José Quevedo, Daniel Corujo, Antonella Molinaro, Antonio Iera, Rui L. Aguiar, and Athanasios V. Vasilakos, “Information-Centric Networking for the Internet of Things: Challenges and Opportunities”, IEEE Network, Apr 2016
Boubakr Nour and Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, Usa Hassine Moungla, “Access Control Mechanisms in Named Data Networks: A Comprehensive Survey”, ACM Computing Surveys, Vol. 54, No. 3, Article 61. Publication date: April 2021
Liehuang Zhu, Nassoro M.R. Lwamob, Kashif Sharif, Chang Xu, Xiaojiang Du, Mohsen Guizani, Fan Li, “T-CAM: Time-based content access control mechanism For ICN subscription systems”, Future Generation Computer Systems, Elsevier, Jan 2020
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.