Secure Distribution of Protected Content in Information-Centric Networking
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bilal, Muhammad | - |
dc.contributor.author | Pack, Sangheon | - |
dc.date.accessioned | 2021-08-30T22:28:10Z | - |
dc.date.available | 2021-08-30T22:28:10Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2020-06 | - |
dc.identifier.issn | 1932-8184 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/55564 | - |
dc.description.abstract | The benefits of the ubiquitous caching in information centric networking (ICN) are profound; even though such features make ICN promising for content distribution, but it also introduces a challenge to content protection against the unauthorized access. The protection of a content against unauthorized access requires consumer authentication and involves the conventional end-to-end encryption. However, in ICN, such end-to-end encryption makes the content caching ineffective since encrypted contents stored in a cache are useless for any consumers except those who know the encryption key. For effective caching of encrypted contents in ICN, we propose a secure distribution of protected content (SDPC) scheme, which ensures that only authenticated consumers can access the content. SDPC is lightweight and allows consumers to verify the originality of the published content by using a symmetric key encryption. SDPC also provides protection against privacy leakage. The security of SDPC was proved with the Burrows-Abadi-Needham (BAN) logic and Scyther tool verification, and simulation results show that SDPC can reduce the content download delay. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Secure Distribution of Protected Content in Information-Centric Networking | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Pack, Sangheon | - |
dc.identifier.doi | 10.1109/JSYST.2019.2931813 | - |
dc.identifier.scopusid | 2-s2.0-85074825504 | - |
dc.identifier.wosid | 000543049900036 | - |
dc.identifier.bibliographicCitation | IEEE SYSTEMS JOURNAL, v.14, no.2, pp.1921 - 1932 | - |
dc.relation.isPartOf | IEEE SYSTEMS JOURNAL | - |
dc.citation.title | IEEE SYSTEMS JOURNAL | - |
dc.citation.volume | 14 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 1921 | - |
dc.citation.endPage | 1932 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Operations Research & Management Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Operations Research & Management Science | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Internet | - |
dc.subject.keywordAuthor | Encryption | - |
dc.subject.keywordAuthor | Computer architecture | - |
dc.subject.keywordAuthor | Protocols | - |
dc.subject.keywordAuthor | Access control | - |
dc.subject.keywordAuthor | Access control | - |
dc.subject.keywordAuthor | authentication | - |
dc.subject.keywordAuthor | content distribution | - |
dc.subject.keywordAuthor | 5G | - |
dc.subject.keywordAuthor | information-centric networking | - |
dc.subject.keywordAuthor | in-network caching | - |
dc.subject.keywordAuthor | named data networking | - |
dc.subject.keywordAuthor | privacy | - |
dc.subject.keywordAuthor | security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.