eduzhai > Applied Sciences > Engineering >

ICN Naming Scheme with Attribute-Based Access Control

  • Save

... pages left unread,continue reading

Document pages: 9 pages

Abstract: ICN (Information Centric Networking) could be a replacement network design that ambitions to beat the vulnerability of present IP based networking design. ICN depends on information, i.e. data, which is exchanged over the network, rather than creating a link between the interacting hosts. ICN content clone may be stored at various locations. Here they have to build security and privacy for the entire system. Here 4 important roles are concentrated. The first role is the Data Owner. Here, the data owner should be properly authenticated for the upload of the file. The Second role is Attribute Authority. Here the Attribute Authority will receive both Data owner and Data Consumer request. Data Owner is used to OTP Authentication. That OTP is passed through the Email. Using that OTP to access our ICN server. OTP is used for full secure access to upload our file in ICN server. OTP is a one-time password to access our ICN server. It will be very secure to access our file in the ICN server. The Third role is Data Consumer. Data Consumers will enter the request for attribute key will send to attribute authority. Using the attribute key, the consumer has the privilege to send a request for file key. The final role is ICN server. It is used for storage purpose. This maintains a File Upload and Download history which is encrypted data from data owners and the data consumer. They create a multi-authority CP-ABE structure which features: 1) A scheme may not require a completely authorized central authority, and all attribute authorities may give secret keys to users on an individual basis; 2) Every attribute authority may automatically exclude any user by its jurisdiction so those withdrawn users will not access to the outsourced information afterwards.; 3) ICN servers may upgrade encrypted data from the actual timeline onto the next in this manner which revoked users are unable to access previously relevant information, and 4) updates of secret keys and encrypted content are carried out from a public manner. The benefits of our design are demonstrated by contrasting it with related works and by applying it too far to show its practicality. In addition, the suggested method is shown to be safe in the random oracle method.

Please select stars to rate!


0 comments Sign in to leave a comment.

    Data loading, please wait...