Proxy Re-Encryption in Access Control Framework of Information-Centric Networks

As a novel network architecture, information-centric networking (ICN) has a good performance in facilitating content sharing among users. Although in-network cache used in ICN can effectively solve the problem of network congestion. Meanwhile, it also brings a lot of challenges such as security and...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 7; pp. 48417 - 48429
Main Authors Wang, Qiang, Li, Wenchao, Qin, Zhiguang
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:As a novel network architecture, information-centric networking (ICN) has a good performance in facilitating content sharing among users. Although in-network cache used in ICN can effectively solve the problem of network congestion. Meanwhile, it also brings a lot of challenges such as security and privacy issues during data transformation. Some of the current solutions are based on the traditional encryption technology, but these solutions introduce significant overhead in the client side and have a high requirement to the memory and computing power of end user. In this paper, we use an efficient proxy re-encryption (PRE) scheme in ICN framework to help reduce the overhead on the user-side while guaranteeing flexible data sharing between subscribers and even their cooperator. Our proposal has the additional benefits of a non-interactivity and collusion resistance. We also prove that our scheme is secure against adaptive replayable adaptive chosen ciphertext attack (RCCA) in re-encryption and chosen ciphertext attack (CCA) secure in complete ICN encryption. Our analysis of this program also shows that the scheme has a relatively good performance in computation cost and communication complexity aspects.
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2019.2908009