JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Trend and Improvement for Privacy Protection of Future Internet
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
  • Journal title : Journal of Digital Convergence
  • Volume 14, Issue 6,  2016, pp.405-413
  • Publisher : The Society of Digital Policy and Management
  • DOI : 10.14400/JDC.2016.14.6.405
 Title & Authors
Trend and Improvement for Privacy Protection of Future Internet
Kim, DaeYoub;
  PDF(new window)
 Abstract
To solve various problems of the Internet as well as to enhance network performance, various future Internet architectures utilize cached data in network nodes or in proxy servers. Named-data networking (NDN), one of future Internet architectures, implements in-network data caching functionality, and then responds itself to request messages. However, it can cause users` privacy invasion that the publisher of data can not engage in the sharing/using process of the data anymore after the data was cached in-network. So NDN implements both encryption-based access control and group access control. But, since such access control schemes need to exchange additional messages in order to search for a proper access control list and keys, it causes inefficiency. This paper surveys the access control schemes of NDN, and then proposes an improved scheme.
 Keywords
Future Internet;NDN/CCN;Privacy;Authorization;Access Control;
 Language
Korean
 Cited by
 References
1.
D. Clark, "The design philosophy of the DARPA Internet protocol," ACM Sigcomm Comp. Comm. Review, vol. 18, no. 1, pp. 106-114, Aug. 1988. crossref(new window)

2.
C. Park and J. Kim, "An Empirical Research on Information Privacy Concern in the IoT Era," Journal of Digital Convergence, vol.14, no.2, pp.65-72, 2016. 02.

3.
S. Nam and C. Seo, "Privacy Preserving Source Based Deduplication Method," Journal of Digital Convergence, vol.14, no.2, pp.175-181, 2016. 02. crossref(new window)

4.
C. Park and J. Kim, "An Empirical Research on Information Privacy and Trust Model in the Convergence Era," Journal of Digital Convergence, vol.13, no.4, pp.219-225, 2015. 04.

5.
S. Kim and S. Yeo, "A Study on Secure Data Access Control in Mobile Cloud Environment," Journal of Digital Convergence, vol.11, no.2, pp.317-322, 2013. 02.

6.
Y. Jeong, K. Han, and S. Lee, "Access Control Protocol for Privacy Guarantee of Patient in Emergency Environment," Journal of Digital Convergence, vol.12, no.7, pp.279-284, 2014. 07. crossref(new window)

7.
Keun-Ho Lee, "A Method of Defense and Security Threats in U-Healthcare Service", Journal of the Korea Convergence Society, Vol. 3, No. 4, pp. 1-5, 2012.

8.
Sik-Wan Cho, Won-Jun Jang, Hyung-Woo Lee, Development of User Oriented Vulnerability Analysis Application on Smart Phone", Journal of the Korea Convergence Society, Vol. 3, No. 2, pp. 7-12, 2012.

9.
J. Pan, S. Paul and R. Jain, "A Survey of the Research on Future Internet Architectures," IEEE communication magazine, vol 49, no. 7, pp 26-36, July 2011.

10.
B. Ahlgren, C. Dannewitz, C. Imbrenda, and D. Kutscher, "A survey of information-centric networking," IEEE Communications Magazine, vol. 50, no. 7, pp 26-36, July 2012.

11.
V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard, "Networking named content," ACM CoNext, pp. 1-12, Dec. 2009.

12.
PACR, "CCNx Access Control Specifications," July 30, 2010.

13.
J. Kurihara, E. Uzen, and C. Wood, "An Encryption-based Access Control Framework for Content-Centric Networking," IFIP Networking Conference (IFIP Networking), pp. 1-9, May 2015.

14.
C. Wood and E. Uzun, "Flexible end-to-end content security in CCN," 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 858-865, Jan. 2014.

15.
C. Ghali, M. Schlosberg, G. Tsudik, and Christopher Wood, "Interest-based Access Control for Content-Centirc Networks," arXiv preprint, arXiv:1505.06258, 2015.

16.
R. Touriani, T. Mick, S. Misra, and G. Panwar, "Security, Privacy, and Access Control in Information-Centric Networking: A Survey," arXiv preprint, arXiv:1603.03409, Mar. 2016.

17.
R. Merkle, "Protocols for public key cryptosystems," In Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 122-134, Apr. 1980.