Change search
ReferencesLink to record
Permanent link

Direct link
Secure Naming for a Network of Information
4WARD.
4WARD.
4WARD.
RISE, Swedish ICT, SICS. NETS.
Number of Authors: 4
2010 (English)Conference paper (Refereed)
Abstract [en]

Several projects propose an information-centric approach to the network of the future. Such an approach makes efficient content distribution possible by making information retrieval host-independent and integrating into the network storage for caching information. Requests for particular content can, thus, be satisfied by any host or server holding a copy. The current security model based on host authentication is not applicable in this context. Basic security functionality must instead be attached directly to the data and its naming scheme. A naming scheme to name content and other objects that enables verification of data integrity as well as owner authentication and identification is here presented. The naming scheme is designed for flexibility and extensibility, e.g., to integrate other security properties like access control. At the same time, the naming scheme offers persistent IDs even though the content, content owner and/or owner’s organizational structure, or location change. The requirements for the naming scheme and an analysis showing how the proposed scheme fulfills them are presented. Experience with prototyping the naming scheme is also discussed. The naming scheme builds the foundation for a secure information-centric network infrastructure that can also solve some of the main security problems of today’s Internet.

Place, publisher, year, edition, pages
2010, 10.
National Category
Computer and Information Science
Identifiers
URN: urn:nbn:se:ri:diva-21113OAI: oai:DiVA.org:ri-21113DiVA: diva2:1041147
Conference
13th IEEE Global Internet Symposium
Projects
4WARDNetInf
Note
In conjunction with IEEE Infocom 2010Available from: 2016-10-31 Created: 2016-10-31

Open Access in DiVA

fulltext(86 kB)3 downloads
File information
File name FULLTEXT01.pdfFile size 86 kBChecksum SHA-512
8fdeb935dc51c2de730a09264af8296cb2c18d9ae3a5449d38ac49e02710260f6dd0b891bf2307c18f8cdf7232f1731939e35f067baeea9e07604c116a0de2a2
Type fulltextMimetype application/pdf

By organisation
SICS
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 3 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

ReferencesLink to record
Permanent link

Direct link