Font Size: a A A

The Research Of Access Control Issues In Information-Centric Networking

Posted on:2017-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:Z F ZhouFull Text:PDF
GTID:2308330485453754Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
The traditional TCP/IP-based Internet model is facing unprecedented challenges in scalability, mobility, safety and efficiency aspects. In order to meet the growing re-quirements of information access, it has produced some data distribution technologies, such as P2P(Peer to Peer) and CDN(Content Delivery Network). Although these tech-nologies are information-centric, they are located in the application layer, can not use the underlying network topology inforamtion, resulting in waste of network resources.In order to solve the challenges for the traditional Internet, ICN(Information Cen-tric Networking) has been proposed. ICN decouples the dataset from their physical locations and transforms data into a first-class entity, changes the communication mod-e from the traditional "push" to "pull". What’s more, the security built directly on the message rather than on the host. In-network caching is one of the most important feature of ICN, the routers in ICN can cache data to provide fast and efficient content acqui-sition. However, it also introduces a new access control challenge:how to effectively implement its access control to ensure that only authorized consumers can access when the content are cached in the routers, where these content are out of the control of their publishers.After investigation, the existing access control scheme are certain defects. In order to solve new access control problems faced by ICN, this dissertation first presents a split-based access control scheme, the publisher split the content into two parts, a large part that could be cached in routers for all users to retrive, and a small pairing small part that is unique for each authorized consumer. This scheme exploits the fact of the bit-wise OR operation. But this scheme faced with the problem of tampering attack, therefore, we propose two improved split-based access control scheme, namely split-based and digital watermarking-based access control scheme and split-based and twice access control-based access control scheme.Through research we found that network coding can be used to solve the access control problem in this dissertation. First we propose a linear coding-based control scheme, the analysis shows that there are serious flaws in this scheme, so we propose the XOR coding-based access control sheme. The XOR coding-based access control scheme exploits the fact of XOR operation. The scheme constructs a set of nodes for a graph with the released content after XOR operation, and then the publisher construct a unique path for each authorized consumer using Path Construction Algorithm. After the authorized consumers get the content using the paths, they retrieve the decoding key from the publishers, and then get the content.Finally, through simulation experiments, the split-based access control scheme and the XOR coding-based access control scheme are validated further, these schemes can provide faster and more efficient content acquisition compared with the traditional In-ternet.
Keywords/Search Tags:Information Centric Networking, Access Control, Splitting, Network Cod- ing
PDF Full Text Request
Related items