论文标题

命名数据网络中的访问控制机制:一项综合调查

Access Control Mechanisms in Named Data Networks: A Comprehensive Survey

论文作者

Nour, Boubakr, Khelifi, Hakima, Hussain, Rasheed, Mastorakis, Spyridon, Moungla, Hassine

论文摘要

以信息为中心的网络(ICN)最近成为未来Internet体系结构(FIA)的杰出候选人,该候选者通过当前基于TCP/IP的Internet的主机通信模型解决了现有问题。命名的数据网络(NDN)是最新且活跃的ICN架构之一,它为Internet通信提供了干净的板岩方法。 NDN提供了内在的内容安全性,其中直接向内容提供安全性而不是通信渠道。在其他安全方面,访问控制(AC)规则指定可以访问内容的实体的特权。在基于TCP/IP的AC系统中,由于客户端服务器通信模型,服务器控制哪些客户端可以访问特定内容。相比之下,基于ICN的网络使用内容名称来驱动通信并将内容从其原始位置解除。这种现象导致失去对内容的控制,从而导致不同的挑战,以实现有效的AC机制。迄今为止,已经做出了相当大的努力来开发NDN的各种AC机制。在本文中,我们对NDN中的AC机制进行了详细而全面的调查。我们遵循NDN中AC的整体方法,首先总结了ICN范式,描述了从基于渠道的安全性到基于内容的安全性的更改,并突出显示了NDN中不同的加密算法和安全协议。然后,我们将现有的AC机制分类为两个主要类别:基于加密的AC和无关的AC。每个类别都基于AC的工作原理(例如基于属性的AC,基于名称的AC,基于身份的AC等)的类别类别。最后,我们介绍了从现有的AC机制中学到的经验教训,并确定了大型基于NDN的AC的挑战,强调了社区的未来研究方向。

Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this paper, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC. Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC, etc). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源