Advertisement

Blockchain-Based PKI for Content-Centric Networking

  • Mohamed LabbiEmail author
  • Nabil Kannouf
  • Yassine Chahid
  • Mohammed Benabdellah
  • Abdelmalek Azizi
Conference paper
Part of the Lecture Notes in Intelligent Transportation and Infrastructure book series (LNITI)

Abstract

Content Centric Networking (CCN) is a new communication architecture built on named data, created to optimize network resources and ensure greater security. Due to its new architecture, CCN has several open security and privacy concerns. Today’s internet creates an encrypted end-to-end connection rather than securing content because content are opaque to the network. On the other hand, because of its separation from location, CCN claims to secure the content rather than the connection. In order to build trust between content providers and clients, content must be authenticated and integrity-protected. Since CCN relies on public key cryptography to protect confidentiality of the data and checking integrity and authentication processes, the public key management becomes a crucial issue for CCN security. In this paper, we address the security challenges related to key management, we propose a Decentralized Public Key Infrastructure (DPKI) used with Blockchain to counter the disadvantages of using a centralized authority (CA) and to build content-based security mechanisms used for securely distributing content in CCN.

Keywords

Content Centric Networking Security Public key infrastructure Blockchain 

References

  1. 1.
    Labbi, M., et al.: A game theoretic approach to multipath traffic control in Content-Centric Networking. In: International Conference on Advanced Communication Systems and Information Security (ACOSIS). IEEE (2016)Google Scholar
  2. 2.
    Jacobson, V.: A Description of Content-Centric Networking. Special Invited Plenary Short Course. Future Internet Summer School, Bremen. Lecture (2009)Google Scholar
  3. 3.
    Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: CoNEXT (2009)Google Scholar
  4. 4.
    Named Data Networking (NDN) Project by the NDN project team NDN Technical Report NDN-0001, Oct 2010Google Scholar
  5. 5.
    Wood, C.A., Uzun, E.: Flexible end-to-end content security in CCN. In: Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th , pp. 858–865, 10–13 Jan 2014Google Scholar
  6. 6.
    Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp 127–144 (1998)Google Scholar
  7. 7.
    Inbarani, W.S., Shenbagamoorthy, G., Kumar Charlie Paul, C.: Proxy re-encryption schemes for data storage security in cloud—a survey. Int. J. Eng. Res. Technol. 2(1) (2013) (ESRSA Publications)Google Scholar
  8. 8.
    da Silva, R.S., Zorzo, S.D.: On the use of proxy re-encryption to control access to sensitive data on information centric networking. In: ICOIN (2016)Google Scholar
  9. 9.
    Sahai, A., Waters, B.: Fuzzy identity based encryption. In: Advances in Cryptology, vol. 3494 of LNCS, pp. 457–473 (2005)Google Scholar
  10. 10.
    Raykova, M., Lakhani, H., Kazmi, H., Gehani, A.: Decentralized authorization and privacy-enhanced routing for information-centric networks. In: ACSAC (2015)Google Scholar
  11. 11.
    Wang, J., Lang, B.: An efficient KP-ABE scheme for content protection in information-centric networking. In: 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE (2016)Google Scholar
  12. 12.
    Fotiou, N., Polyzos, G.C.: Decentralized name-based security for content distribution using blockchains. In: Proceedings of Workshop on Multimedia Streaming in Information/Content-Centric Networks (MuSIC), in Conjuction with IEEE INFOCOM, Apr 2016Google Scholar
  13. 13.
    Smetters, D.K., Jacobson, V.: Securing network content, Oct 2009. PARC Technical ReportGoogle Scholar
  14. 14.
    Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)Google Scholar
  15. 15.
    Mahadevan, P., Uzun, E., Sevilla, S., Garcia-Luna-Aceves, J.: CCN-KRS: a key resolution service for CCN. In: Proceedings of the 1st International Conference on Information centric Networking, INC 14, pp. 97–106. ACM, New York, NY, USA (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Mohamed Labbi
    • 1
    Email author
  • Nabil Kannouf
    • 1
  • Yassine Chahid
    • 1
  • Mohammed Benabdellah
    • 1
  • Abdelmalek Azizi
    • 1
  1. 1.ACSA Laboratory, Faculty of SciencesMohammed First UniversityOujdaMorocco

Personalised recommendations