Self-protected content for information-centric networking architectures using verifiable credentials
Bander A. Alzahrani ()
Additional contact information
Bander A. Alzahrani: King Abdulaziz University
Telecommunication Systems: Modelling, Analysis, Design and Management, 2022, vol. 79, issue 3, No 5, 387-396
Abstract:
Abstract Access control in information-centric networking (ICN) architectures is both a challenging and critical problem. This happens because ICN architectures are content-oriented and location-independent, therefore, a piece of content can be retrieved from multiple locations. In many cases these locations are outside the administrative realm of the content owner. Implementing access control policies in this environment requires that storage nodes are capable of interpreting complex access control policies, or even business relationships and structures. In this paper we overcome this problem by leveraging verifiable credentials (VCs). VCs are a mean for representing real world credentials in the cyber world. VCs are machine readable and self-verifiable. A user can prove that he/she is a VC holder by issuing an appropriate proof, which can be verified deterministically, without requiring any knowledge about the semantics or the business relationship behind a VC. With our solution, a content owner includes in an item’s metadata a VC “proof-request,” which represents the access control policy that protects this item. Any third party, and independently of the content owner, can use this proof-request to perform user authorization, in a secure and privacy preserving way.
Keywords: Information-centric networking; Verifiable credentials; Access control (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s11235-021-00874-y Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:79:y:2022:i:3:d:10.1007_s11235-021-00874-y
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235
DOI: 10.1007/s11235-021-00874-y
Access Statistics for this article
Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan
More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().