DOI QR코드

DOI QR Code

Access Control to Objects and their Description in the Future Network of Information

  • Renault, Eric (Dept. of Wireless Networks and Multimedia Services, Institut Telecom) ;
  • Ahmad, Ahmad (Dept. of Wireless Networks and Multimedia Services, Institut Telecom) ;
  • Abid, Mohamed (Dept. of Wireless Networks and Multimedia Services, Institut Telecom)
  • Received : 2010.04.05
  • Accepted : 2010.08.24
  • Published : 2010.09.30

Abstract

The Future Internet that includes Real World Objects and the Internet of Things together with the more classic web pages will move communications from a nodecentric organization to an information-centric network allowing new a paradigm to take place. The 4WARD project initiated some works on the Future Internet. One of them is the creation of a Network of Information designed to enable more powerful semantic searches. In this paper, we propose a security solution for a model of information based on a semantic description and search of objects. The proposed solution takes into account both the access and the management of both objects and their descriptions.

Keywords

References

  1. C. Dannewitz, K. Pentikousis, R. Rembarz, E. Renault, O. Strandberg and J. Ubillos. Scenarios and Research Issues for a Network of Information. MobiMedia'08, July 7-9, 2008, Oulu, Finland.
  2. The FP7 4WARD Project. http://www.4ward-project.eu/
  3. D. Crockford. The application/json Media Type for JavaScript Object Notation (JSON). RFC 4627, Network Working Group, July, 2006.
  4. N. Niebert, S. Baucke, I. El-Khayat, M. Johnsson, B. Ohlman, H. Abramowicz, K. Wuenstel, H. Woesner, J. Quittek and L.M. Correia. The way 4WARD to the creation of a future internet. PIMRC, 2008.
  5. R. Jain. Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation. Military Communications Conference MILCOM, October 23-25, 2006, Washington DC.
  6. D.D. Clark, J. Wroclawski, K.R. Sollins and R. Braden. Tussle in Cyberspace: Defining Tomorrow's Internet. SIGCOMM'02, August 19-23, 2002, Pittsburgh, Pennsylvania, USA.
  7. J. Day. Patterns in Network Architecture: a Return to Fundamentals. Upper Saddle River, NJ, USA, 2008.
  8. C. Wang, A. Carzaniga, D. Evans and A.L. Wolf. Security issues and requirements for Internetscale publish-subscribe systems. Proceedings of the 35th Hawaii International Conference on System Sciences, 2002.
  9. Z. Miklos. Towards an access control mechanism for wide-area publish/subscribe systems. Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops (ICDCSW'02), 2002.
  10. B. Ohlman et al. First NetInf Architecture Description. FP7 4WARD Deliverable 6.1. February, 2009.
  11. E. Renault and D. Zeghlache. The Metalist Model: a Simple and Extensible Information Model for the Future Internet. EUNICE 2009-The Internet of the Future, September, 2009, Barcelona, Spain.
  12. BitTorrent. http://www.bittorrent.com/
  13. Exchangeable Image File Format for Digital Still Cameras: Exif Version 2.2. Standard of Japan Electronics and Information Technology Industries Association, April, 2002.
  14. L. Blunk and J. Vollbrecht. PPP Extensible Authentication Protocol (EAP). RFC 2284, March, 1998.
  15. X9.62-1998 (draft). Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). 1998.
  16. E. Barker, D. Johnson and M. Smid. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. NIST Special Publication 800-56A, March, 2007.
  17. T. Kivinen and M. Kojo. More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key exchange (IKE). RFC 3526, May, 2003.
  18. N. McCullagh and P.S.L.M. Barreto. A new two-party identity-based authenticated key agreement. In Cryptographers Track at RSA Conference, 2005.
  19. A.G. Myasnikov. Theory of models of bilinear mappings. Omsk City. Translated from sibirskii Matematicheskii Zhurnal, 31(3):94-108, 1990.
  20. G. Frey and H.-G. Ruck. A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Math. Comp, 62(206):865-874, 1994.
  21. S. Rao. Copyright: its implications for electronic information. Online information review, 27(4):264-275, 2003. https://doi.org/10.1108/14684520310489050
  22. X800 CCITT Recommandation: Data Communication Networks: Open Interconnection(OSI); Security, Structure and Architecture for Open SystemsInterconnection for CCITT. 1992.

Cited by

  1. Security, Privacy, and Access Control in Information-Centric Networking: A Survey vol.20, pp.1, 2018, https://doi.org/10.1109/COMST.2017.2749508