DOI QR코드

DOI QR Code

Trend and Improvement for Privacy Protection of Future Internet

미래 인터넷 기술의 Privacy 보호 기술 동향 및 개선

  • 김대엽 (수원대학교 정보보호학과)
  • Received : 2016.04.20
  • Accepted : 2016.06.20
  • Published : 2016.06.28

Abstract

To solve various problems of the Internet as well as to enhance network performance, various future Internet architectures utilize cached data in network nodes or in proxy servers. Named-data networking (NDN), one of future Internet architectures, implements in-network data caching functionality, and then responds itself to request messages. However, it can cause users' privacy invasion that the publisher of data can not engage in the sharing/using process of the data anymore after the data was cached in-network. So NDN implements both encryption-based access control and group access control. But, since such access control schemes need to exchange additional messages in order to search for a proper access control list and keys, it causes inefficiency. This paper surveys the access control schemes of NDN, and then proposes an improved scheme.

인터넷의 여러 문제들을 해결하고, 데이터 전송 성능을 개선하기 위하여 제안된 다양한 미래 인터넷 아키텍처들은 네트워크 노드나 프락시 서버에 캐싱된 데이터를 활용하고 있다. 미래 인터넷 기술 중 하나인 데이터 이름 기반 네트워킹 (NDN)은 네트워크 노드에 데이터 캐싱 기능을 구현하고, 네트워크 노드가 데이터 요청 메시지에 응답함으로써 인터넷의 성능을 개선한다. 그러나 네트워크 노드에 데이터가 캐싱 된 이후에는 해당 데이터의 소유자가 데이터 배포 및 사용에 관여할 수 없기 때문에 사용자 프라이버시에 심각한 위협이 될 수 있다. 이를 해결하기 위해, NDN은 데이터 암호화 및 그룹 기반 키 관리 기술을 사용하여 데이터 접근 제어 기능을 제안하고 있다. 그러나 제안된 기술은 접근 통제 리스트와 복호화 키를 획득하기 위하여 추가적인 메시지 교환이 필요하기 때문에 성능 저하 요인이 될 수 있다. 본 논문은 NDN의 접근 통제 기능을 살펴보고, 성능 향상을 위한 개선된 방안을 제안한다.

Keywords

References

  1. D. Clark, "The design philosophy of the DARPA Internet protocol," ACM Sigcomm Comp. Comm. Review, vol. 18, no. 1, pp. 106-114, Aug. 1988. https://doi.org/10.1145/52325.52336
  2. C. Park and J. Kim, "An Empirical Research on Information Privacy Concern in the IoT Era," Journal of Digital Convergence, vol.14, no.2, pp.65-72, 2016. 02. https://doi.org/10.14400/JDC.2016.14.2.65
  3. S. Nam and C. Seo, "Privacy Preserving Source Based Deduplication Method," Journal of Digital Convergence, vol.14, no.2, pp.175-181, 2016. 02. https://doi.org/10.14400/JDC.2016.14.2.175
  4. C. Park and J. Kim, "An Empirical Research on Information Privacy and Trust Model in the Convergence Era," Journal of Digital Convergence, vol.13, no.4, pp.219-225, 2015. 04. https://doi.org/10.14400/JDC.2015.13.4.219
  5. S. Kim and S. Yeo, "A Study on Secure Data Access Control in Mobile Cloud Environment," Journal of Digital Convergence, vol.11, no.2, pp.317-322, 2013. 02. https://doi.org/10.14400/JDPM.2013.11.2.317
  6. Y. Jeong, K. Han, and S. Lee, "Access Control Protocol for Privacy Guarantee of Patient in Emergency Environment," Journal of Digital Convergence, vol.12, no.7, pp.279-284, 2014. 07. https://doi.org/10.14400/JDC.2014.12.7.279
  7. Keun-Ho Lee, "A Method of Defense and Security Threats in U-Healthcare Service", Journal of the Korea Convergence Society, Vol. 3, No. 4, pp. 1-5, 2012.
  8. Sik-Wan Cho, Won-Jun Jang, Hyung-Woo Lee, Development of User Oriented Vulnerability Analysis Application on Smart Phone", Journal of the Korea Convergence Society, Vol. 3, No. 2, pp. 7-12, 2012.
  9. J. Pan, S. Paul and R. Jain, "A Survey of the Research on Future Internet Architectures," IEEE communication magazine, vol 49, no. 7, pp 26-36, July 2011.
  10. B. Ahlgren, C. Dannewitz, C. Imbrenda, and D. Kutscher, "A survey of information-centric networking," IEEE Communications Magazine, vol. 50, no. 7, pp 26-36, July 2012. https://doi.org/10.1109/MCOM.2012.6231276
  11. V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard, "Networking named content," ACM CoNext, pp. 1-12, Dec. 2009.
  12. PACR, "CCNx Access Control Specifications," July 30, 2010.
  13. J. Kurihara, E. Uzen, and C. Wood, "An Encryption-based Access Control Framework for Content-Centric Networking," IFIP Networking Conference (IFIP Networking), pp. 1-9, May 2015.
  14. C. Wood and E. Uzun, "Flexible end-to-end content security in CCN," 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 858-865, Jan. 2014.
  15. C. Ghali, M. Schlosberg, G. Tsudik, and Christopher Wood, "Interest-based Access Control for Content-Centirc Networks," arXiv preprint, arXiv:1505.06258, 2015.
  16. R. Touriani, T. Mick, S. Misra, and G. Panwar, "Security, Privacy, and Access Control in Information-Centric Networking: A Survey," arXiv preprint, arXiv:1603.03409, Mar. 2016.
  17. R. Merkle, "Protocols for public key cryptosystems," In Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 122-134, Apr. 1980.