FASE: Fine-Grained Accountable and Space-Efficient Access Control for Multimedia Content With In-Network Caching
- 12 July 2021
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Network and Service Management
- Vol. 18 (4), 4462-4475
- https://doi.org/10.1109/tnsm.2021.3096428
Abstract
To reduce the duplicated traffic and improve the performance of distributing massive volumes of multimedia contents, in-network caching has been proposed recently. However, as in-network content caching can be directly utilized to respond users’ requests, multimedia content retrieval is beyond content providers’ control and makes it hard for them to implement access control and service accounting. In this paper, we propose a Fine-grained Accountable and Space-Efficient access control scheme, called FASE, for multimedia content distribution. FASE allows content providers to be fully offline while making the best of in-network caching. In FASE, the attribute-based encryption at multimedia content provider side and access policy based authentication at the edge router side jointly ensure secure fine-grained access control. Our scheme is efficient in both space and time. By designing one time chameleon signature (OTCS), users can keep anonymous during the authentication, and their privileges can be conveniently revoked when needed. Besides, secure service accounting is implemented by letting edge routers collect service credentials generated during users’ request process. Through formal security analysis, we prove the security of our scheme. Simulation results demonstrate that our scheme is efficient with acceptable overhead.Keywords
Funding Information
- National Natural Science Foundation of China (61972371)
- Youth Innovation Promotion Association of the Chinese Academy of Sciences (Y202093)
This publication has 44 references indexed in Scilit:
- Clabacus: A Risk-Adjusted Cloud Resources Pricing Model Using Financial Option TheoryIEEE Transactions on Cloud Computing, 2014
- LIVE: Lightweight Integrity Verification and Content Access Control for Named Data NetworkingIEEE Transactions on Information Forensics and Security, 2014
- Traceable CP-ABE: How to Trace Decryption Devices Found in the WildIEEE Transactions on Information Forensics and Security, 2014
- Secure content delivery in information-centric networksPublished by Association for Computing Machinery (ACM) ,2013
- Networking named contentCommunications of the ACM, 2012
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure RealizationLecture Notes in Computer Science, 2011
- Short Signatures from the Weil PairingJournal of Cryptology, 2004
- Short Signatures from the Weil PairingLecture Notes in Computer Science, 2001
- The Discrete Logarithm Problem on Elliptic Curves of Trace OneJournal of Cryptology, 1999
- Space/time trade-offs in hash coding with allowable errorsCommunications of the ACM, 1970