Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3623565.3623709acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Open access

A New API in Support of NDN Trust Schema

Published: 08 October 2023 Publication History

Abstract

The decade-long experiences from developing applications over Named Data Networking (NDN) have taught us the importance of well-designed libraries that offer support to application developers to support data security. NDN trust schema provides a critical component in the NDN security support, however its implementation and support only started receiving significant attention in recent years. This paper first provides a summary of the existing API support for trust schema, then takes a step forward by developing a new trust schema API, named Envelope. Envelope addresses the application requirements by offering comprehensive trust schema functionalities, an easy-to-write schema language, and an extensible design. To demonstrate the usefulness of Envelope, we develop a blog application which uses Envelope to secure its data. Our results show that Envelope provides effective trust schema support for applications with acceptable overhead.

References

[1]
Alexander Afanasyev, Tamer Refaei, Lan Wang, and Lixia Zhang. 2018. A Brief Introduction to Named Data Networking. In Proc. of MILCOM.
[2]
Martin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, and Nick McKeown. 2006. SANE: A Protection Architecture for Enterprise Networks. In 15th USENIX Security Symposium (USENIX Security 06). USENIX Association, Vancouver, B.C. Canada. https://www.usenix.org/conference/15th-usenix-security-symposium/sane-protection-architecture-enterprise-networks
[3]
Saurab Dulal, Nasir Ali, Adam Robert Thieme, Tianyuan Yu, Siqi Liu, Suravi Regmi, Lixia Zhang, and Lan Wang. 2022. Building a secure mhealth data sharing infrastructure over ndn. In Proceedings of the 9th ACM Conference on Information-Centric Networking. 114--124.
[4]
Ashlesh Gawande, Jeremy Clark, Damian Coomes, and Lan Wang. 2019. Decentralized and secure multimedia sharing application over named data networking. In Proceedings of the 6th ACM Conference on Information-Centric Networking. 19--29.
[5]
Van Jacobson, Diana K Smetters, JD Thronton, Michael F Plass, Nicholas H Briggs, and RL Braynard. 2009. Network Named Content. CoNEXT (2009).
[6]
Pollere LLC. 2023. https://github.com/pollere/DCT. (2023). Accessed: 2023-5-27.
[7]
Satoshi Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https://metzdowd.com (03 2009).
[8]
NDNts. 2023. https://github.com/yoursunny/NDNts. (2023). Accessed: 2023-5-27.
[9]
Kathleen Nichols. 2019. Lessons learned building a secure network measurement framework using basic ndn. In Proceedings of the 6th ACM Conference on Information-Centric Networking. 112--122.
[10]
Kathleen Nichols. 2021. Trust schemas and ICN: key to secure home IoT. In Proceedings of the 8th ACM Conference on Information-Centric Networking. 95--106.
[11]
Kathleen Nichols. 2022. The VerSec Trust Schema Compiler. (2022). https://github.com/pollere/DCT/blob/main/tools/compiler/doc/language.pdf
[12]
Justin Presley, Xi Wang, Tym Brandel, Xusheng Ai, Proyash Podder, Tianyuan Yu, Varun Patil, Lixia Zhang, Alex Afanasyev, F. Alex Feltus, and Susmit Shannigrahi. 2022. Hydra - A Federated Data Repository over NDN. (2022). arXiv:cs.NI/2211.00919
[13]
Eric Rescorla and Tim Dierks. 2008. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246. (Aug. 2008).
[14]
NDN Team. 2023. https://named-data.net/doc/ndn-cxx/current/. (2023). Accessed: 2023-5-27.
[15]
NDN Team. 2023. https://redmine.named-data.net/projects/ndn-cxx/wiki/PublicKey_Info_Base. (2023). Accessed: 2023-5-27.
[16]
NDN Team. 2023. https://github.com/UCLA-IRL/ndn-python-repo. (2023). Accessed: 2023-5-27.
[17]
NDN Team. 2023. https://github.com/named-data/python-ndn. (2023). Accessed: 2023-5-27.
[18]
NDN Team. 2023. https://github.com/named-data/jndn. (2023). Accessed: 2023-5-27.
[19]
NDN Team. 2023. https://github.com/named-data/PyNDN2. (2023). Accessed: 2023-5-27.
[20]
Jeff Thompson, Peter Gusev, and Jeff Burke. 2019. Ndn-cnl: A hierarchical namespace api for named data networking. In Proceedings of the 6th ACM Conference on Information-Centric Networking. 30--36.
[21]
Tianyuan Yu, Philipp Moll, Zhiyi Zhang, Alexander Afanasyev, and Lixia Zhang. 2021. Enabling Plug-n-Play in Named Data Networking. In MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM). IEEE, 562--569.
[22]
Tianyuan Yu, Hongcheng Xie, Siqi Liu, Xinyu Ma, Xiaohua Jia, and Lixia Zhang. 2022. CertRevoke: a certificate revocation framework for named data networking. In Proceedings of the 9th ACM Conference on Information-Centric Networking. 80--90.
[23]
Tianyuan Yu, Hongcheng Xie, Siqi Liu, Xinyu Ma, Varun Patil, Xiaohua Jia, and Lixia Zhang. 2023. CLedger: A Secure Distributed Certificate Ledger via Named Data. (2023).
[24]
Yingdi Yu, Alexander Afanasyev, David Clark, KC Claffy, Van Jacobson, and Lixia Zhang. 2015. Schematizing trust in named data networking. In Proceedings of the 2nd ACM Conference on Information-Centric Networking. 177--186.
[25]
Yingdi Yu, Alexander Afanasyev, Jan Seedorf, Zhiyi Zhang, and Lixia Zhang. 2017. NDN DeLorean: An authentication system for data archives in named data networking. In Proceedings of the 4th ACM Conference on Information-Centric Networking. 11--21.
[26]
Zhiyi Zhang, Vishrant Vasavada, Xinyu Ma, and Lixia Zhang. 2019. Dledger: An iot-friendly private distributed ledger system based on dag. arXiv preprint arXiv:1902.09031 (2019).
[27]
Zhiyi Zhang, Tianyuan Yu, Xinyu Ma, Yu Guan, Philipp Moll, and Lixia Zhang. 2022. Sovereign: Self-contained smart home with data-centric network and security. IEEE Internet of Things Journal 9, 15 (2022), 13808--13822.
[28]
Zhiyi Zhang, Yingdi Yu, Sanjeev Kaushik Ramani, Alex Afanasyev, and Lixia Zhang. 2018. NAC: Automating access control via Named Data. In MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM). IEEE, 626--633.
[29]
Zhiyi Zhang, Yingdi Yu, Haitao Zhang, Eric Newberry, Spyridon Mastorakis, Yanbiao Li, Alexander Afanasyev, and Lixia Zhang. 2018. An overview of security support in Named Data Networking. IEEE Communications Magazine 56, 11 (2018), 62--68.

Cited By

View all
  • (2024)SLP: A Secure and Lightweight Scheme Against Content Poisoning Attacks in Named Data Networking Based on ProbingIEEE/ACM Transactions on Networking10.1109/TNET.2024.345123132:6(5128-5143)Online publication date: Dec-2024
  • (2024)Repo: Application Agnostic and Oblivious In-Network Data Store2024 IEEE International Conference on Metaverse Computing, Networking, and Applications (MetaCom)10.1109/MetaCom62920.2024.00052(279-284)Online publication date: 12-Aug-2024
  • (2024)Exploring the Design of Collaborative Applications via the Lens of NDN Workspace2024 IEEE International Conference on Metaverse Computing, Networking, and Applications (MetaCom)10.1109/MetaCom62920.2024.00027(89-96)Online publication date: 12-Aug-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ACM ICN '23: Proceedings of the 10th ACM Conference on Information-Centric Networking
October 2023
138 pages
ISBN:9798400704031
DOI:10.1145/3623565
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 October 2023

Check for updates

Author Tags

  1. named data networking (NDN)
  2. trust schema
  3. API
  4. software engineering

Qualifiers

  • Research-article

Funding Sources

Conference

ACM ICN '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 133 of 482 submissions, 28%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)362
  • Downloads (Last 6 weeks)42
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)SLP: A Secure and Lightweight Scheme Against Content Poisoning Attacks in Named Data Networking Based on ProbingIEEE/ACM Transactions on Networking10.1109/TNET.2024.345123132:6(5128-5143)Online publication date: Dec-2024
  • (2024)Repo: Application Agnostic and Oblivious In-Network Data Store2024 IEEE International Conference on Metaverse Computing, Networking, and Applications (MetaCom)10.1109/MetaCom62920.2024.00052(279-284)Online publication date: 12-Aug-2024
  • (2024)Exploring the Design of Collaborative Applications via the Lens of NDN Workspace2024 IEEE International Conference on Metaverse Computing, Networking, and Applications (MetaCom)10.1109/MetaCom62920.2024.00027(89-96)Online publication date: 12-Aug-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media