Technical gazette, Vol. 32 No. 5, 2025.
Original scientific paper
https://doi.org/10.17559/TV-20240604001736
A Survey of Encryption-based Access Control Schemes in Named Data Networking
Jiaoli Shi
; Jiaoli Shi, Xiaoping Liu, Anyuan Deng, Xiangyu Liu, Zhuolin Mei, Shunli Zhang, Shimao Yao*, Xiancheng Wang, Liya Xu, Kai He
Xiaoping Liu
; Jiujiang University, No. 551, Qianjin East Road, Jiujiang, Jiangxi 332005, China
Anyuan Deng
; Jiaoli Shi, Xiaoping Liu, Anyuan Deng, Xiangyu Liu, Zhuolin Mei, Shunli Zhang, Shimao Yao*, Xiancheng Wang, Liya Xu, Kai He
Xiangyu Liu
; Jiaoli Shi, Xiaoping Liu, Anyuan Deng, Xiangyu Liu, Zhuolin Mei, Shunli Zhang, Shimao Yao*, Xiancheng Wang, Liya Xu, Kai He
Zhuolin Mei
; Jiujiang Key Laboratory of Cyberspace and Information Security, No. 551, Qianjin East Road, Jiujiang, Jiangxi 332005, China
Shunli Zhang
; QingHai Institute of Technology, No. 2 Xiuyuan Street, Chengbei District, Xining 810016, China
Shimao Yao
; Jiaoli Shi, Xiaoping Liu, Anyuan Deng, Xiangyu Liu, Zhuolin Mei, Shunli Zhang, Shimao Yao*, Xiancheng Wang, Liya Xu, Kai He
*
Xiancheng Wang
; Jiaoli Shi, Xiaoping Liu, Anyuan Deng, Xiangyu Liu, Zhuolin Mei, Shunli Zhang, Shimao Yao*, Xiancheng Wang, Liya Xu, Kai He
Liya Xu
; Jiaoli Shi, Xiaoping Liu, Anyuan Deng, Xiangyu Liu, Zhuolin Mei, Shunli Zhang, Shimao Yao*, Xiancheng Wang, Liya Xu, Kai He
Kai He
; School of Computer Science and Artificial Intelligence, Wuhan Textile University, Wuhan 430073, China
* Corresponding author.
Abstract
Named Data Networking (NDN) completely abandons the traditional idea of IP addressing and uses the method of content matching to exchange data. This new network architecture is suitable for the emerging decentralized network. However, data access control in NDN is challenging and has been attracting a lot of researchers' attention. This paper lists the timeline of research progress in encryption-based NDN access control schemes by the cryptography primitives, discusses and analyses the schemes in the aspects of efficiency improvement and function improvement. Also, four future research directions of the construction of system model, lightweight system method, trust root deployment, permission revocation are pointed out in the field of encryption-based access control in NDN.
Keywords
encryption-based data access control; lightweight system method; named data networking; permission revocation
Hrčak ID:
335043
URI
Publication date:
30.8.2025.
Visits: 429 *