1st ACM Conference on Information-Centric Networking (ICN-2014)
ICN Privacy and Name based Security
Quarter-day Tutorial: Wednesday evening (16:30-18:30), September 24, 2014.
The purpose of this tutorial is twofold: to discuss ICN privacy requirements and related solutions, as well as to acquaint participants with the latest advances in name-based security.
ICN architectures are often criticized for exposing user preferences. Privacy issues in ICN cannot be investigated using traditional approaches since they differ significantly from the conventional end-to-end architectures. The tutorial will introduce a comprehensive threat model and it will present a methodology for evaluating privacy risks in ICN architectures. Moreover, it will detail related privacy preserving solutions.
Many ICN research efforts advocate that a departure from the traditional PKI model is desirable. To this end, they propose security solutions that are applied at the content level using content-name as a security primitive. Although (content) name-based security solutions can be built using traditional cryptographic solutions, recent advances in cryptography create opportunities for new, exciting applications. The tutorial will discuss the advantages of name-based security solutions and it will introduce Identity-Based cryptography and its applications in ICN.
Section 1: ICN Privacy
- ICN Privacy requirements.
- ICN Privacy solutions based on entropy, based on mix-networks and (very brief overview only) based on homomorphic encryption.
- Privacy analysis of ICN architectures.
Section 2: Name-based security
- Self-certified names.
- Identity-based encryption.
About the Speakers
Nikos Fotiou is a post-doctoral researcher at the Mobile Multimedia Laboratory (MMlab), AUEB. He participated in the FP7 projects PSIRP and PURSUIT and the ESA-funded project φSAT. Dr. Fotiou received his Diploma in Information Systems Eng. from the University of Aegean, Samos, Greece, his M.Sc. in Internetwokring from KTH, Stockholm, Sweden, and his Ph.D. in CS from AUEB, Athens, Greece. His Ph.D. dissertation investigated security requirements and solutions for ICN architectures. His paper “Access Control Enforcement Delegation for Information-Centric Networking Architectures,” received the best paper award at SIGCOMM ICN Workshop, 2012. He is co-author of the article “A survey of information-centric networking research,” (IEEE, Communications Surveys Tutorials), and he is a contributor to the Charm-Crypto, cryptographic library. His current research interests include security aspects of ICN, user privacy, access control delegation, and integrity and provenance verification mechanisms.
George C. Polyzos, Professor of Computer Science at AUEB, founded and is leading the Mobile Multimedia Laboratory (MMlab). Previously, he was Professor of Computer Science and Engineering at the University of California, San Diego, where he was co-director of the Computer Systems Laboratory, member of the Steering Committee of the Center for Wireless Communications, and Senior Fellow of the San Diego Supercomputer Center. Prof. Polyzos and the MMlab participated in the FP7 projects PSIRP and PURSUIT that developed the Information-Centric Networking (ICN) Publish-Subscribe Internet (PSI) architecture and the ESA-funded project φSAT, which investigated “The Role of Satellite in Future Internet Services,” and co-authored a comprehensive survey article on ICN. Prof. Polyzos was also an organizer of the EIFFEL Think Tank, on the Steering Board of the Euro-NF Network of Excellence and head of its “Socio-Economic Aspects” and “Trust, Privacy and Security” joint research activities. He is the chair of the Steering Committee of the ACM SIGCOMM conference on Information-centric Networking and was TPC Co-Chair for the ACM SIGCOMM ICN 2013 workshop. Dr. Polyzos received his Diploma in EE from the National Technical University, Athens, Greece and his M.A.Sc. in EE and Ph.D. in CS from the University of Toronto. He has published more than 200 refereed papers with more than 5800 citations. His current research interests include Internet architecture and protocols, ubiquitous computing, security and privacy, wireless networks, mobile multimedia communications, and performance evaluation of computer and communications systems.