Secure Personal Content Networking Over Untrusted Devices

نویسندگان

  • Uichin Lee
  • Joshua Joy
  • Youngtae Noh
چکیده

Securely sharing and managing personal content is a challenging task in multidevice environments. In this paper, we design and implement a new platform called personal content networking (PCN). Our work is inspired by content-centric networking (CCN) becausewe aim to enable access to personal content using its name instead of its location. The unique challenge of PCN is to support secure file operations such as replication, updates, and access control over distributed untrusted devices. The primary contribution of this work is the design and implementation of a secure content management platform that supports secure updates, replications, and fine-grained content-centric access control of files. Furthermore, we demonstrate its feasibility through a prototype implementation on the CCNx skeleton.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices

The Post-PC revolution is bringing information access to a wide-range of devices beyond the desktop, such as public kiosks, and mobile devices like cellular telephones, PDAs, and voice based vehicle telematics. However, existing deployed Internet services are geared toward the secure rich interface of private desktop computers. We propose the use of an infrastructure-based secure proxy architec...

متن کامل

A Platform for Expressive and Secure Data Sharing with Untrusted Third Parties

Today, third-party applications provide a variety of rich services to smartphone users. There are compelling reasons to share personal data with third parties, such as social networking applications, but the benefits of sharing data must be balanced against the corresponding risks to personal privacy. Prior work has proposed personal data vaults to separate the capturing and sharing of data. We...

متن کامل

Proof of Freshness: How to efficiently use an online single secure clock to secure shared untrusted memory

We address the problem of using an untrusted server with a small trusted module to provide trusted storage for a large number of clients, where each client may own and use several different devices that may be offline at different times and may not be able to communicate with each other except through the untrusted server. We introduce a new cryptographic primitive: freshness schemes. We show a...

متن کامل

Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...

متن کامل

Multifeatured and Integrated P2P Platform for Distributed Networking Application Using Juxtapose

There is an increasing need to design and deploy multifeatured networking applications due to the fast growth of the Internet infrastructure and the use of large-scale complex applications in industries, transport, logistics, government, health, and businesses,. Important features of such applications include the capability to be self-organized, be decentralized, integrate different types of re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Wireless Personal Communications

دوره 80  شماره 

صفحات  -

تاریخ انتشار 2015