Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method based on encryption and Bloom filter in named data network

A named data network and Bloom filter technology, applied in the field of network security, can solve the problems of not being able to decrypt, not being able to obtain the decryption key, etc., to achieve the effect of saving broadband resources and preventing access to and trying to decrypt data

Inactive Publication Date: 2018-06-12
BEIJING UNIV OF TECH
View PDF2 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is to say, a consumer with reasonable access rights can not only obtain the encrypted content by sending interest packets, but also obtain the key to decrypt the content; a consumer without corresponding access rights will not be able to obtain the decryption key, thus Unable to decrypt protected content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method based on encryption and Bloom filter in named data network
  • Access control method based on encryption and Bloom filter in named data network
  • Access control method based on encryption and Bloom filter in named data network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023]In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] Below in conjunction with accompanying drawing, the present invention is described in further detail:

[0025] Such as figure 1 As shown, the access control method based on encryption and Bloom filter in a named data network provided by the present invention includes: step S11, forwarding the data request interest packet 13 of the cons...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control method based on encryption and Bloom filter in a named data network. The method comprises the following steps: forwarding a data request interest packet of aconsumer to a station or an intermediate NDN router in the named data network (NDN network); filtering the data request interest packet by using the Bloom Filter; returning the corresponding encrypteddata packet to the consumer; searching a data key, and attempting to decrypt the encrypted data packet; opening data in the case of decryption success, otherwise, sending a key request interest packet to the station, verifying the validity of the consumer, and if the consumer is valid, encrypting the data key via a public key of the consumer and returning the data key to the consumer; and decrypting the data key via a private key of the consumer, decrypting the encrypted data packet by using the decrypted data key, and opening the data in the encrypted data packet. By adoption of the technical scheme of the invention, the situation that encrypted contents are sent to an unauthorized user is avoided, the bandwidth resources are saved, and the unauthorized user is prevented from obtaining and attempting to decrypt the data.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an access control method based on encryption and Bloom filter in a named data network. Background technique [0002] At present, in NDN (named data networking, named data network), which is centered on content and whose main goal is to distribute and share content, it is far from enough to guarantee the integrity, relevance and credibility of content through digital signatures. , cannot meet the complete security requirements. Named Data Networking (NDN) shifts the Internet from today's IP-based packet delivery model to a name-based data retrieval model. The network architecture translates from IP addresses to named data, enabling efficient content delivery through in-network caching and direct retrieval of objects. However, this shift also creates challenges and obstacles to securing data objects and providing appropriate access controls over named data networks due t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0227H04L63/045H04L63/06H04L63/08H04L67/568
Inventor 张丽史淑娟
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products