Browse > Article
http://dx.doi.org/10.14400/JDC.2018.16.1.271

Network Overhead Improvement for MHT-based Content Authentication Scheme  

KIM, DAEYOUB (Dept. of Information Security, Suwon Univ.)
Publication Information
Journal of Digital Convergence / v.16, no.1, 2018 , pp. 271-279 More about this Journal
Abstract
Various technologies have been developed to more efficiently share content such as P2P and CDN. These technologies take a common approach that request packets are responded by distributed network nodes, not by a single distributor. Such approaches not only resolve network congestion around content distributors, but also make it possible to distribute content regardless of the system and network status of content distributors. However, when receiving content from distributed nodes/hosts, not from authenticated distributors, users cannot practically identify which node/host sent content to them. Due to this characteristic, various hacking caused by the malicious modification of content is possible. Therefore, to make such approaches more secure, a content authentication technique is required. In this paper, we propose a improved operation of MHT used in CCN for authenticating distributed content. Then we evaluate the proposed method by comparing its performance with the existing technology.
Keywords
P2P; CDN; CCN; Data Authentication; MHT;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 D. Y. Kim, "A Comparison Study on Data Caching Policies of CCN," Journal of Digital Convergence, Vol. 15, No. 1, pp. 327-334, 2017.
2 R. Merkle, "Protocol for public key cryptosystems," IEEE Sympo. Research in Security and Privacy, Apr. 1980.
3 D. Y. Kim, J. S. Park, "Efficient Contents Verification Scheme for Contents-Centric-Networking," The Journal of Korean Institute of Comm. and Inform. Sciences, Vol. 39, No. 4, pp. 234-241, 2014.
4 D. Kim, "A Efficient Content Verification Scheme for Distributed Networking/Data Store," Journal of The Korea Institue of Information Security & Cryptology, Vol. 25, No. 4, pp. 839-847, 2015.   DOI
5 D. Kim, "Group-Interest-based Verifiable CCN," Mobile Information Systems, Volume 2016, Article ID 9202151
6 B. Georg "Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis,". Ruhr-Universitat Bochum. Retrieved 2013-11-20.
7 T. Cormen,"Introduction to Algorithm," The MIT Press, pp. 301-328, 1992
8 D. Y. Kim, "Improvement of the Data Authentication of CCN," Journal of Digital Convergence, Vol. 15, No. 8, pp. 341-349, 2017.   DOI
9 "Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015-2020," Cisco Public, February 3, 2016.
10 "Cisco Visual Networking Index: Forecast and Methodology, 2015-2020," Cisco Public, February 3, 2016.
11 A. K. Pathan, and R. Buyya, "A Taxonomy and Survey of Content Delivery Networks," Tech Report, Univ. of Melbourne, 2007.
12 E. Meshkova, J. Riihijarvi, M. Petrova, and P. Mahonen, "A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks," Computer Networks J., vol. 52, no. 11, pp. 2097-2128, 2008.   DOI
13 D. Kim, "Content Centric Networking Naming Scheme for Efficient Data Sharing," Journal of Korea Multimedia Society, Vol. 15, No. 9, pp. 1126-1132, 2012.   DOI
14 D. Y. Kim, "Trend and Improvement for Privacy Protection of Future Internet," Journal of Digital Convergence, Vol. 14, No. 6, pp. 405-413, 2016.   DOI
15 D. Clark, "The Design Philosophy of the DARPA Internet Protocols," ACM Sigcomm Comp. Comm. Review, Vol. 18, No. 1, pp. 106-114, Aug. 1988.   DOI
16 B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher and B. Ohlmann, "A Survey of Information-Centric Networking," IEEE Communications Magazine, Vol. 50, No. 7, pp. 26-36, 2012.   DOI
17 V. Jacobson, D. Smetters, J. Thornton, M. Plass, N. Briggs and R. Braynard, "Networking Named Content," 5th International Conference on Emerging Networking Experiments and Technologies, pp. 1-12, 2009.