信息网络中的私有域

R. Rembarz, D. Catrein, J. Sachs
{"title":"信息网络中的私有域","authors":"R. Rembarz, D. Catrein, J. Sachs","doi":"10.1109/ICCW.2009.5207981","DOIUrl":null,"url":null,"abstract":"The networking research community has recently started looking into so-called information-centric networks, which regard information objects as the primary elements in the network. Users store and retrieve the information objects, denoted by object identifi- ers, from the network without knowing or bothering which host serves the actual request, comparable to earlier initiatives in networking that separate node identifiers from network locations. The capability to address content directly takes many optimizations, such as content- optimized routing or transparent caching, to the next level, while at the same time enabling novel services. In order to prevent unautho- rized access to the information objects that roam around freely in the global network, objects shall be encrypted. We argue that for some use cases, e.g. when dealing with sensitive company-internal information, a stricter partitioning of the network is required. We propose and discuss two solutions to this problem, one focusing on securing the name resolution procedure, the other concentrating on the actual re- trieval. Both mechanisms complement existing proposals by separating information objects in the private network domain while maintaining global reachability.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"90 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Private Domains in Networks of Information\",\"authors\":\"R. Rembarz, D. Catrein, J. Sachs\",\"doi\":\"10.1109/ICCW.2009.5207981\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The networking research community has recently started looking into so-called information-centric networks, which regard information objects as the primary elements in the network. Users store and retrieve the information objects, denoted by object identifi- ers, from the network without knowing or bothering which host serves the actual request, comparable to earlier initiatives in networking that separate node identifiers from network locations. The capability to address content directly takes many optimizations, such as content- optimized routing or transparent caching, to the next level, while at the same time enabling novel services. In order to prevent unautho- rized access to the information objects that roam around freely in the global network, objects shall be encrypted. We argue that for some use cases, e.g. when dealing with sensitive company-internal information, a stricter partitioning of the network is required. We propose and discuss two solutions to this problem, one focusing on securing the name resolution procedure, the other concentrating on the actual re- trieval. Both mechanisms complement existing proposals by separating information objects in the private network domain while maintaining global reachability.\",\"PeriodicalId\":271067,\"journal\":{\"name\":\"2009 IEEE International Conference on Communications Workshops\",\"volume\":\"90 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE International Conference on Communications Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCW.2009.5207981\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Communications Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCW.2009.5207981","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

网络研究团体最近开始研究所谓的以信息为中心的网络,这种网络将信息对象视为网络中的主要元素。用户从网络中存储和检索由对象标识符表示的信息对象,而无需知道或担心哪个主机为实际请求提供服务,这与网络中早期将节点标识符与网络位置分开的举措类似。直接寻址内容的功能将许多优化(如内容优化路由或透明缓存)提升到下一个级别,同时支持新的服务。为防止在全球网络中自由漫游的信息对象被未经授权的访问,对其进行加密。我们认为,对于某些用例,例如,当处理敏感的公司内部信息时,需要更严格的网络分区。针对这个问题,我们提出并讨论了两种解决方案,一种侧重于确保名称解析过程的安全,另一种侧重于实际的检索。这两种机制通过在私有网络域中分离信息对象同时保持全局可达性来补充现有的建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Private Domains in Networks of Information
The networking research community has recently started looking into so-called information-centric networks, which regard information objects as the primary elements in the network. Users store and retrieve the information objects, denoted by object identifi- ers, from the network without knowing or bothering which host serves the actual request, comparable to earlier initiatives in networking that separate node identifiers from network locations. The capability to address content directly takes many optimizations, such as content- optimized routing or transparent caching, to the next level, while at the same time enabling novel services. In order to prevent unautho- rized access to the information objects that roam around freely in the global network, objects shall be encrypted. We argue that for some use cases, e.g. when dealing with sensitive company-internal information, a stricter partitioning of the network is required. We propose and discuss two solutions to this problem, one focusing on securing the name resolution procedure, the other concentrating on the actual re- trieval. Both mechanisms complement existing proposals by separating information objects in the private network domain while maintaining global reachability.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Preserving Privacy in Assistive Technologies Multiuser MIMO-OFDMA with Different QoS Using a Prioritized Channel Adaptive Technique Energy-Efficient Multiaccess Dissemination Networks Cognitive Pilot Channel Enabling Spectrum Awareness High-Performance Indoor Localization with Full-Band GSM Fingerprints
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1