skip to main content
10.1145/3125719.3125724acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Public Access

NDN DeLorean: an authentication system for data archives in named data networking

Published: 26 September 2017 Publication History

Abstract

Named Data Networking (NDN) enables data-centric security in network communication by mandating digital signatures on network-layer data packets. Since the lifetime of some data can extend to many years, they outlive the lifetime of their signatures. This paper introduces NDN DeLorean, an authentication framework to ensure the long-term authenticity of long-lived data. The design of DeLorean takes a publicly auditable bookkeeping service approach to keep permanent proofs of data signatures and the times when the signatures were generated. To assess DeLorean's feasibility the paper presents a set of analytical evaluations on the operational cost as a function of data archive volumes. The paper also identifies several remaining issues that must be addressed in order to make DeLorean a general solution to authenticating long-lived data.

References

[1]
American Library Association. 2015. Number of Libraries in the United States. http://www.ala.org/tools/libfactsheets/alalibraryfactsheet01, Last accessed: May 6, 2017. (2015).
[2]
Richard Barnes, Jacob Hoffman-Andrews, and James Kasten. 2015. Automatic Certificate Management Environment (ACME). https://tools.ietf.org/html/draft-ietf-acme-acme-02. (October 2015).
[3]
Mark Baugher, Bruce Davie, Ashok Narayanan, and Dave Oran. 2012. Self-verifying names for read-only named data. In Proceedings of IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 274--279.
[4]
Ahto Buldasi, Peeter Laud, Helger Lipmaai, and Jan Villemson. 1998. Timestamping with Binary Linking Schemes. In CRYPTO'98.
[5]
Laurent Chuat, Pawel Szalachowski, Adrian Perrig, Ben Laurie, and Eran Messeri. 2015. Efficient gossip protocols for verifying the consistency of certificate logs. In Communications and Network Security (CNS), 2015 IEEE Conference on. IEEE, 415--423.
[6]
Scott A Crosby and Dan S Wallach. 2009. Efficient Data Structures For Tamper-Evident Logging. In Security Symposium. Usenix, 317--334.
[7]
Tim Dierks and Eric Rescorla. 2008. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246. (August 2008).
[8]
Stuart Haber and W Stornetta. 1990. How to Time-Stamp a Digital Document. In CRYPTO'90.
[9]
Stephen Kent and Karen Seo. 2005. Security Architecture for the Internet Protocol. RFC 4301. (December 2005).
[10]
Ben Laurie. 2014. Certificate transparency. Queue (2014).
[11]
Ben Laurie, Adam Langley, and Emilia Kasper. 2013. Certificate Transparency. RFC 6962. (June 2013).
[12]
Petros Maniatis and Mary Baker. 2002. Enabling the Archival Storage of Signed Documents. In the USENIX Conference on File and Storage Technologies (FAST) 2002. Usenix.
[13]
Manuel Araoz. 2017. Proof of Existence. https://proofofexistence.com, Last accessed: Aug. 20, 2017. (2017).
[14]
Spyridon Mastorakis, Alexander Afanasyev, Yingdi Yu, Michael Sweatt, and Lixia Zhang. 2017. nTorrent: BitTorrent in Named Data Networking. In ICCCN.
[15]
Ralph C Merkle. 1980. Protocols for Public Key Cryptosystems. In Security and Privacy, 1980 IEEE Symposium on. IEEE, 122--122.
[16]
Robinson Meyer. 2016. How Many Stories Do Newspapers Publish Per Day? https://www.theatlantic.com/technology/archive/2016/05/how-many-stories-do-newspapers-publish-per-day/483845/, Last accessed: May 6, 2017. (2016).
[17]
Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. (2008).
[18]
Eric Osterweil, Daniel Massey, Batsukh Tsendjav, Beichuan Zhang, and Lixia Zhang. 2006. Security Through Publicity. In HotSec.
[19]
Zach Shelby, Klaus Hartke, and Carsten Bormann. 2014. The constrained application protocol (CoAP). RFC 7252. (June 2014).
[20]
Diana Smetters and Van Jacobson. 2009. Securing network content. Technical Report. Citeseer.
[21]
Statista Inc. 2017. Number of daily newspapers in the United States from 1985 to 2014. https://www.statista.com/statistics/183408/number-of-us-daily-newspapers-since-1975/, Last accessed: May 6. (2017).
[22]
MartÃnn Vigil, Johannes Buchmann, Daniel Cabarcas, Christian Weinert, and Alexander Wiesmaier. 2015. Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey. Elsevier Computers & Security (2015).
[23]
Carl Wallace, Ulrich Pordesch, and Ralf Brandner. 2007. Long-Term Archive Service Requirements. RFC 4810. (March 2007).
[24]
Yingdi Yu, Alexander Afanasyev, David Clark, kc claffy, Van Jacobson, and Lixia Zhang. 2015. Schematizing Trust in Named Data Networking. In Proceedings of the 2nd International Conference on Information-Centric Networking. ACM.
[25]
Yingdi Yu, Patrick Guo, and Alexander Afanasyev. 2017. Source code of NDN DeLorean. https://github.com/named-data/ndn-delorean. (May 2017).

Cited By

View all
  • (2025)A Survey on NSF Future Internet Architecture (FIA) for MobilityFirst (MF), Named Data Networking (NDN), NEBULA, and eXpressive Internet Architecture (XIA)Power Devices and Internet of Things for Intelligent System Design10.1002/9781394311613.ch10(225-269)Online publication date: 13-Feb-2025
  • (2023)NDN-BDA: A Blockchain-Based Decentralized Data Authentication Mechanism for Vehicular Named Data NetworkingFuture Internet10.3390/fi1505016715:5(167)Online publication date: 29-Apr-2023
  • (2023)A New API in Support of NDN Trust SchemaProceedings of the 10th ACM Conference on Information-Centric Networking10.1145/3623565.3623709(46-54)Online publication date: 9-Oct-2023
  • Show More Cited By

Index Terms

  1. NDN DeLorean: an authentication system for data archives in named data networking

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ICN '17: Proceedings of the 4th ACM Conference on Information-Centric Networking
      September 2017
      239 pages
      ISBN:9781450351225
      DOI:10.1145/3125719
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 26 September 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. NDN
      2. authenticity
      3. signature logger

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      ICN '17
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 133 of 482 submissions, 28%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)56
      • Downloads (Last 6 weeks)17
      Reflects downloads up to 19 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)A Survey on NSF Future Internet Architecture (FIA) for MobilityFirst (MF), Named Data Networking (NDN), NEBULA, and eXpressive Internet Architecture (XIA)Power Devices and Internet of Things for Intelligent System Design10.1002/9781394311613.ch10(225-269)Online publication date: 13-Feb-2025
      • (2023)NDN-BDA: A Blockchain-Based Decentralized Data Authentication Mechanism for Vehicular Named Data NetworkingFuture Internet10.3390/fi1505016715:5(167)Online publication date: 29-Apr-2023
      • (2023)A New API in Support of NDN Trust SchemaProceedings of the 10th ACM Conference on Information-Centric Networking10.1145/3623565.3623709(46-54)Online publication date: 9-Oct-2023
      • (2022)The Shortest Verification Path of the MHT Scheme for Verifying Distributed DataApplied Sciences10.3390/app12211119412:21(11194)Online publication date: 4-Nov-2022
      • (2022)SoK: Public key and namespace management in NDNProceedings of the 9th ACM Conference on Information-Centric Networking10.1145/3517212.3558085(67-79)Online publication date: 6-Sep-2022
      • (2021)Enhancing Security and Trust in Named Data Networking using Hierarchical Identity Based CryptographyResearch Anthology on Blockchain Technology in Business, Healthcare, Education, and Government10.4018/978-1-7998-5351-0.ch079(1424-1445)Online publication date: 2021
      • (2021)Analyzing GDPR compliance of named data networkingProceedings of the 8th ACM Conference on Information-Centric Networking10.1145/3460417.3482979(107-117)Online publication date: 22-Sep-2021
      • (2021)Reliable firmware updates for the information-centric internet of thingsProceedings of the 8th ACM Conference on Information-Centric Networking10.1145/3460417.3482974(59-70)Online publication date: 22-Sep-2021
      • (2021)An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT EnvironmentIEEE Transactions on Computational Social Systems10.1109/TCSS.2021.30762098:5(1108-1120)Online publication date: Oct-2021
      • (2020)Public Key Infrastructure for Named Data NetworksProceedings of the 21st International Conference on Distributed Computing and Networking10.1145/3369740.3369790(1-10)Online publication date: 4-Jan-2020
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media