skip to main content
10.1145/3147234.3148088acmconferencesArticle/Chapter ViewAbstractPublication PagesuccConference Proceedingsconference-collections
research-article

VeidBlock: Verifiable Identity using Blockchain and Ledger in a Software Defined Network

Published:05 December 2017Publication History

ABSTRACT

Blockchain and verifiable identities have a lot of potential in future distributed software applications e.g. smart cities, eHealth, autonomous vehicles, networks, etc. In this paper, we proposed a novel technique, namely VeidBlock, to generate verifiable identities by following a reliable authentication process. These entities are managed by using the concepts of blockchain ledger and distributed through an advance mechanism to protect them against tampering. All identities created using VeidBlock approach are verifiable and anonymous therefore it preserves user's privacy in verification and authentication phase. As a proof of concept, we implemented and tested the VeidBlock protocols by integrating it in a SDN based infrastructure. Analysis of the test results yield that all components successfully and autonomously performed initial authentication and locally verified all the identities of connected components.

References

  1. Z. Khan, Z. Pervez, A. G. Abbasi, "Towards a secure service provisioning framework in a Smart city environment", published in the journal of Future Generation Computer Systems, Volume 77, December 2017, Pages 112--135 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Fei Hu ; Qi Hao ; Ke Bao, "A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation", published in IEEE Communications Surveys & Tutorials, Vol. 16, pp. 2181--2206, 2014Google ScholarGoogle ScholarCross RefCross Ref
  3. Panos P, et al. "Vehicular Communication Systems: Enabling Technologies, Applications, and Future Outlook on Intelligent Transportation" published in IEEE Communications Magazine, November 2009 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Mobile SDN: The future is virtual, published by Informa UK Limited, http://www.nec.com/en/global/ad/insite/feature/pdf/SDNandNFV.pdf accessed on March 21, 2017Google ScholarGoogle Scholar
  5. SDN & NFV : The Future for Telecoms by Telecom.com http://www.nec.com /en/global/ad/insite/feature/pdf/SDNandNFV.pdf accessed on March 24, 2017Google ScholarGoogle Scholar
  6. David R. "SDN a game changer but slow out of the gate, survey shows", https://gcn.com/Articles/2015/01/13/SDN-adoption.aspx, Jan 13, 2015Google ScholarGoogle Scholar
  7. H. König, R. Cwalinski, F. Kargl, Sven Dietrich, Security Challenges and Opportunities of Software-Defined Networking, Published in IEEE Security & Privacy, Volume: 15, Issue: 2, pp 96--100, March-April 2017 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance, http://www.etsi.org/deliver/etsi_gs/NFV-EVE/001_099/005/01.01.01_60/gs_NFV-EVE005v010101p.pdfGoogle ScholarGoogle Scholar
  9. Security Analysis of the Open Networking Foundation (ONF) OpenFlow Switch Specification file:///C:/Acreo/OpenFlow%20Security/Open%20 Networking%20Foundation%20(ONF)%20OpenFlow%20Switch%20Specification.html, Oct, 2012Google ScholarGoogle Scholar
  10. P1915.1 - Standard for Software Defined Networking and Network Function Virtualization Security, working group SVE - Security for Virtualized Environments, http://standards.ieee.org/develop/project/1915.1.htmlGoogle ScholarGoogle Scholar
  11. C. Banse ; S. Rangarajan, "A Secure Northbound Interface for SDN Applications" published in the proceeding of IEEE Trustcom/BigDataSE/ISPA, 2015, Helsinki, Finland. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. White paper (Juniper Networks), Network Transformation with NFV and SDN: A journey toward sustainable competitive advantage, http://www.juniper.net/assets/us/en/local/pdf/whitepapers/2000628-en.pdf, published in March, 2017Google ScholarGoogle Scholar
  13. S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, downloaded from https://bitcoin.org/bitcoin.pdf, 06 September, 2016.Google ScholarGoogle Scholar
  14. P. A. Grassi, M. E. Garcia, J. L. Fenton, "Digital Identity Guidelines", standardized by NIST in NIST Special Publication 800-63-3 and published in June 2017Google ScholarGoogle Scholar
  15. J. Reschke, "RFC-7617 : The 'Basic' HTTP Authentication Scheme", published on September 2015Google ScholarGoogle Scholar
  16. R. Shekh-Yusef, Avaya, D. Ahrens, etl, "RFC-7616 : HTTP Digest Access Authentication", published in September 2015Google ScholarGoogle Scholar
  17. D. Hardt, Ed., "RFC-6749 : The OAuth 2.0 Authorization Framework", published in October 2012Google ScholarGoogle Scholar
  18. Federal Information Processing Standard (FIPS) 196, "Entity Authentication Using Public Key Cryptography" published bu NIST, February 18, 1997Google ScholarGoogle Scholar
  19. U Khalid, A Ghafoor, M Irum, MA Shibli, "Cloud based secure and privacy enhanced authentication & authorization protocol", published by Procedia Computer Science, 2013, Vol 22, pp. 680--688Google ScholarGoogle Scholar
  20. Patrick P. Tsang, Sean W. Smith, PPAA: Peer-to-Peer Anonymous Authentication Published in the proceeding of International Conference on Applied Cryptography and Network Security ACNS, pp 55--74, 2008 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Yehuda Lindell, Anonymous Authentication, published in the Journal of Privacy and Confidentiality, Vol. 2,Number 2, pp. 35--63, 2010.Google ScholarGoogle Scholar
  22. Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu, Data Security and Privacy in Cloud Computing, Published in the International Journal of Distributed Sensor Networks by Hindawi Publishing Corporation, Volume 2014, Article ID 190903.Google ScholarGoogle Scholar
  23. Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance, http://www.etsi.org/deliver/etsi_gs/NFV-EVE/001_099/005/01.01. 01_60/gs_NFV-EVE005v010101p.pdfGoogle ScholarGoogle Scholar
  24. Network Functions Virtualisation (NFV);NFV Security; Problem Statement, http://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/001/01.01.01_60/gs_NFV-SEC001v010101p.pdfGoogle ScholarGoogle Scholar
  25. Xitao Wen, Yan Chen, Chengchen Hu, Chao Shi, Yi Wang, "Towards a secure controller platform for openflow applications" published in the Proceeding of 2nd ACM SIGCOMM workshop on Hot topics in Software Defined Networking (HotSDN '13), Hong Kong, China, Pages 171--172, August 16 - 16, 2013 Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Security Analysis of the Open Networking Foundation (ONF) OpenFlow Switch Specification file:///C:/Acreo/OpenFlow%20Security/Open%20 Networking%20Foundation%20(ONF)%20OpenFlow%20Switch%20Specification.html, Oct, 2012Google ScholarGoogle Scholar
  27. Blockchain Header, "Bitcoin Developer Reference", https://bitcoin.org/en/ developer-reference#block-headers, accessed on 06 September, 2016Google ScholarGoogle Scholar
  28. M. Jones, J. Bradley, N. Sakimura, RFC: 7515, "JSON Web Signature (JWS)" by Microsoft, May 2015Google ScholarGoogle Scholar

Index Terms

  1. VeidBlock: Verifiable Identity using Blockchain and Ledger in a Software Defined Network

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        UCC '17 Companion: Companion Proceedings of the10th International Conference on Utility and Cloud Computing
        December 2017
        252 pages
        ISBN:9781450351959
        DOI:10.1145/3147234

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 5 December 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate38of125submissions,30%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader