240 likes | 417 Views
Secure Content Delivery in Information-Centric Networks: Design, Implementation, and Analyses. Computer Science Department New Mexico State University , USA. Nahid Majd. Satyajayant Misra. Reza Tourani. misra@cs.nmsu.edu. Agenda. Introduction and Motivation Models and Assumptions
E N D
Secure Content Delivery in Information-Centric Networks: Design, Implementation, and Analyses Computer Science Department New Mexico State University, USA NahidMajd Satyajayant Misra RezaTourani New Mexico State University, Las Cruces, NM, USA misra@cs.nmsu.edu
Agenda • Introduction and Motivation • Models and Assumptions • Design of Framework • TestbedResults • Conclusion New Mexico State University, Las Cruces, NM, USA
The Cisco Visual Networking Index underlines the need for a high bandwidth content-centric Internet. • High bandwidth video makes 51% of the Internet traffic today and would rise to 54% by 2016; • Sum of all video traffic would become approximately 86% of global traffic; • By 2014, mobile wireless devices will account for 61% of world Internet traffic. New Mexico State University, Las Cruces, NM, USA
What does this traffic trend mean for the future of the Internet? Bandwidth Intensive In the Core At the Edge Throwing Money at the Problem: Unsustainable Current Solution: Place contents closer to the edge using CDNs New Mexico State University, Las Cruces, NM, USA
A typical content delivery hierarchy in today’s Internet. Content Provider CDN Nodes End Users ISP Nodes New Mexico State University, Las Cruces, NM, USA
However, using CDNs does not solve the bandwidth bottleneck problem at the ISPs (the edge). At the Edge CDN ISP Redundant/Duplicate transmissions undermine network performance Solution: In-network caching at the ISP-level. New Mexico State University, Las Cruces, NM, USA
In-network caching at the ISPs will help reduce bandwidth requirement at the ISP level. At the Edge CDN ISP New Mexico State University, Las Cruces, NM, USA
The important concern is, how do we ensurehigh availability of the cached data only to legitimate users? Need for security and access only to authentic users (efficiency and high availability) Plain Data-caching alone is not enough Caching does not automatically guarantee security nor Availability New Mexico State University, Las Cruces, NM, USA
Let’s look at a simplified example of how your content is delivered to your Netflix player from the Netflix server. Amazon EC2 Microsoft’s Individualization Server Netflix Control Server Netflix’s Regular Webserver Netflix License Server Netflix Streaming Server (Akamai, etc.) What happens when EC2 is NOT “E” enough?!? Your Player New Mexico State University, Las Cruces, NM, USA
If the Cloud is down, then the service is down! Last happened in Oct’22, 2012. So near yet so far!! Content is next door, but is inaccessible. New Mexico State University, Las Cruces, NM, USA
These conditions serve as the motivation for this work. A practical security framework for trusted content delivery in ICNs High Availability Security Efficiency In-network caching Broadcast Encryption For legitimate usersonly For more than 20 million users; revocation of 1-2 million users; system re-initialization possible. Tested in a CCNxtestbed New Mexico State University, Las Cruces, NM, USA
We use a Shamir’s secret-sharing based broadcast encryption mechanism* for content security. (n,t)-threshold secret sharing: Requires t+1 users to share secret to decrypt. n: total number of users; t: maximum revocation threshold Server sends t shares, user adds one more to make t+1. * W. Tzeng and Z. Tzeng. A public-key traitor tracing scheme with revocation using dynamic shares. In Public Key Cryptography, pages 207–224, 2001. New Mexico State University, Las Cruces, NM, USA
The basic steps are split between the server and the client, with the operations being heavy on the server-side. Basic Steps in the framework • Server encrypts content using a symmetric key • It generates “n + t” shares • Gives each user one of the shares • Encrypts the key using “t” shares and makes it available • Legitimate user adds his share to create t+1 shares to decrypt the key * W. Tzeng and Z. Tzeng. A public-key traitor tracing scheme with revocation using dynamic shares. In Public Key Cryptography, pages 207–224, 2001. New Mexico State University, Las Cruces, NM, USA
The framework has three basic protocols: First two performed at the server and the last one at the client. Basic Protocols in the framework • Polynomials and shares generation at the server • Enabling block generation and encryption at the server • Secret Extraction at the mobile user Computation at the (mobile) user needs to be minimal We perform pre-computations at the server so user has to perform only O(t)computations to obtain secret key. New Mexico State University, Las Cruces, NM, USA
CCN/NDN Architecture Details: User Registration, Chunk Creation, Packet Naming, Versioning, User Revocation Sequence Numbers: Sequential or Random Versioning: Content and Enabling Block can have different numbers, versions can help with expiration. User Registration and Revocation: Messages transmitted as interests. New Mexico State University, Las Cruces, NM, USA
We have addressed some of the questions pertaining to the handling of system dynamics in the framework. • How to revoke a subscribed user at the end of the subscription? • Can we handle the case where the number of revoked user is more than t the system revocation threshold? • How do we handle new user(s) when the system reaches user capacity? New Mexico State University, Las Cruces, NM, USA
The framework was implemented in a CCNxtestbedto verify its feasibility for mobile users. • CCNx-0.7 codebase. • 3 nodes: Intel Core i7, 8 GB RAM, 2.4 GHz. • Code in C++, compiled with gcc 4.5.2. • GNU multi-precision arithmetic library. • 24.1 MB video hosted using the ccnputfilecommand. • n: 1 M to 20 M in increments of 5 M. • t: 5 K to 40 K in increments of 5 K. • Experiments were run over 100 runs. New Mexico State University, Las Cruces, NM, USA
We implemented two versions: No Server-side Pre-computation (SD) & Server-side Pre-computation (PSD). • No server-side pre-computation => No computation of the Lagrangian interpolation at the server, requiring O(t2) computations at the mobile device. • Server-side pre-computation => The Lagrangian interpolation variables are partially computed at the server; only O(t) computations at the mobile device. New Mexico State University, Las Cruces, NM, USA
Polynomial generation and user shares generation depended on the number of users in the system. Cost increases for large number of users, however, this part can be parallelized easily. New Mexico State University, Las Cruces, NM, USA
The pre-computation at the server adds to the enabling block cost, however the overhead is still modest. Even in PSD, the addition of the enabling block to the content transmission adds only a 0.3% overhead for a 300 MB movie. New Mexico State University, Las Cruces, NM, USA
The extraction at the user with PSD is far better than in SD, hence is recommended. Even when t is 1 million it takes 4.17 seconds (0.06% of a standard Netflix movie time) to extract using one 2.4 GHz processor. New Mexico State University, Las Cruces, NM, USA
Conclusions: Our framework will scale to large number of mobile users • Legitimate users can access content available close-by. • Even when the CP is down! • The framework is tailor-made for mobile users. • It is efficient to scale to several million users • Tested for upto 20 million subscribers. • Number of revoked users upto 1 million. • CCNxtestbed implementation results show promise. New Mexico State University, Las Cruces, NM, USA
Thank You New Mexico State University, Las Cruces, NM, USA misra@cs.nmsu.edu