File Download

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.endPage 45210 -
dc.citation.startPage 45198 -
dc.citation.title IEEE ACCESS -
dc.citation.volume 8 -
dc.contributor.author Park, Minkyung -
dc.contributor.author Kim, Jeongnyeo -
dc.contributor.author Kim, Youngho -
dc.contributor.author Cho, Eunsang -
dc.contributor.author Park, Soobin -
dc.contributor.author Sohn, Sungmin -
dc.contributor.author Kang, Minhyeok -
dc.contributor.author Kwon, Ted Taekyoung -
dc.date.accessioned 2026-03-27T15:08:49Z -
dc.date.available 2026-03-27T15:08:49Z -
dc.date.created 2026-03-27 -
dc.date.issued 2020-03 -
dc.description.abstract As the Internet has evolved from host-to-host communications to content distribution, data-centric networking is poised to improve networking efficiency. Especially, as the cloud computing, the Internet of Things (IoT), the fifth-generation (5G) networking become popular, there is a consensus that data is to be distributed over some potentially untrusted middleboxes (e.g., CDN servers, web caches) that mediates between data writers and data readers. While data-centric networking designs such as Edge Caching, Global Data Plane (GDP), Named Data Networking (NDN) have been active explored, there have been few studies on how to distribute and manage keys for data access control in such designs with untrusted servers (i.e., middleboxes). We present a key management framework in which symmetric and asymmetric keys are securely managed. A writer publishes his (encrypted) data along with the decryption key for the data. Likewise, an authorized reader retrieves the decryption key as well as the data of interest. To make the key distribution securely between a writer and a reader via an untrusted server, we introduce a key server running on top of the Intel SGX technology. In this way, we can manage and distribute keys for data access control in an efficient and flexible manner. We evaluate the proposed framework by prototyping, which shows some delays in key publishing and retrieval. However, the delays in real operations will be marginal as the period will become longer. -
dc.identifier.bibliographicCitation IEEE ACCESS, v.8, pp.45198 - 45210 -
dc.identifier.doi 10.1109/ACCESS.2020.2978346 -
dc.identifier.issn 2169-3536 -
dc.identifier.scopusid 2-s2.0-85082069085 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/91138 -
dc.identifier.url https://ieeexplore.ieee.org/abstract/document/9024053 -
dc.identifier.wosid 000524713900006 -
dc.language 영어 -
dc.publisher IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC -
dc.title An SGX-Based Key Management Framework for Data Centric Networking -
dc.type Article -
dc.description.isOpenAccess TRUE -
dc.relation.journalWebOfScienceCategory Computer Science, Information Systems; Engineering, Electrical & Electronic; Telecommunications -
dc.relation.journalResearchArea Computer Science; Engineering; Telecommunications -
dc.type.docType Article -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Servers -
dc.subject.keywordAuthor Access control -
dc.subject.keywordAuthor Distributed databases -
dc.subject.keywordAuthor Public key -
dc.subject.keywordAuthor Internet of Things -
dc.subject.keywordAuthor Data-centric networking -
dc.subject.keywordAuthor key management -
dc.subject.keywordAuthor Intel software guard extension -
dc.subject.keywordAuthor transport layer security -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.