• Save
Content-Centric Networking: Security
Upcoming SlideShare
Loading in...5
×
 

Content-Centric Networking: Security

on

  • 2,522 views

Presented for TTI Vanguard "Shift Happens" conference (http://bit.ly/TTIVshifthappens) visit to PARC, this is a basic overview of just the security aspects of our content-centric networking program.

Presented for TTI Vanguard "Shift Happens" conference (http://bit.ly/TTIVshifthappens) visit to PARC, this is a basic overview of just the security aspects of our content-centric networking program.

Statistics

Views

Total Views
2,522
Views on SlideShare
2,215
Embed Views
307

Actions

Likes
2
Downloads
0
Comments
0

3 Embeds 307

http://www.zdnet.com 300
http://www.slideshare.net 5
http://m.zdnet.com 2

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Content-Centric Networking: Security Content-Centric Networking: Security Presentation Transcript

  • Content-based Security Van Jacobson Research Fellow, PARC TTI/Vanguard at PARC February 25, 2010 parc ® Palo Alto Research Center
  • Content-centric Networking (CCN) is a communications architecture based on dissemination rather than conversation. (at the lowest level, you talk about named data, not to some server)
  • CCN offers ... • (provably) optimal content distribution • painless mobility, wireless, virtualization, ... • same scalability & efficiency as TCP/IP • simple, secure, robust configuration • an easy, incremental, evolutionary path • much better security View slide
  • Internet security sucks and not because we’re not trying hard enough View slide
  • Files, hosts and network connections are containers for information • A secured perimeter is the only way to secure containers. • For today’s business, any realistic perimeter encloses the planet.
  • Forget containers – secure the content Do it as the final production step to minimize attack surface. Ron Rivest’s SDSI has shown this works if content is augmented so any consumer can assess from the data: • Validity (is data intact and complete?) • Relevance (what question does this answer?) • Provenance (who asserts this is an answer?)
  • CCN data /nytimes.com/web/frontPage.html/v3/s0/0x3fdc96a4... signature 0x1b048347 key nytimes.com/web/george/desktop public key Signed by nytimes.com/web/george Signed by nytimes.com/web Signed by nytimes.com
  • Evidentiary Trust • Rich web of arises from signed content: information trustable, interconnected Content Content Content Content Content Content Content Content Content ! Content ! Content ! Content Content!! ! Key!! Key ! Key !!Key Key !Key Key Key !Key Key Key Key Key • Attacks haveand be consistent with information to links – get exponentially harder as information base grows. ! Strong security is emergent & effortless.
  • Information on CCN is available at www.ccnx.org including a GPL’d open-source release of our current research prototype.