SlideShare a Scribd company logo
Naming in Content-Oriented
Architectures
Paper by: Ali Ghodsi et al.
Pressented by: Haroon Rashid
•Naming Types
–Self certifying, flat naming (Cryptographic based).
–User friendly, hierarchical naming.
•Issues
–Scalability
–Security
–Flexibility
Scalability
•Issues identified with Self-certifying names.
–Not scalable as these are not hierarchical
–Need a third party for translation purpose (like
DNS)
•Claims:
–Better scalability than hierarchical by using flexible
aggregation !
–Have better security than human readable names.
–Both naming architectures can be combined.
Network security components
•Integrity
•Confidentiality
•Provenance
•Availability
Entities for establishing security
•Real world Identity (RWI) – principal for data.
•Name
–Used for fetching the data
–Provided by principal
•Public key
–Each principal associated with private/public key
–Used for authentication purposes
Bindings
•RWI – Name: Helps in identifying the principal.
•RWI – Public key: Only intended principal could
claim to be the principal of data.
•Public key – Name: Associating key helps in
verifying the provenance of data.
•Bindings are transitive – proving any two of
them implies third one.
•Bindings in Human readable, Hierarchical
names
–Intrinsic binding:- RWI – Name
–Extrinsic binding:- Name - key by using certificate
authority (third party - PKI)
•Bindings in self-certifying names (P:L)
–Intrinsic binding (Name – key):- Take hash of key at
any node and check whether it hashes to P.
–Extrinsic binding:- RWI- key (external authority)
Comparison
Human readable, Hierarchical
(CCN)
•More useful.
•Remain unchanged as
cryptographic algos evolve.
•Name - RWI binding not tight,
e.g., acronym ICSI.
•Tiny URLs obliterate Name –
RWI binding
Self-certifying, Flat (DONA)
• Usability - Difficult to
remember such names
•Require careful engineering to
retain names as algos. evolve.
Name Scalability
•Hierarchical names help scalability
–Reduce size of routing table
–Reduce update rate of routing table
•Flat Naming
–Common Assumption – Aggregation impossible
–No hierarchy found but still supports greater
flexibility* in aggregation.
* Explicit aggregation is more flexible than inherent aggregation
Explicit aggregation
•Deepest match working ??
• Fetch Terms:
-Principal creates various fetch terms
corresponding to different third party
aggregates.
- Like outsourcing of content dissemination.
- Seems much like of CDN.
Naming and Flexibility
•Human friendly naming require PKI for binding
keys to names.
–Require universal agreement on the root trust
authority.
• self certifying naming require external
authority for binding of keys to RWI.

More Related Content

Similar to Naming in content_oriented_architectures [repaired]

Elastic pivorak
Elastic pivorakElastic pivorak
Elastic pivorak
Pivorak MeetUp
 
Schema and Identity for Linked Data
Schema and Identity for Linked DataSchema and Identity for Linked Data
Schema and Identity for Linked Data
National Institute of Informatics (NII)
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network concepts
Duressa Teshome
 
understanding-dns-essential
understanding-dns-essentialunderstanding-dns-essential
understanding-dns-essential
wael eshag eshag
 
Why do they call it Linked Data when they want to say...?
Why do they call it Linked Data when they want to say...?Why do they call it Linked Data when they want to say...?
Why do they call it Linked Data when they want to say...?
Oscar Corcho
 
Semantic web: where are we now?
Semantic web: where are we now? Semantic web: where are we now?
Semantic web: where are we now?
horvadam
 
4 addressing theory130115
4 addressing theory1301154 addressing theory130115
4 addressing theory130115
Eleni Trouva
 
4 addressing theory130115
4 addressing theory1301154 addressing theory130115
4 addressing theory130115
ARCFIRE ICT
 
Linked (Open) Data
Linked (Open) DataLinked (Open) Data
Linked (Open) Data
Bernhard Haslhofer
 
Borthakur hadoop univ-research
Borthakur hadoop univ-researchBorthakur hadoop univ-research
Borthakur hadoop univ-research
saintdevil163
 
Musings on Secondary Indexing in HBase
Musings on Secondary Indexing in HBaseMusings on Secondary Indexing in HBase
Musings on Secondary Indexing in HBase
Jesse Yates
 
Hadoop introduction
Hadoop introductionHadoop introduction
Hadoop introduction
Subhas Kumar Ghosh
 
Designing and Implementing Search Solutions
Designing and Implementing Search SolutionsDesigning and Implementing Search Solutions
Designing and Implementing Search Solutions
Findwise
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big Data
Great Wide Open
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big Data
Rommel Garcia
 
Encrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted CloudEncrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted Cloud
n|u - The Open Security Community
 
REST in Practice
REST in PracticeREST in Practice
REST in Practice
Guilherme Silveira
 
2 technical-dns-workshop-day1
2 technical-dns-workshop-day12 technical-dns-workshop-day1
2 technical-dns-workshop-day1
DNS Entrepreneurship Center
 
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS SupportWebinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
Storage Switzerland
 
UNIT I Introduction to NoSQL.pptx
UNIT I Introduction to NoSQL.pptxUNIT I Introduction to NoSQL.pptx
UNIT I Introduction to NoSQL.pptx
Rahul Borate
 

Similar to Naming in content_oriented_architectures [repaired] (20)

Elastic pivorak
Elastic pivorakElastic pivorak
Elastic pivorak
 
Schema and Identity for Linked Data
Schema and Identity for Linked DataSchema and Identity for Linked Data
Schema and Identity for Linked Data
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network concepts
 
understanding-dns-essential
understanding-dns-essentialunderstanding-dns-essential
understanding-dns-essential
 
Why do they call it Linked Data when they want to say...?
Why do they call it Linked Data when they want to say...?Why do they call it Linked Data when they want to say...?
Why do they call it Linked Data when they want to say...?
 
Semantic web: where are we now?
Semantic web: where are we now? Semantic web: where are we now?
Semantic web: where are we now?
 
4 addressing theory130115
4 addressing theory1301154 addressing theory130115
4 addressing theory130115
 
4 addressing theory130115
4 addressing theory1301154 addressing theory130115
4 addressing theory130115
 
Linked (Open) Data
Linked (Open) DataLinked (Open) Data
Linked (Open) Data
 
Borthakur hadoop univ-research
Borthakur hadoop univ-researchBorthakur hadoop univ-research
Borthakur hadoop univ-research
 
Musings on Secondary Indexing in HBase
Musings on Secondary Indexing in HBaseMusings on Secondary Indexing in HBase
Musings on Secondary Indexing in HBase
 
Hadoop introduction
Hadoop introductionHadoop introduction
Hadoop introduction
 
Designing and Implementing Search Solutions
Designing and Implementing Search SolutionsDesigning and Implementing Search Solutions
Designing and Implementing Search Solutions
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big Data
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big Data
 
Encrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted CloudEncrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted Cloud
 
REST in Practice
REST in PracticeREST in Practice
REST in Practice
 
2 technical-dns-workshop-day1
2 technical-dns-workshop-day12 technical-dns-workshop-day1
2 technical-dns-workshop-day1
 
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS SupportWebinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
 
UNIT I Introduction to NoSQL.pptx
UNIT I Introduction to NoSQL.pptxUNIT I Introduction to NoSQL.pptx
UNIT I Introduction to NoSQL.pptx
 

Recently uploaded

Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 

Recently uploaded (20)

Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 

Naming in content_oriented_architectures [repaired]

  • 1. Naming in Content-Oriented Architectures Paper by: Ali Ghodsi et al. Pressented by: Haroon Rashid
  • 2. •Naming Types –Self certifying, flat naming (Cryptographic based). –User friendly, hierarchical naming. •Issues –Scalability –Security –Flexibility
  • 3. Scalability •Issues identified with Self-certifying names. –Not scalable as these are not hierarchical –Need a third party for translation purpose (like DNS) •Claims: –Better scalability than hierarchical by using flexible aggregation ! –Have better security than human readable names. –Both naming architectures can be combined.
  • 5. Entities for establishing security •Real world Identity (RWI) – principal for data. •Name –Used for fetching the data –Provided by principal •Public key –Each principal associated with private/public key –Used for authentication purposes
  • 6. Bindings •RWI – Name: Helps in identifying the principal. •RWI – Public key: Only intended principal could claim to be the principal of data. •Public key – Name: Associating key helps in verifying the provenance of data. •Bindings are transitive – proving any two of them implies third one.
  • 7. •Bindings in Human readable, Hierarchical names –Intrinsic binding:- RWI – Name –Extrinsic binding:- Name - key by using certificate authority (third party - PKI) •Bindings in self-certifying names (P:L) –Intrinsic binding (Name – key):- Take hash of key at any node and check whether it hashes to P. –Extrinsic binding:- RWI- key (external authority)
  • 8. Comparison Human readable, Hierarchical (CCN) •More useful. •Remain unchanged as cryptographic algos evolve. •Name - RWI binding not tight, e.g., acronym ICSI. •Tiny URLs obliterate Name – RWI binding Self-certifying, Flat (DONA) • Usability - Difficult to remember such names •Require careful engineering to retain names as algos. evolve.
  • 9. Name Scalability •Hierarchical names help scalability –Reduce size of routing table –Reduce update rate of routing table •Flat Naming –Common Assumption – Aggregation impossible –No hierarchy found but still supports greater flexibility* in aggregation. * Explicit aggregation is more flexible than inherent aggregation
  • 10. Explicit aggregation •Deepest match working ?? • Fetch Terms: -Principal creates various fetch terms corresponding to different third party aggregates. - Like outsourcing of content dissemination. - Seems much like of CDN.
  • 11. Naming and Flexibility •Human friendly naming require PKI for binding keys to names. –Require universal agreement on the root trust authority. • self certifying naming require external authority for binding of keys to RWI.