SlideShare a Scribd company logo
Content-based Security
          Van Jacobson
      Research Fellow, PARC

      TTI/Vanguard at PARC
        February 25, 2010



                              parc                ®




                              Palo Alto Research Center
Content-centric Networking (CCN)
 is a communications architecture
       based on dissemination
      rather than conversation.


  (at the lowest level, you talk about
   named data, not to some server)
CCN offers ...
• (provably) optimal content distribution
• painless mobility, wireless, virtualization, ...
• same scalability & efficiency as TCP/IP
• simple, secure, robust configuration
• an easy, incremental, evolutionary path
• much better security
Internet security sucks


 and not because we’re not trying hard enough
Files, hosts and
network connections are
containers for information

• A secured perimeter is the only way to
  secure containers.

• For today’s business, any realistic perimeter
  encloses the planet.
Forget containers –
     secure the content
Do it as the final production step to minimize
attack surface.

Ron Rivest’s SDSI has shown this works if content
is augmented so any consumer can assess
from the data:

 • Validity (is data intact and complete?)
 • Relevance (what question does this answer?)
 • Provenance (who asserts this is an answer?)
CCN data
/nytimes.com/web/frontPage.html/v3/s0/0x3fdc96a4...

                     signature
                  0x1b048347         key



           nytimes.com/web/george/desktop public key


             Signed by   nytimes.com/web/george

                 Signed by nytimes.com/web

                     Signed by nytimes.com
Evidentiary Trust
• Rich web of arises from signed content:
  information
              trustable, interconnected

        Content
        Content                Content
                              Content
                             Content
         Content
         Content             Content
          Content
           !                Content
            !
           Content
             !             Content
                           Content!!
                                  !
          Key!!
          Key !
           Key                  !!Key
                                 Key
                               !Key
            Key
             Key              !Key
                              Key
               Key           Key
                            Key

• Attacks haveand be consistent with
  information
               to
                  links – get exponentially
  harder as information base grows.

! Strong security is emergent & effortless.
Information on CCN is available at
         www.ccnx.org
including a GPL’d open-source release
  of our current research prototype.

More Related Content

PPT
THE CYBER-DOME
PPSX
Secure your public WiFi
PPTX
What is Content centric networking
PPTX
Content centric networking
PPTX
Information Centric Networking and Content Addressability
PPTX
Named data networking
PDF
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
PDF
Named data networking. Basic Principle
THE CYBER-DOME
Secure your public WiFi
What is Content centric networking
Content centric networking
Information Centric Networking and Content Addressability
Named data networking
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
Named data networking. Basic Principle

Similar to Content-Centric Networking: Security (20)

PDF
Cisco 2013 Annual Security Report
PDF
2600 v23 n4 (winter 2006)
PPT
Network security and protocols
PDF
Security Aspects of the Information Centric Networks Model
PDF
Information-centric networking and relaton to legal and regulatory issues
PDF
2600 v24 n1 (spring 2007)
PDF
CNNIC Update, by Jessica Shen [APNIC 38 / NIR SIG]
PDF
internet architecture.pdf
PDF
IoT.pdf
PDF
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
PDF
Security issues in content centric networks-review2
PDF
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
PDF
Communications Technologies
PDF
Network security
PDF
Study and analysis of mobility, security, and caching issues in CCN
PDF
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
PDF
ClubHack Magazine issue 26 March 2012
PPTX
March cybersecurity powerpoint
PDF
Networking Essay Example
DOCX
Network security
Cisco 2013 Annual Security Report
2600 v23 n4 (winter 2006)
Network security and protocols
Security Aspects of the Information Centric Networks Model
Information-centric networking and relaton to legal and regulatory issues
2600 v24 n1 (spring 2007)
CNNIC Update, by Jessica Shen [APNIC 38 / NIR SIG]
internet architecture.pdf
IoT.pdf
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
Security issues in content centric networks-review2
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
Communications Technologies
Network security
Study and analysis of mobility, security, and caching issues in CCN
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
ClubHack Magazine issue 26 March 2012
March cybersecurity powerpoint
Networking Essay Example
Network security
Ad

More from PARC, a Xerox company (20)

PPTX
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
PDF
CCNxCon2012: Welcome: Event Kickoff & Opening Remarks
PDF
CCNxCon2012: Session 1: CCN Updates & Roadmap
PDF
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
PDF
CCNxCon2012: Session 2: DASH over CCN: A CCN Use-Case for a SocialMedia Base...
PDF
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
PDF
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
PDF
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
PDF
CCNxCon2012: Poster Session: FIB Optimizations in CCN
PDF
CCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
PDF
CCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
PDF
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
PDF
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
PDF
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
PDF
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
PDF
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
PDF
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
PDF
CCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
PDF
CCNxCon2012: Session 4: Caesar: a Content Router for High Speed Forwarding
PDF
CCNxCon2012: Session 4: OSPFN
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
CCNxCon2012: Welcome: Event Kickoff & Opening Remarks
CCNxCon2012: Session 1: CCN Updates & Roadmap
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
CCNxCon2012: Session 2: DASH over CCN: A CCN Use-Case for a SocialMedia Base...
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
CCNxCon2012: Poster Session: FIB Optimizations in CCN
CCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
CCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
CCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
CCNxCon2012: Session 4: Caesar: a Content Router for High Speed Forwarding
CCNxCon2012: Session 4: OSPFN
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Encapsulation theory and applications.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
cuic standard and advanced reporting.pdf
PDF
KodekX | Application Modernization Development
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Encapsulation theory and applications.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
cuic standard and advanced reporting.pdf
KodekX | Application Modernization Development
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
Chapter 3 Spatial Domain Image Processing.pdf
Unlocking AI with Model Context Protocol (MCP)
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Digital-Transformation-Roadmap-for-Companies.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Understanding_Digital_Forensics_Presentation.pptx

Content-Centric Networking: Security

  • 1. Content-based Security Van Jacobson Research Fellow, PARC TTI/Vanguard at PARC February 25, 2010 parc ® Palo Alto Research Center
  • 2. Content-centric Networking (CCN) is a communications architecture based on dissemination rather than conversation. (at the lowest level, you talk about named data, not to some server)
  • 3. CCN offers ... • (provably) optimal content distribution • painless mobility, wireless, virtualization, ... • same scalability & efficiency as TCP/IP • simple, secure, robust configuration • an easy, incremental, evolutionary path • much better security
  • 4. Internet security sucks and not because we’re not trying hard enough
  • 5. Files, hosts and network connections are containers for information • A secured perimeter is the only way to secure containers. • For today’s business, any realistic perimeter encloses the planet.
  • 6. Forget containers – secure the content Do it as the final production step to minimize attack surface. Ron Rivest’s SDSI has shown this works if content is augmented so any consumer can assess from the data: • Validity (is data intact and complete?) • Relevance (what question does this answer?) • Provenance (who asserts this is an answer?)
  • 7. CCN data /nytimes.com/web/frontPage.html/v3/s0/0x3fdc96a4... signature 0x1b048347 key nytimes.com/web/george/desktop public key Signed by nytimes.com/web/george Signed by nytimes.com/web Signed by nytimes.com
  • 8. Evidentiary Trust • Rich web of arises from signed content: information trustable, interconnected Content Content Content Content Content Content Content Content Content ! Content ! Content ! Content Content!! ! Key!! Key ! Key !!Key Key !Key Key Key !Key Key Key Key Key • Attacks haveand be consistent with information to links – get exponentially harder as information base grows. ! Strong security is emergent & effortless.
  • 9. Information on CCN is available at www.ccnx.org including a GPL’d open-source release of our current research prototype.