SlideShare a Scribd company logo
Content-based Security
          Van Jacobson
      Research Fellow, PARC

      TTI/Vanguard at PARC
        February 25, 2010



                              parc                ®




                              Palo Alto Research Center
Content-centric Networking (CCN)
 is a communications architecture
       based on dissemination
      rather than conversation.


  (at the lowest level, you talk about
   named data, not to some server)
CCN offers ...
• (provably) optimal content distribution
• painless mobility, wireless, virtualization, ...
• same scalability & efficiency as TCP/IP
• simple, secure, robust configuration
• an easy, incremental, evolutionary path
• much better security
Internet security sucks


 and not because we’re not trying hard enough
Files, hosts and
network connections are
containers for information

• A secured perimeter is the only way to
  secure containers.

• For today’s business, any realistic perimeter
  encloses the planet.
Forget containers –
     secure the content
Do it as the final production step to minimize
attack surface.

Ron Rivest’s SDSI has shown this works if content
is augmented so any consumer can assess
from the data:

 • Validity (is data intact and complete?)
 • Relevance (what question does this answer?)
 • Provenance (who asserts this is an answer?)
CCN data
/nytimes.com/web/frontPage.html/v3/s0/0x3fdc96a4...

                     signature
                  0x1b048347         key



           nytimes.com/web/george/desktop public key


             Signed by   nytimes.com/web/george

                 Signed by nytimes.com/web

                     Signed by nytimes.com
Evidentiary Trust
• Rich web of arises from signed content:
  information
              trustable, interconnected

        Content
        Content                Content
                              Content
                             Content
         Content
         Content             Content
          Content
           !                Content
            !
           Content
             !             Content
                           Content!!
                                  !
          Key!!
          Key !
           Key                  !!Key
                                 Key
                               !Key
            Key
             Key              !Key
                              Key
               Key           Key
                            Key

• Attacks haveand be consistent with
  information
               to
                  links – get exponentially
  harder as information base grows.

! Strong security is emergent & effortless.
Information on CCN is available at
         www.ccnx.org
including a GPL’d open-source release
  of our current research prototype.

More Related Content

Similar to Content-Centric Networking: Security (20)

PDF
Cisco 2013 Annual Security Report
Kim Jensen
 
PDF
2600 v23 n4 (winter 2006)
Felipe Prado
 
PPT
Network security and protocols
Online
 
PDF
Security Aspects of the Information Centric Networks Model
CSCJournals
 
PDF
Information-centric networking and relaton to legal and regulatory issues
SAIL
 
PDF
2600 v24 n1 (spring 2007)
Felipe Prado
 
PDF
CNNIC Update, by Jessica Shen [APNIC 38 / NIR SIG]
APNIC
 
PDF
internet architecture.pdf
qhawengcongo
 
PDF
IoT.pdf
qhawengcongo
 
PDF
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
mancueaqlama
 
PDF
Security issues in content centric networks-review2
anushreerocks
 
PDF
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
igsbkofv9061
 
PDF
Communications Technologies
Sarah Jimenez
 
PDF
Network security
nageshkanna13
 
PDF
Study and analysis of mobility, security, and caching issues in CCN
IJECEIAES
 
PDF
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
svoulfpytx9252
 
PDF
ClubHack Magazine issue 26 March 2012
ClubHack
 
PPTX
March cybersecurity powerpoint
Courtney King
 
PDF
Networking Essay Example
Write My Thesis Paper Thornton
 
DOCX
Network security
Madhumithah Ilango
 
Cisco 2013 Annual Security Report
Kim Jensen
 
2600 v23 n4 (winter 2006)
Felipe Prado
 
Network security and protocols
Online
 
Security Aspects of the Information Centric Networks Model
CSCJournals
 
Information-centric networking and relaton to legal and regulatory issues
SAIL
 
2600 v24 n1 (spring 2007)
Felipe Prado
 
CNNIC Update, by Jessica Shen [APNIC 38 / NIR SIG]
APNIC
 
internet architecture.pdf
qhawengcongo
 
IoT.pdf
qhawengcongo
 
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
mancueaqlama
 
Security issues in content centric networks-review2
anushreerocks
 
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
igsbkofv9061
 
Communications Technologies
Sarah Jimenez
 
Network security
nageshkanna13
 
Study and analysis of mobility, security, and caching issues in CCN
IJECEIAES
 
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
svoulfpytx9252
 
ClubHack Magazine issue 26 March 2012
ClubHack
 
March cybersecurity powerpoint
Courtney King
 
Networking Essay Example
Write My Thesis Paper Thornton
 
Network security
Madhumithah Ilango
 

More from PARC, a Xerox company (20)

PPTX
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
PARC, a Xerox company
 
PDF
CCNxCon2012: Welcome: Event Kickoff & Opening Remarks
PARC, a Xerox company
 
PDF
CCNxCon2012: Session 1: CCN Updates & Roadmap
PARC, a Xerox company
 
PDF
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
PARC, a Xerox company
 
PDF
CCNxCon2012: Session 2: DASH over CCN: A CCN Use-Case for a SocialMedia Base...
PARC, a Xerox company
 
PDF
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
PARC, a Xerox company
 
PDF
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
PARC, a Xerox company
 
PDF
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
PARC, a Xerox company
 
PDF
CCNxCon2012: Poster Session: FIB Optimizations in CCN
PARC, a Xerox company
 
PDF
CCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
PARC, a Xerox company
 
PDF
CCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
PARC, a Xerox company
 
PDF
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
PARC, a Xerox company
 
PDF
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
PARC, a Xerox company
 
PDF
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
PARC, a Xerox company
 
PDF
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
PARC, a Xerox company
 
PDF
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
PARC, a Xerox company
 
PDF
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
PARC, a Xerox company
 
PDF
CCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
PARC, a Xerox company
 
PDF
CCNxCon2012: Session 4: Caesar: a Content Router for High Speed Forwarding
PARC, a Xerox company
 
PDF
CCNxCon2012: Session 4: OSPFN
PARC, a Xerox company
 
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
PARC, a Xerox company
 
CCNxCon2012: Welcome: Event Kickoff & Opening Remarks
PARC, a Xerox company
 
CCNxCon2012: Session 1: CCN Updates & Roadmap
PARC, a Xerox company
 
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
PARC, a Xerox company
 
CCNxCon2012: Session 2: DASH over CCN: A CCN Use-Case for a SocialMedia Base...
PARC, a Xerox company
 
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
PARC, a Xerox company
 
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
PARC, a Xerox company
 
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
PARC, a Xerox company
 
CCNxCon2012: Poster Session: FIB Optimizations in CCN
PARC, a Xerox company
 
CCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
PARC, a Xerox company
 
CCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
PARC, a Xerox company
 
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
PARC, a Xerox company
 
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
PARC, a Xerox company
 
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
PARC, a Xerox company
 
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
PARC, a Xerox company
 
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
PARC, a Xerox company
 
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
PARC, a Xerox company
 
CCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
PARC, a Xerox company
 
CCNxCon2012: Session 4: Caesar: a Content Router for High Speed Forwarding
PARC, a Xerox company
 
CCNxCon2012: Session 4: OSPFN
PARC, a Xerox company
 
Ad

Recently uploaded (20)

PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PPTX
Q2 Leading a Tableau User Group - Onboarding
lward7
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
July Patch Tuesday
Ivanti
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
Q2 Leading a Tableau User Group - Onboarding
lward7
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
Ad

Content-Centric Networking: Security

  • 1. Content-based Security Van Jacobson Research Fellow, PARC TTI/Vanguard at PARC February 25, 2010 parc ® Palo Alto Research Center
  • 2. Content-centric Networking (CCN) is a communications architecture based on dissemination rather than conversation. (at the lowest level, you talk about named data, not to some server)
  • 3. CCN offers ... • (provably) optimal content distribution • painless mobility, wireless, virtualization, ... • same scalability & efficiency as TCP/IP • simple, secure, robust configuration • an easy, incremental, evolutionary path • much better security
  • 4. Internet security sucks and not because we’re not trying hard enough
  • 5. Files, hosts and network connections are containers for information • A secured perimeter is the only way to secure containers. • For today’s business, any realistic perimeter encloses the planet.
  • 6. Forget containers – secure the content Do it as the final production step to minimize attack surface. Ron Rivest’s SDSI has shown this works if content is augmented so any consumer can assess from the data: • Validity (is data intact and complete?) • Relevance (what question does this answer?) • Provenance (who asserts this is an answer?)
  • 7. CCN data /nytimes.com/web/frontPage.html/v3/s0/0x3fdc96a4... signature 0x1b048347 key nytimes.com/web/george/desktop public key Signed by nytimes.com/web/george Signed by nytimes.com/web Signed by nytimes.com
  • 8. Evidentiary Trust • Rich web of arises from signed content: information trustable, interconnected Content Content Content Content Content Content Content Content Content ! Content ! Content ! Content Content!! ! Key!! Key ! Key !!Key Key !Key Key Key !Key Key Key Key Key • Attacks haveand be consistent with information to links – get exponentially harder as information base grows. ! Strong security is emergent & effortless.
  • 9. Information on CCN is available at www.ccnx.org including a GPL’d open-source release of our current research prototype.