![]() ![]() On the other hand, the decentralized access control schemes allow the content provider to control the key distribution for encrypted content, but it is inefficient when they are applied in hierarchical access, and the audit of content access is ignored. On the one hand, in spite of the centralized access control schemes are proposed to improve the security of data sharing, the single point of failure issue is inevitable. Although many access control schemes are proposed to improve the security of ICN, there are still some problems unsolved. However, the in-network caching mechanism of ICN makes it hard to provide data security and privacy for content providers (CPs). The information-centric networking (ICN) has been proposed to meet the increasing demand for efficient content delivery.
0 Comments
Leave a Reply. |