SlideShare une entreprise Scribd logo
1  sur  9
Content-based Security
          Van Jacobson
      Research Fellow, PARC

      TTI/Vanguard at PARC
        February 25, 2010



                              parc                ®




                              Palo Alto Research Center
Content-centric Networking (CCN)
 is a communications architecture
       based on dissemination
      rather than conversation.


  (at the lowest level, you talk about
   named data, not to some server)
CCN offers ...
• (provably) optimal content distribution
• painless mobility, wireless, virtualization, ...
• same scalability & efficiency as TCP/IP
• simple, secure, robust configuration
• an easy, incremental, evolutionary path
• much better security
Internet security sucks


 and not because we’re not trying hard enough
Files, hosts and
network connections are
containers for information

• A secured perimeter is the only way to
  secure containers.

• For today’s business, any realistic perimeter
  encloses the planet.
Forget containers –
     secure the content
Do it as the final production step to minimize
attack surface.

Ron Rivest’s SDSI has shown this works if content
is augmented so any consumer can assess
from the data:

 • Validity (is data intact and complete?)
 • Relevance (what question does this answer?)
 • Provenance (who asserts this is an answer?)
CCN data
/nytimes.com/web/frontPage.html/v3/s0/0x3fdc96a4...

                     signature
                  0x1b048347         key



           nytimes.com/web/george/desktop public key


             Signed by   nytimes.com/web/george

                 Signed by nytimes.com/web

                     Signed by nytimes.com
Evidentiary Trust
• Rich web of arises from signed content:
  information
              trustable, interconnected

        Content
        Content                Content
                              Content
                             Content
         Content
         Content             Content
          Content
           !                Content
            !
           Content
             !             Content
                           Content!!
                                  !
          Key!!
          Key !
           Key                  !!Key
                                 Key
                               !Key
            Key
             Key              !Key
                              Key
               Key           Key
                            Key

• Attacks haveand be consistent with
  information
               to
                  links – get exponentially
  harder as information base grows.

! Strong security is emergent & effortless.
Information on CCN is available at
         www.ccnx.org
including a GPL’d open-source release
  of our current research prototype.

Contenu connexe

Similaire à Content-Centric Networking: Security

Web 2 0 Utilizing New Web Toolsv.508[1]
Web 2 0 Utilizing New Web Toolsv.508[1]Web 2 0 Utilizing New Web Toolsv.508[1]
Web 2 0 Utilizing New Web Toolsv.508[1]
Michael D. Gilley
 
AICPA Leadership Retreat - Technology
AICPA Leadership Retreat - TechnologyAICPA Leadership Retreat - Technology
AICPA Leadership Retreat - Technology
ASAE
 
Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...
Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...
Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...
Future Cities Project
 

Similaire à Content-Centric Networking: Security (20)

Signiant Overview Fall 2010
Signiant Overview Fall 2010Signiant Overview Fall 2010
Signiant Overview Fall 2010
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
Collecting user-data-socially-responsibly
Collecting user-data-socially-responsiblyCollecting user-data-socially-responsibly
Collecting user-data-socially-responsibly
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Dockercon USA 2016 - Immutable Awesomeness
Dockercon USA 2016 - Immutable Awesomeness Dockercon USA 2016 - Immutable Awesomeness
Dockercon USA 2016 - Immutable Awesomeness
 
Immutable Awesomeness by John Willis and Josh Corman
Immutable Awesomeness by John Willis and Josh CormanImmutable Awesomeness by John Willis and Josh Corman
Immutable Awesomeness by John Willis and Josh Corman
 
Cloud content security vs innovation 2012_0821
Cloud content security vs innovation 2012_0821Cloud content security vs innovation 2012_0821
Cloud content security vs innovation 2012_0821
 
Information Development World 2015 - Exhibit Video Loop
Information Development World 2015 - Exhibit Video LoopInformation Development World 2015 - Exhibit Video Loop
Information Development World 2015 - Exhibit Video Loop
 
WP for IDW video loop
WP for IDW video loopWP for IDW video loop
WP for IDW video loop
 
Web 2 0 Utilizing New Web Toolsv.508[1]
Web 2 0 Utilizing New Web Toolsv.508[1]Web 2 0 Utilizing New Web Toolsv.508[1]
Web 2 0 Utilizing New Web Toolsv.508[1]
 
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
 
AICPA Leadership Retreat - Technology
AICPA Leadership Retreat - TechnologyAICPA Leadership Retreat - Technology
AICPA Leadership Retreat - Technology
 
Four Kitchens Presents: Future of the CMS
Four Kitchens Presents: Future of the CMSFour Kitchens Presents: Future of the CMS
Four Kitchens Presents: Future of the CMS
 
Re-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxRe-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptx
 
ekey+ Presentation
ekey+ Presentationekey+ Presentation
ekey+ Presentation
 
MongoDB, ANTS, and the IC
MongoDB, ANTS, and the ICMongoDB, ANTS, and the IC
MongoDB, ANTS, and the IC
 
Cks Brochure 10.31.11
Cks Brochure 10.31.11Cks Brochure 10.31.11
Cks Brochure 10.31.11
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
 
Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...
Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...
Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...
 

Plus de PARC, a Xerox company

Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
PARC, a Xerox company
 

Plus de PARC, a Xerox company (20)

Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
 
CCNxCon2012: Welcome: Event Kickoff & Opening Remarks
CCNxCon2012: Welcome: Event Kickoff & Opening RemarksCCNxCon2012: Welcome: Event Kickoff & Opening Remarks
CCNxCon2012: Welcome: Event Kickoff & Opening Remarks
 
CCNxCon2012: Session 1: CCN Updates & Roadmap
CCNxCon2012: Session 1: CCN Updates &  RoadmapCCNxCon2012: Session 1: CCN Updates &  Roadmap
CCNxCon2012: Session 1: CCN Updates & Roadmap
 
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
 
CCNxCon2012: Session 2: DASH over CCN: A CCN Use-Case for a SocialMedia Base...
CCNxCon2012: Session 2: DASH over CCN:  A CCN Use-Case for a SocialMedia Base...CCNxCon2012: Session 2: DASH over CCN:  A CCN Use-Case for a SocialMedia Base...
CCNxCon2012: Session 2: DASH over CCN: A CCN Use-Case for a SocialMedia Base...
 
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
 
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCNCCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
 
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
 
CCNxCon2012: Poster Session: FIB Optimizations in CCN
CCNxCon2012: Poster Session: FIB Optimizations in CCNCCNxCon2012: Poster Session: FIB Optimizations in CCN
CCNxCon2012: Poster Session: FIB Optimizations in CCN
 
CCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
CCNxCon2012: Poster Session: Cache Coordination in a HierarchicalCCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
CCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
 
CCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
CCNxCon2012: Poster Session: Live Streaming with Content Centric NetworkingCCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
CCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
 
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
 
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
 
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
 
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
 
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issuesCCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
 
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R NetworksCCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
 
CCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
CCNxCon2012: Session 3: Juxtaposition of CCN and PepysCCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
CCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
 
CCNxCon2012: Session 4: Caesar: a Content Router for High Speed Forwarding
CCNxCon2012: Session 4: Caesar:  a Content Router for High Speed ForwardingCCNxCon2012: Session 4: Caesar:  a Content Router for High Speed Forwarding
CCNxCon2012: Session 4: Caesar: a Content Router for High Speed Forwarding
 
CCNxCon2012: Session 4: OSPFN
CCNxCon2012: Session 4: OSPFNCCNxCon2012: Session 4: OSPFN
CCNxCon2012: Session 4: OSPFN
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

Content-Centric Networking: Security

  • 1. Content-based Security Van Jacobson Research Fellow, PARC TTI/Vanguard at PARC February 25, 2010 parc ® Palo Alto Research Center
  • 2. Content-centric Networking (CCN) is a communications architecture based on dissemination rather than conversation. (at the lowest level, you talk about named data, not to some server)
  • 3. CCN offers ... • (provably) optimal content distribution • painless mobility, wireless, virtualization, ... • same scalability & efficiency as TCP/IP • simple, secure, robust configuration • an easy, incremental, evolutionary path • much better security
  • 4. Internet security sucks and not because we’re not trying hard enough
  • 5. Files, hosts and network connections are containers for information • A secured perimeter is the only way to secure containers. • For today’s business, any realistic perimeter encloses the planet.
  • 6. Forget containers – secure the content Do it as the final production step to minimize attack surface. Ron Rivest’s SDSI has shown this works if content is augmented so any consumer can assess from the data: • Validity (is data intact and complete?) • Relevance (what question does this answer?) • Provenance (who asserts this is an answer?)
  • 7. CCN data /nytimes.com/web/frontPage.html/v3/s0/0x3fdc96a4... signature 0x1b048347 key nytimes.com/web/george/desktop public key Signed by nytimes.com/web/george Signed by nytimes.com/web Signed by nytimes.com
  • 8. Evidentiary Trust • Rich web of arises from signed content: information trustable, interconnected Content Content Content Content Content Content Content Content Content ! Content ! Content ! Content Content!! ! Key!! Key ! Key !!Key Key !Key Key Key !Key Key Key Key Key • Attacks haveand be consistent with information to links – get exponentially harder as information base grows. ! Strong security is emergent & effortless.
  • 9. Information on CCN is available at www.ccnx.org including a GPL’d open-source release of our current research prototype.