Vol. 20, No. 2, February 28, 2026
10.3837/tiis.2026.02.019,
Download Paper (Free):
Abstract
Named data networking (NDN) is the leading information-centric networking (ICN) architecture in academic research. It has emerged as a promising foundation for modern systems, including Internet of Things (IoT) platforms, cloud infrastructures, and large-scale distributed environments. This is due to its support for features such as in-network caching and content-centric data retrieval. However, NDN still faces major security challenges, particularly the lack of fine-grained access control and persistent privacy risks associated with sensitive data. This work addresses these weaknesses by introducing a comprehensive security framework grounded in zero trust access control (ZTAC) principles and specifically tailored for NDN-based healthcare environments. Building on the core ZTAC pillars: (a) continuous verification, (b) micro-segmentation, (c) least-privilege access, and (d) privacy protection, we propose a novel access control scheme. The proposed scheme relies on two incorporated techniques: (a) attribute-based access control (ABAC), and (b) proxy re-encryption (PRE), which enables dynamic, policy-driven authorization while securely delegating decryption rights only to eligible users. The proposed solution reduces round-trip time by up to 78.8% compared to existing approaches while maintaining strong scalability across large network sizes, high traffic loads, and growing content volumes. It preserves more than 94% accuracy in both access success and denial rates under heavy load. It improves inference resistance by over 13.5% compared to the baseline NDN, demonstrating strong privacy protection and robust performance. Overall, this framework delivers an efficient, secure, scalable, and privacy-preserving foundation for modern healthcare systems built on NDN.
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Cite this article
[IEEE Style]
F. S. Alshahrani, B. A. Alzahrani, M. S. Ramzan, "Zero Trust Access Control Framework for NDN-based Healthcare Systems Using Attribute-based Access Control and Proxy Re-Encryption," KSII Transactions on Internet and Information Systems, vol. 20, no. 2, pp. 1037-1065, 2026. DOI: 10.3837/tiis.2026.02.019.
[ACM Style]
Fatimah Saif Alshahrani, Bander A. Alzahrani, and Muhammad Sher Ramzan. 2026. Zero Trust Access Control Framework for NDN-based Healthcare Systems Using Attribute-based Access Control and Proxy Re-Encryption. KSII Transactions on Internet and Information Systems, 20, 2, (2026), 1037-1065. DOI: 10.3837/tiis.2026.02.019.
[BibTeX Style]
@article{tiis:105906, title="Zero Trust Access Control Framework for NDN-based Healthcare Systems Using Attribute-based Access Control and Proxy Re-Encryption", author="Fatimah Saif Alshahrani and Bander A. Alzahrani and Muhammad Sher Ramzan and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2026.02.019}, volume={20}, number={2}, year="2026", month={February}, pages={1037-1065}}