{"title":"A lightweight approach to authenticated Web caching","authors":"C. Blundo, S. Cimato, R. Prisco","doi":"10.1109/SAINT.2005.5","DOIUrl":null,"url":null,"abstract":"Distributed caching is increasingly used to shorten the response time of Web servers and balance the load on the network by avoiding repeated transmission of the same content. An important research issue is the provision of access control mechanisms in the cache servers in order to service only authenticated client requests. In this paper, we provide a solution based on the distribution of secure cookies, avoiding the distribution and replication of sensitive information to the cache servers. With respect to previous proposals, our solution is lightweight, since it does not rely on computational heavy security mechanisms. We analyze two scenarios for authenticated caching involving different participants and, in both cases, describe a viable caching scheme.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 2005 Symposium on Applications and the Internet","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAINT.2005.5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
Distributed caching is increasingly used to shorten the response time of Web servers and balance the load on the network by avoiding repeated transmission of the same content. An important research issue is the provision of access control mechanisms in the cache servers in order to service only authenticated client requests. In this paper, we provide a solution based on the distribution of secure cookies, avoiding the distribution and replication of sensitive information to the cache servers. With respect to previous proposals, our solution is lightweight, since it does not rely on computational heavy security mechanisms. We analyze two scenarios for authenticated caching involving different participants and, in both cases, describe a viable caching scheme.