SEPIA: Security through Private Information Aggregation
نویسندگان
چکیده
This paper investigates the practical usefulness of secure multiparty computation (MPC) techniques in multi-domain network management. We design and implement privacy-preserving protocols for event correlation and aggregation of network traffic statistics, such as addition of volume metrics, computation of feature entropy, and distinct item count. To improve the performance of our protocols, we design comparison operations that are optimized for large numbers of parallel invocations. The implementation of the protocols and the basic operations are made available in a library called SEPIA. We evaluate the running times and bandwidth requirements of our protocols with actual backbone traffic traces, both on a department-wide cluster and on PlanetLab. Our results show that the proposed protocols allow processing traffic in near real-time for up to 140 participants, depending on the protocol. Compared to implementations using existing general-purpose MPC frameworks, our protocols are significantly faster. In particular, event correlation which takes 3 minutes with SEPIA, would require around 2 days using existing frameworks.
منابع مشابه
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that are practical in terms of computation and communication cost is still a major challenge. In this paper, we investigate the practical usefulness of MPC for multi-domain network security and monitoring. We first optimize...
متن کاملPractical Private Information Aggregation in Large Networks
Emerging approaches to network monitoring involve large numbers of agents collaborating to produce performance or security related statistics on huge, partial mesh networks. The aggregation process often involves security or business-critical information which network providers are generally unwilling to share without strong privacy protection. We present efficient and scalable protocols for pr...
متن کاملPrivate Information Aggregation in Large Incomplete Networks
Emerging approaches to network monitoring involve large numbers of agents collaborating to produce performance or security related statistics on huge and generally incomplete networks. The aggregation process often involves security or business-critical information which network providers are generally unwilling to share without strong privacy protection. We present efficient and scalable proto...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملSurvey: IoT Vehicular Information Network
Inter vehicular communication is a technology where vehicles act as different nodes to form a network. In a vehicular network different vehicles communicate among each other via wireless access .Authentication is very crucial security service for inter vehicular communication (IVC) in Vehicular Information Network. It is because, protecting vehicles from any attempt to cause damage (misuse) to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/0903.4258 شماره
صفحات -
تاریخ انتشار 2009