Privacy-preserving Network Functionality Outsourcing

نویسندگان

  • Junjie Shi
  • Yuan Zhang
  • Sheng Zhong
چکیده

—Since the advent of software defined networks (SDN), there have been many attempts to outsource the complex and costly local network functionality, i.e. the middlebox, to the cloud in the same way as outsourcing computation and storage. The privacy issues, however, may thwart the enterprises' willingness to adopt this innovation since the underlying configurations of these middleboxes may leak crucial and confidential information which can be utilized by attackers. To address this new problem, we use firewall as an sample functionality and propose the first privacy preserving outsourcing framework and schemes in SDN. The basic technique that we exploit is a groundbreaking tool in cryptography, the cryptographic multilinear map. In contrast to the infeasibility in efficiency if a naive approach is adopted, we devise practical schemes that can outsource the middlebox as a blackbox after obfuscating it such that the cloud provider can efficiently perform the same functionality without knowing its underlying private configurations. Both theoretical analysis and experiments on real-world firewall rules demonstrate that our schemes are secure, accurate, and practical. I. INTRODUCTION Although network functionalities play an important role in enterprise network to make it robust, fast, and secure, they often burden a company with great hardware financial pressure and management complexity. Network middleboxes, such as firewalls and intrusion detection systems (IDS), are the customized appliances to implement these sophisticated functionalities, and they are also often hard to deploy and upgrade. A recent survey [1] reveals that the investments in network infrastructures deployment of these middleboxes as well as in the personnel cost of managing and maintaining them are substantial. The emergence of SDN helps us separate the logic control from the basic traffic processing, so we can relieve some of the above " pain points " to a certain extent by taking the advantage of SDN [2]–[5]. But though the management of networks can be simplified by SDN, it still has many shortcomings. For instance, because these functionalities are still implemented within the enterprise network, the hardware cost and the everyday maintenance cost are still there. Thus, to further reduce the cost and complexity faced by local networks, some SDN researchers have attempted to outsource these network functionalities or middleboxes out to cloud providers, in the same way that the computation and storage services have been successfully outsourced [1], [6]. After migrating middleboxes to cloud, the local enterprises will

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

Privacy-Preserving Computation - (Position Paper)

Private data is commonly revealed to the party performing the computation on it. This poses a problem, particularly when outsourcing storage and computation, e.g., to the cloud. In this paper we present a review of security mechanisms and a research agenda for privacypreserving computation. We begin by reviewing current application scenarios where computation faces privacy requirements. We then...

متن کامل

CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud

Biometric identification has been incredibly useful in the law enforcement to authenticate an individual’s identity and/or to figure out who someone is, typically by scanning a database of records for a close enough match. In this work, we investigate the privacy-preserving biometric identification outsourcing problem, where the database owner outsources both the large-scale encrypted database ...

متن کامل

Enabling for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud

In this paper, we propose a upper-bound privacy leakage constraint based approach to identify which intermediate datasets need to be encrypted and which do not, so that privacy preserving cost can be saved while the privacy requirements of data holders can still be satisfied. To identify and encrypt all functionally encrypt able data, sensitive data that can be encrypted without limiting the fu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1502.00389  شماره 

صفحات  -

تاریخ انتشار 2015