4.7 Article

Privacy-Preserving Efficient Verifiable Deep Packet Inspection for Cloud-Assisted Middlebox

Journal

IEEE TRANSACTIONS ON CLOUD COMPUTING
Volume 10, Issue 2, Pages 1052-1064

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCC.2020.2991167

Keywords

Cloud computing; middlebox; network function outsourcing; privacy-preserving

Funding

  1. National Key R&D Program of China [2017YFB0802300, 2017YFB0802000]
  2. National Natural Science Foundation of China [61972454, 61802051, 61772121, 61728102, 61472065]
  3. Peng Cheng Laboratory Project of Guangdong Province [PCL2018KP004]
  4. Guangxi Key Laboratory of Cryptography and Information Security [GCIS201804]
  5. China Scholarship Council (CSC) [201706070048]

Ask authors/readers for more resources

In this paper, an efficient verifiable deep packet inspection (EV-DPI) scheme is proposed to address privacy concerns in outsourced middlebox services. The scheme utilizes a two-layer architecture with non-collusion cloud servers, preserving packet privacy and confidentiality of inspection rules. Experimental results on the Amazon Cloud demonstrate the high efficiency and strong control of the proposed EV-DPI scheme.
With the increasing traffic volume, enterprises choose to outsource their middlebox services, such as deep packet inspection, to the cloud to acquire rich computational and communication resources. However, since the traffic is redirected to the public cloud, information leakages, such as packet payload and inspection rules, arouse privacy concerns of both middlebox owner and packet senders. To address the concerns, we propose an efficient verifiable deep packet inspection (EV-DPI) scheme with strong privacy guarantees. Specifically, a two-layer architecture is designed and deployed over two non-collusion cloud servers. The first layer fast filters out most of legitimate packets and the second layer supports exact rule matching. During the inspection, the privacy of packet payload and the confidentiality of inspection rules are well preserved. To improve the efficiency, only fast symmetric crypto-systems, such as hash functions, are used. Moreover, the proposed scheme allows the network administrator to verify the execution results, which offers a strong control of outsourced services. To validate the performance of the proposed EV-DPI scheme, we conduct extensive experiments on the Amazon Cloud. Large-scale dataset (millions of packets) is tested to obtain the key performance metrics. The experimental results demonstrate that EV-DPI not only preserves the packet privacy, but also achieves high packet inspection efficiency.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available