4.7 Article

Privacy-Preserving Efficient Verifiable Deep Packet Inspection for Cloud-Assisted Middlebox

期刊

IEEE TRANSACTIONS ON CLOUD COMPUTING
卷 10, 期 2, 页码 1052-1064

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCC.2020.2991167

关键词

Cloud computing; middlebox; network function outsourcing; privacy-preserving

资金

  1. National Key R&D Program of China [2017YFB0802300, 2017YFB0802000]
  2. National Natural Science Foundation of China [61972454, 61802051, 61772121, 61728102, 61472065]
  3. Peng Cheng Laboratory Project of Guangdong Province [PCL2018KP004]
  4. Guangxi Key Laboratory of Cryptography and Information Security [GCIS201804]
  5. China Scholarship Council (CSC) [201706070048]

向作者/读者索取更多资源

In this paper, an efficient verifiable deep packet inspection (EV-DPI) scheme is proposed to address privacy concerns in outsourced middlebox services. The scheme utilizes a two-layer architecture with non-collusion cloud servers, preserving packet privacy and confidentiality of inspection rules. Experimental results on the Amazon Cloud demonstrate the high efficiency and strong control of the proposed EV-DPI scheme.
With the increasing traffic volume, enterprises choose to outsource their middlebox services, such as deep packet inspection, to the cloud to acquire rich computational and communication resources. However, since the traffic is redirected to the public cloud, information leakages, such as packet payload and inspection rules, arouse privacy concerns of both middlebox owner and packet senders. To address the concerns, we propose an efficient verifiable deep packet inspection (EV-DPI) scheme with strong privacy guarantees. Specifically, a two-layer architecture is designed and deployed over two non-collusion cloud servers. The first layer fast filters out most of legitimate packets and the second layer supports exact rule matching. During the inspection, the privacy of packet payload and the confidentiality of inspection rules are well preserved. To improve the efficiency, only fast symmetric crypto-systems, such as hash functions, are used. Moreover, the proposed scheme allows the network administrator to verify the execution results, which offers a strong control of outsourced services. To validate the performance of the proposed EV-DPI scheme, we conduct extensive experiments on the Amazon Cloud. Large-scale dataset (millions of packets) is tested to obtain the key performance metrics. The experimental results demonstrate that EV-DPI not only preserves the packet privacy, but also achieves high packet inspection efficiency.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据