Privacy-Preserving Efficient Verifiable Deep Packet Inspection for Cloud-Assisted Middlebox

被引:30
作者
Ren, Hao [1 ,2 ]
Li, Hongwei [1 ,2 ]
Liu, Dongxiao [3 ]
Xu, Guowen [1 ]
Cheng, Nan [4 ]
Shen, Xuemin [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518066, Guangdong, Peoples R China
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[4] Xidian Univ, Sch Telecommun Engn, Xian 710071, Shanxi, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Cloud computing; middlebox; network function outsourcing; privacy-preserving; RANGE QUERY; SECURE;
D O I
10.1109/TCC.2020.2991167
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing traffic volume, enterprises choose to outsource their middlebox services, such as deep packet inspection, to the cloud to acquire rich computational and communication resources. However, since the traffic is redirected to the public cloud, information leakages, such as packet payload and inspection rules, arouse privacy concerns of both middlebox owner and packet senders. To address the concerns, we propose an efficient verifiable deep packet inspection (EV-DPI) scheme with strong privacy guarantees. Specifically, a two-layer architecture is designed and deployed over two non-collusion cloud servers. The first layer fast filters out most of legitimate packets and the second layer supports exact rule matching. During the inspection, the privacy of packet payload and the confidentiality of inspection rules are well preserved. To improve the efficiency, only fast symmetric crypto-systems, such as hash functions, are used. Moreover, the proposed scheme allows the network administrator to verify the execution results, which offers a strong control of outsourced services. To validate the performance of the proposed EV-DPI scheme, we conduct extensive experiments on the Amazon Cloud. Large-scale dataset (millions of packets) is tested to obtain the key performance metrics. The experimental results demonstrate that EV-DPI not only preserves the packet privacy, but also achieves high packet inspection efficiency.
引用
收藏
页码:1052 / 1064
页数:13
相关论文
共 46 条
[1]  
aws.amazon.com, AM CLOUD
[2]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[3]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[4]   BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic [J].
Canard, Sebastien ;
Diop, Aida ;
Kheir, Nizar ;
Paindavoine, Marie ;
Sabt, Mohamed .
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, :561-574
[5]   Leakage-Abuse Attacks Against Searchable Encryption [J].
Cash, David ;
Grubbs, Paul ;
Perry, Jason ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :668-679
[6]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[7]   Space/Aerial-Assisted Computing Offloading for IoT Applications: A Learning-Based Approach [J].
Cheng, Nan ;
Lyu, Feng ;
Quan, Wei ;
Zhou, Conghao ;
He, Hongli ;
Shi, Weisen ;
Shen, Xuemin .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2019, 37 (05) :1117-1129
[8]   SPABox: Safeguarding Privacy During Deep Packet Inspection at a MiddleBox [J].
Fan, Jingyuan ;
Guan, Chaowen ;
Ren, Kui ;
Cui, Yong ;
Qiao, Chunming .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (06) :3753-3766
[9]  
Fuhr T, 2007, LECT NOTES COMPUT SC, V4784, P228
[10]   Enabling Secure and Dynamic Deep Packet Inspection in Outsourced Middleboxes [J].
Guo, Yu ;
Wang, Cong ;
Jia, Xiaohua .
SCC'18: PROCEEDINGS OF THE 6TH INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2018, :49-55