Privacy-Preserving Efficient Verifiable Deep Packet Inspection for Cloud-Assisted Middlebox

被引:31
作者
Ren, Hao [1 ,2 ]
Li, Hongwei [1 ,2 ]
Liu, Dongxiao [3 ]
Xu, Guowen [1 ]
Cheng, Nan [4 ]
Shen, Xuemin [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518066, Guangdong, Peoples R China
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[4] Xidian Univ, Sch Telecommun Engn, Xian 710071, Shanxi, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Cloud computing; middlebox; network function outsourcing; privacy-preserving; RANGE QUERY; SECURE;
D O I
10.1109/TCC.2020.2991167
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing traffic volume, enterprises choose to outsource their middlebox services, such as deep packet inspection, to the cloud to acquire rich computational and communication resources. However, since the traffic is redirected to the public cloud, information leakages, such as packet payload and inspection rules, arouse privacy concerns of both middlebox owner and packet senders. To address the concerns, we propose an efficient verifiable deep packet inspection (EV-DPI) scheme with strong privacy guarantees. Specifically, a two-layer architecture is designed and deployed over two non-collusion cloud servers. The first layer fast filters out most of legitimate packets and the second layer supports exact rule matching. During the inspection, the privacy of packet payload and the confidentiality of inspection rules are well preserved. To improve the efficiency, only fast symmetric crypto-systems, such as hash functions, are used. Moreover, the proposed scheme allows the network administrator to verify the execution results, which offers a strong control of outsourced services. To validate the performance of the proposed EV-DPI scheme, we conduct extensive experiments on the Amazon Cloud. Large-scale dataset (millions of packets) is tested to obtain the key performance metrics. The experimental results demonstrate that EV-DPI not only preserves the packet privacy, but also achieves high packet inspection efficiency.
引用
收藏
页码:1052 / 1064
页数:13
相关论文
共 46 条
[11]  
Guo Y, 2018, 2018 IEEE/ACM 26TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS)
[12]   Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence [J].
Hao, Meng ;
Li, Hongwei ;
Luo, Xizhao ;
Xu, Guowen ;
Yang, Haomiao ;
Liu, Sen .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (10) :6532-6542
[13]   Maximizing Throughput of Delay-Sensitive NFV-Enabled Request Admissions via Virtualized Network Function Placement [J].
Huang, Meitian ;
Liang, Weifa ;
Ma, Yu ;
Guo, Song .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) :1535-1548
[14]  
Kamara S, 2017, LECT NOTES COMPUT SC, V10212, P94, DOI [10.1007/978-3-319-56617-7-4, 10.1007/978-3-319-56617-7_4]
[15]   Designing Optimal Middlebox Recovery Schemes With Performance Guarantees [J].
Kanizo, Yossi ;
Rottenstreich, Ori ;
Segall, Itai ;
Yallouz, Jose .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (10) :2373-2383
[16]   Result Pattern Hiding Searchable Encryption for Conjunctive Queries [J].
Lai, Shangqi ;
Patranabis, Sikhar ;
Sakzad, Amin ;
Liu, Joseph K. ;
Mukhopadhyay, Debdeep ;
Steinfeld, Ron ;
Sun, Shi-Feng ;
Liu, Dongxi ;
Zuo, Cong .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :745-762
[17]  
Lan C, 2016, 13TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI '16), P255
[18]   Flexible Packet Matching with Single Double Cuckoo Hash [J].
Levy, Gil ;
Pontarelli, Salvatore ;
Reviriego, Pedro .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (06) :212-217
[19]   Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds [J].
Lewi, Kevin ;
Wu, David J. .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :1167-1178
[20]   Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds [J].
Li, Hongwei ;
Liu, Dongxiao ;
Dai, Yuanshun ;
Luan, Tom H. ;
Yu, Shui .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2018, 6 (01) :97-109