Lingbo WEI, Xiaobing FENG, Chi ZHANG, et al. Network function outsourcing system based on prefix-preserving encryption[J]. Journal on Communications, 2018, 39(4): 159-166.
DOI:
Lingbo WEI, Xiaobing FENG, Chi ZHANG, et al. Network function outsourcing system based on prefix-preserving encryption[J]. Journal on Communications, 2018, 39(4): 159-166. DOI: 10.11959/j.issn.1000-436x.2018057.
Network function outsourcing system based on prefix-preserving encryption
Due to the problem of high cost and limited scalability of dedicated hardware middleboxes
it is popular for enterprises to outsource middleboxes as software processes to the cloud service provider.In the current network function outsourcing schemes
the cloud service provider requires the enterprise’s communication traffic and network strategy which poses a serious threat to the enterprise’s piracy.Based on prefix-preserving encryption
a privacy preserving network function outsourcing system was proposed.Compared with other similar schemes
the system not only realizes the privacy protection of communication traffic
YUAN Q , TANG H B , HUANG K Z , et al . Deployment method for vEPC virtualized network function via Q-learning [J ] . Journal on Communications , 2017 , 38 ( 8 ): 172 - 182 .
XU J , FAN J , AMMAR M H , et al . Prefix-preserving IP address anonymization:measurement-based security evaluation and a new cryptography-based scheme [C ] // 10th IEEE International Conference on Network Protocols . 2002 : 280 - 289 .
SHERRY J , HASAN S , SCOTT C , et al . Making middleboxes someone else's problem:network processing as a cloud service [J ] . ACM SIGCOMM Computer Communication Review , 2012 , 42 ( 4 ): 13 - 24 .
GIBB G , ZENG H , MCKEOWN N . Outsourcing network functionality [C ] // The First Workshop on Hot Topics in Software Defined Networks . 2012 : 73 - 78 .
KHAKPOUR A R , LIU A X . First step toward cloud-based fire-walling [C ] // 2012 IEEE 31st Sym-posium on Reliable Distributed Systems (SRDS) . 2012 : 41 - 50 .
KUREK T , NIEMIEC M , LASON A . Taking back control of privacy:a novel framework for preserving cloud-based firewall policy confidentiality [J ] . International Journal of Information Security , 2016 , 15 ( 3 ): 235 - 250 .
SHI J , ZHANG Y , ZHONG S . Privacy-preserving network functionality outsourcing [J ] . arXiv preprint,arXiv:1502.00389 , 2015 .
CORON J S , LEPOINT T , TIBOUCHI M . Practical multilinear maps over the integers [M ] // Advances in Cryptology–CRYPTO . 2013 : 476 - 493 .
CHEON J H , HAN K , LEE C , et al . Cryptanalysis of the multilinear map over the integers [M ] // Advances in Cryptology–EUROCRYPT , 2015 : 3 - 12 .
MELIS L , ASGHAR H J , DE CRISTOFARO E , et al . Private processing of outsourced network functions:feasibility and constructions [C ] // The 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization . 2016 : 39 - 44 .
SHERRY J , LAN C , POPA R A , et al . Blindbox:deep packet inspection over encrypted traffic [J ] . ACM SIGCOMM Computer Communication Review , 2015 , 45 ( 4 ): 213 - 226 .
LAN C , SHERRY J , POPA R A , et al . Embark:securely outsourcing middle-boxes to the cloud [C ] // 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16) . 2016 : 255 - 273 .
ASGHAR H J , MELIS L , SOLDANI C , et al . SplitBox:toward efficient private network function virtualization [C ] // The Workshop on Hot Topics in Middleboxes and Network Function Virtualization . 2016 : 7 - 13 .
MATT B . Introduction to computer security [M ] . Pearson Education India , 2006 .
WANG C , CHOW S S M , WANG Q , et al . Privacy-preserving public auditing for secure cloud storage [J ] . IEEE transactions on computers , 2013 , 62 ( 2 ): 362 - 375 .
DAEMEN J , RIJMEN V . The design of Rijndael:AES-the advanced encryption standard [M ] . Springer Science & Business Media , 2013 .