Light at the middle of the tunnel: middleboxes for selective disclosure of network monitoring to distrusted parties

作者: Nik Sultana , Markulf Kohlweiss , Andrew W. Moore

DOI: 10.1145/2940147.2940151

关键词:

摘要: Network monitoring is vital to the administration and operation of networks, but it requires privileged access that only highly trusted parties are granted. This severely limits opportunity for external parties, such as service or equipment providers, auditors, even clients, measure health a network in which they stakeholders, do not have its internal structure.In this position paper we propose use middleboxes open up using privacy-preserving technology. will allow distrusted make more inferences about state than currently possible, without learning any precise information data crosses it.Thus be transparent who empowered verify claims made by operators. operators able provide their compromising security privacy.

参考文章(27)
David M. Eyers, Peter Pietzuch, Matteo Migliavacca, Brian Shand, Jean Bacon, David Evans, Enforcing end-to-end application security in the cloud (big ideas paper) acm ifip usenix international conference on middleware. pp. 293- 312 ,(2010) , 10.5555/2023718.2023739
Jean Bacon, David Evans, David M. Eyers, Matteo Migliavacca, Peter Pietzuch, Brian Shand, Enforcing End-to-End Application Security in the Cloud international middleware conference. pp. 293- 312 ,(2010) , 10.1007/978-3-642-16955-7_15
Craig Costello, Cedric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur, Geppetto: Versatile Verifiable Computation 2015 IEEE Symposium on Security and Privacy. pp. 253- 270 ,(2015) , 10.1109/SP.2015.23
Michael Backes, Manuel Barbosa, Dario Fiore, Raphael M. Reischuk, ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data 2015 IEEE Symposium on Security and Privacy. pp. 271- 286 ,(2015) , 10.1109/SP.2015.24
Seyed Kaveh Fayazbakhsh, Michael K. Reiter, Vyas Sekar, Verifiable network function outsourcing: requirements, challenges, and roadmap workshop on hot topics in middleboxes and network function virtualization. pp. 25- 30 ,(2013) , 10.1145/2535828.2535831
Yupeng Zhang, Charalampos Papamanthou, Jonathan Katz, ALITHEIA: Towards Practical Verifiable Graph Processing computer and communications security. pp. 856- 867 ,(2014) , 10.1145/2660267.2660354
Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, Margo Seltzer, Andy Hopper, A primer on provenance Communications of The ACM. ,vol. 57, pp. 52- 60 ,(2014) , 10.1145/2596628
Bruce Schneier, John Kelsey, Secure audit logs to support computer forensics ACM Transactions on Information and System Security. ,vol. 2, pp. 159- 176 ,(1999) , 10.1145/317087.317089
Alfredo Rial, George Danezis, Privacy-preserving smart metering Proceedings of the 10th annual ACM workshop on Privacy in the electronic society - WPES '11. pp. 49- 60 ,(2011) , 10.1145/2046556.2046564
Jad Naous, Michael Walfish, Antonio Nicolosi, David Mazières, Michael Miller, Arun Seehra, Verifying and enforcing network paths with icing Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies on - CoNEXT '11. pp. 30- ,(2011) , 10.1145/2079296.2079326