Detecting malicious encrypted traffic with privacy set intersection in cloud-assisted industrial internet

被引:0
|
作者
Feng, Jingyu [1 ]
Zhang, Jing [1 ]
Zhang, Wenbo [1 ]
Han, Gang [1 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
基金
中国国家自然科学基金;
关键词
Malicious encrypted traffic detection; Privacy; set intersection; Cloud-assisted industrial; internet; Privacy protection; INTRUSION DETECTION; PROTOCOL;
D O I
10.1016/j.jisa.2024.103831
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption technology provides the ability of confidential transmission to ensure the security of Industrial Internet communication, but it makes detecting malicious encrypted traffic very difficult. To resolve the conflict between the difficulty of malicious encrypted traffic detection and the requirements of traffic privacy protection, we propose a cloud-assisted Industrial Internet malicious encrypted traffic detection scheme with privacy protection. To accurately match the encrypted traffic and the detection rules, a privacy set intersection protocol based on the oblivious pseudorandom function and random garbled Bloom filter is constructed, which can detect malicious traffic without revealing data content. Meanwhile, our scheme can allow semi-trusted cloud servers to assist resource-constrained end devices to participate in private calculations. The key-homomorphic encryption is introduced to obfuscate the detection rules, making the detection rules always transparent to end users and semi-trusted cloud servers. We also design the random input verification to make the malicious end users do not have any opportunity to participate in the privacy set intersection calculation using arbitrary data. The scheme analysis and performance evaluation results show that our scheme can effectively guarantee the security of encrypted traffic detection with better detection performance and limited resource consumption.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] A Lightweight Image Cryptosystem for Cloud-Assisted Internet of Things
    Oladipupo, Esau Taiwo
    Abikoye, Oluwakemi Christiana
    Awotunde, Joseph Bamidele
    APPLIED SCIENCES-BASEL, 2024, 14 (07):
  • [32] Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things
    Ali, Mohammad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    Miao, Yinbin
    Vasilakos, Athanasios V.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65
  • [33] Privacy preserving set intersection protocol secure against malicious behaviors
    Sang, Yingpeng
    Shen, Hong
    EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 461 - 468
  • [34] CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
    Lin, Huang
    Shao, Jun
    Zhang, Chi
    Fang, Yuguang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) : 985 - 997
  • [35] Cloud-Assisted Privacy-Preserving Genetic Paternity Test
    Lei, Xiaosan
    Zhu, Xiaoyan
    Chi, Haotian
    Jiang, Shunrong
    2015 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2015,
  • [36] Cloud-Assisted Privacy-Preserving Classification for IoT Applications
    Yang, Lei
    Li, Fengjun
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [37] Cloud-assisted Road Condition Monitoring with Privacy Protection in VANETs
    Da, Lemei
    Wang, Yujue
    Ding, Yong
    Qin, Bo
    Zhou, Xiaochun
    Liang, Hai
    Wang, Huiyong
    2022 18TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN, 2022, : 304 - 311
  • [38] Privacy-Preserving TPE-Based JPEG Image Retrieval in Cloud-Assisted Internet of Things
    Ma, Yakun
    Chai, Xiuli
    Gan, Zhihua
    Zhang, Yushu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (03) : 4842 - 4856
  • [39] Security and privacy in cloud-assisted cyber-physical systems
    Alcaraz, Cristina
    Huang, Xinyi
    Rome, Erich
    COMPUTER NETWORKS, 2018, 138 : 13 - 14
  • [40] A Security Scheme for Cloud-assisted Industrial Control System
    Tu Y.-F.
    Yang G.
    Zhang C.-Z.
    Zidonghua Xuebao/Acta Automatica Sinica, 2021, 47 (02): : 432 - 441