Collaborative Network Outage Troubleshooting with Secure Multiparty Computation

被引:5
|
作者
Djatmiko, Mentari [1 ]
Schatzmann, Dominik [2 ]
Dimitropoulos, Xenofontas [2 ]
Friedman, Arik
Boreli, Roksana [1 ]
机构
[1] Univ New S Wales, Sydney, NSW 2052, Australia
[2] Swiss Fed Inst Technol, Zurich, Switzerland
基金
澳大利亚研究理事会;
关键词
D O I
10.1109/MCOM.2013.6658656
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Troubleshooting network outages is a complex and time-consuming process. Network administrators are typically overwhelmed with large volumes of monitoring data, like SMTP and NetFlow measurements, from which it is very hard to separate between actionable and non-actionable events. In addition, they can only debug network problems using very basic tools, like ping and traceroute. In this context, intelligent correlation of measurements from different Internet locations is essential for analyzing the root cause of outages. However, correlating measurements across domains raises privacy concerns and hence is largely avoided. A possible solution to the privacy barrier is secure multi-party computation (MPC), that is, a set of cryptographic methods that enable a number of parties to aggregate private data without revealing sensitive information. In this article, we propose a distributed mechanism based on MPC for privacy-preserving correlation of NetFlow measurements from multiple ISPs, which helps in the diagnosis of network outages. We first outline an MPC protocol that can be used to analyze the scope (local, global, or semi-global) and severity of network outages across multiple ISPs. Then we use NetFlow data from a medium-sized ISP to evaluate the performance of our protocol. Our findings indicate that correlating data from several dozens of ISPs is feasible in near real time, with a delay of just a few seconds. This demonstrates the scalability and potential for real-world deployment of MPC-based schemes. Finally, as a case study we demonstrate how our scheme helped analyze, from multiple domains, the impact that Hurricane Sandy had on Internet connectivity in terms of scope and severity.
引用
收藏
页码:78 / 84
页数:7
相关论文
共 50 条
  • [21] Secure Multiparty Computation Goes Live
    Bogetoft, Peter
    Christensen, Dan Lund
    Damgard, Ivan
    Geisler, Martin
    Jakobsen, Thomas
    Kroigaard, Mikkel
    Nielsen, Janus Dam
    Nielsen, Jesper Buns
    Nielsen, Jurt
    Pagter, Jakob
    Schwartzbach, Michael
    Toft, Tomas
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 325 - +
  • [22] Secure Multiparty Computation with Sublinear Preprocessing
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    Nof, Ariel
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 427 - 457
  • [23] Secure multiparty computation of a comparison problem
    Liu, Xin
    Li, Shundong
    Liu, Jian
    Chen, Xiubo
    Xu, Gang
    [J]. SPRINGERPLUS, 2016, 5
  • [24] Secure Multiparty Computation from SGX
    Bahmani, Raad
    Barbosa, Manuel
    Brasser, Ferdinand
    Portela, Bernardo
    Sadeghi, Ahmad-Reza
    Scerri, Guillaume
    Warinschi, Bogdan
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017, 2017, 10322 : 477 - 497
  • [25] On the Message Complexity of Secure Multiparty Computation
    Ishai, Yuval
    Mittal, Manika
    Ostrovsky, Rafail
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 698 - 711
  • [26] Secure multiparty computation for comparator networks
    Morohashi, Gembu
    Chida, Koji
    Hirota, Keiichi
    Kikuchi, Hiroaki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (09) : 2349 - 2355
  • [27] Efficient Secure Multiparty Subset Computation
    Zhou, Sufang
    Li, Shundong
    Dou, Jiawei
    Geng, Yaling
    Liu, Xin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [28] Secure multiparty computation of approximations - (Extended abstract)
    Feigenbaum, J
    Ishai, Y
    Malkin, T
    Nissim, K
    Strauss, MJ
    Wright, RN
    [J]. AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 927 - 938
  • [29] Multiparty Computation: To Secure Privacy, Do the Math
    [J]. Queue, 2023, 21 (06): : 78 - 100
  • [30] Efficient Maliciously Secure Multiparty Computation for RAM
    Keller, Marcel
    Yanai, Avishay
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 91 - 124