PRI: Privacy Preserving Inspection of Encrypted Network Traffic

被引:7
|
作者
Schiff, Liron [1 ]
Schmid, Stefan [2 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
[2] Aalborg Univ, Aalborg, Denmark
关键词
D O I
10.1109/SPW.2016.34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traffic inspection is a fundamental building block of many security solutions today. For example, to prevent the leakage or exfiltration of confidential insider information, as well as to block malicious traffic from entering the network, most enterprises today operate intrusion detection and prevention systems that inspect traffic. However, the state-of-theart inspection systems do not reflect well the interests of the different involved autonomous roles. For example, employees in an enterprise, or a company outsourcing its network management to a specialized third party, may require that their traffic remains confidential, even from the system administrator. Moreover, the rules used by the intrusion detection system, or more generally the configuration of an online or offline anomaly detection engine, may be provided by a third party, e.g., a security research firm, and can hence constitute a critical business asset which should be kept confidential. Today, it is often believed that accounting for these additional requirements is impossible, as they contradict efficiency and effectiveness. We in this paper explore a novel approach, called Privacy Preserving Inspection (PRI), which provides a solution to this problem, by preserving privacy of traffic inspection and confidentiality of inspection rules and configurations, and e.g., also supports the flexible installation of additional Data Leak Prevention (DLP) rules specific to the company.
引用
收藏
页码:296 / 303
页数:8
相关论文
共 50 条
  • [31] Homomorphic CNN for Privacy Preserving Learning On Encrypted Sensor Data
    Liao, Zhiyong
    Luo, Junren
    Gao, Wei
    Zhang, Yu
    Zhang, Wanpeng
    [J]. 2019 CHINESE AUTOMATION CONGRESS (CAC2019), 2019, : 5593 - 5598
  • [32] A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs
    Abdel-Rahman, Adam Oumar
    Levillain, Olivier
    Totel, Eric
    [J]. RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2023, 2023, 14529 : 185 - 199
  • [33] Encrypted Semantic Communication Using Adversarial Training for Privacy Preserving
    Luo, Xinlai
    Chen, Zhiyong
    Tao, Meixia
    Yang, Feng
    [J]. IEEE COMMUNICATIONS LETTERS, 2023, 27 (06) : 1486 - 1490
  • [34] Transparent hashing in the encrypted domain for privacy preserving image retrieval
    Kannan Karthik
    Sachin Kashyap
    [J]. Signal, Image and Video Processing, 2013, 7 : 647 - 664
  • [35] Privacy Preserving LBP Based Feature Extraction on Encrypted Images
    Sultana, Sayyada Fahmeeda
    Shubhangi, D. C.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,
  • [36] Transparent hashing in the encrypted domain for privacy preserving image retrieval
    Karthik, Kannan
    Kashyap, Sachin
    [J]. SIGNAL IMAGE AND VIDEO PROCESSING, 2013, 7 (04) : 647 - 664
  • [37] Approaches and challenges of privacy preserving search over encrypted data
    Kumar, D. V. N. Siva
    Thilagam, P. Santhi
    [J]. INFORMATION SYSTEMS, 2019, 81 : 63 - 81
  • [38] A Privacy Preserving Jaccard Similarity Function for Mining Encrypted Data
    Singh, Meena Dilip
    Krishna, P. Radha
    Saxena, Ashutosh
    [J]. TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 502 - +
  • [39] A privacy preserving scheme for encrypted medical images using RDH
    Agarwal, Ruchi
    Kumar, Manoj
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (3-4) : 436 - 452
  • [40] Privacy Preserving Keyword Search over Encrypted Cloud Data
    Ananthi, S.
    Sendil, M. Sadish
    Karthik, S.
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 480 - 487