Virtual Network Embedding across Multiple Domains with Secure Multi-Party Computation

被引:1
|
作者
Mano, Toru [1 ]
Inoue, Takeru [1 ]
Mizutani, Kimihiro [1 ]
Akashi, Osamu [1 ]
机构
[1] NTT Corp, NTT Network Innovat Labs, Yokosuka, Kanagawa 2390847, Japan
关键词
virtual network embedding; multi-domain; multi-party computation;
D O I
10.1587/transcom.E98.B.437
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network virtualization is one of the promising technologies that can increase flexibility, diversity, and manageability of networks. Building optimal virtual networks across multiple domains is getting much attention, but existing studies were based on an unrealistic assumption, that is, providers' private information can be disclosed; as is well known, providers never actually do that. In this paper, we propose a new method that solves this multi-domain problem without revealing providers' private information. Our method uses an advanced secure computation technique called multi-party computation (MPC). Although MPC enables existing unsecured methods to optimize virtual networks securely, it requires very large time to finish the optimization due to the MPC's complex distributed protocols. Our method, in contrast, is designed to involve only a small number of MPC operations to find the optimal solution, and it allows providers to execute a large part of the optimization process independently without heavy distributed protocols. Evaluation results show that our method is faster than an existing method enhanced with MPC by several orders of magnitude. We also unveil that our method has the same level of embedding cost.
引用
收藏
页码:437 / 448
页数:12
相关论文
共 50 条
  • [1] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [2] Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data
    Pathak, Rohit
    Joshi, Satyadhar
    [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 412 - +
  • [3] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [4] Experimental realization of an entanglement access network and secure multi-party computation
    X.-Y. Chang
    D.-L. Deng
    X.-X. Yuan
    P.-Y. Hou
    Y.-Y. Huang
    L.-M. Duan
    [J]. Scientific Reports, 6
  • [5] Batch Secret Sharing for Secure Multi-party Computation in Asynchronous Network
    黄征
    龚征
    李强
    [J]. Journal of Shanghai Jiaotong University(Science), 2009, 14 (01) : 112 - 116
  • [6] Survivable Virtual Network Embedding Across Multiple Domains
    Gong, Shuiqing
    Chen, Jing
    Yin, Xiaochuan
    Zhu, Qingchao
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2391 - 2396
  • [7] Batch secret sharing for secure multi-party computation in asynchronous network
    Huang Z.
    Gong Z.
    Li Q.
    [J]. Journal of Shanghai Jiaotong University (Science), 2009, 14 (1) : 112 - 116
  • [8] Experimental realization of an entanglement access network and secure multi-party computation
    Chang, X. -Y.
    Deng, D. -L.
    Yuan, X. -X.
    Hou, P. -Y.
    Huang, Y. -Y.
    Duan, L. -M.
    [J]. SCIENTIFIC REPORTS, 2016, 6
  • [9] Information theory and secure multi-party computation
    Maurer, UM
    [J]. 1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [10] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287