BIT-TRAPS: Building Information-Theoretic Traffic Privacy Into Packet Streams

被引:10
|
作者
Mathur, Suhas [1 ]
Trappe, Wade [1 ]
机构
[1] Rutgers State Univ, Dept Elect & Comp Engn, Wireless Informat & Networking Lab WINLAB, N Brunswick, NJ 08902 USA
关键词
Computer networks; data privacy; information security; mutual information;
D O I
10.1109/TIFS.2011.2138696
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sniffing encrypted data packets traveling across networks can often be useful in inferring nontrivial information about their contents because of the manner in which the transmission of such packets is handled by lower layers in the communications protocol stack. In this paper, we formally study the side-channel formed by variable packet sizes, and explore obfuscation approaches to prevent information leakage while jointly considering the practical cost of obfuscation. We show that randomized algorithms for obfuscation perform best and can be studied as well-known information-theoretic constructs, such as discrete channels with and without memory. We envision a separate layer called a, that employs buffering and bit-padding as orthogonal methods for obfuscating such side channels. For streams of packets, we introduce the use of mutual-information rate as an appropriate metric for the level of obfuscation that captures nonlinear relationships between original and modified streams. Using buffering-delay and average bit-padding as the respective costs, a formulates a constrained optimization problem with bounds on the average costs, to implement the best possible obfuscation policy. We find that combining small amounts of delay and padding together can create much more obfuscation than either approach alone, and that a simple convex trade-off exists between buffering delay and padding for a given level of obfuscation.
引用
收藏
页码:752 / 762
页数:11
相关论文
共 50 条
  • [1] Notes on Information-Theoretic Privacy
    Asoodeh, Shahab
    Alajaji, Fady
    Linder, Tamas
    2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 1272 - 1278
  • [2] Information-Theoretic Privacy Watchdogs
    Hsu, Hsiang
    Asoodeh, Shahab
    Calmon, Flavio P.
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 552 - 556
  • [3] Information-Theoretic Approaches to Differential Privacy
    Unsal, Ayse
    Onen, Melek
    ACM COMPUTING SURVEYS, 2024, 56 (03)
  • [4] Pufferfish Privacy: An Information-Theoretic Study
    Nuradha, Theshani
    Goldfeld, Ziv
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (11) : 7336 - 7356
  • [5] The soccer game, bit by bit: An information-theoretic analysis
    Pereira, Luis Ramada
    Lopes, Rui J.
    Louca, Jorge
    Araujo, Duarte
    Ramos, Joao
    CHAOS SOLITONS & FRACTALS, 2021, 152 (152)
  • [6] Information-theoretic privacy in federated submodel learning
    Kim, Minchul
    Lee, Jungwoo
    ICT EXPRESS, 2023, 9 (03): : 415 - 419
  • [7] On the Robustness of Information-Theoretic Privacy Measures and Mechanisms
    Diaz, Mario
    Wang, Hao
    Calmon, Flavio P.
    Sankar, Lalitha
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (04) : 1949 - 1978
  • [8] Information-theoretic approaches to privacy in estimation and control
    Nekouei, Ehsan
    Tanaka, Takashi
    Skoglund, Mikael
    Johansson, Karl H.
    ANNUAL REVIEWS IN CONTROL, 2019, 47 : 412 - 422
  • [9] On Properties and Optimization of Information-theoretic Privacy Watchdog
    Sadeghi, Parastoo
    Ding, Ni
    Rakotoarivelo, Thierry
    2020 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,
  • [10] An information-theoretic approach to traffic matrix estimation
    Zhang, Y
    Roughan, M
    Lund, C
    Donoho, D
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2003, 33 (04) : 301 - 312