Visible to the public Private Processing of Outsourced Network Functions: Feasibility and Constructions

TitlePrivate Processing of Outsourced Network Functions: Feasibility and Constructions
Publication TypeConference Paper
Year of Publication2016
AuthorsMelis, Luca, Asghar, Hassan Jameel, De Cristofaro, Emiliano, Kaafar, Mohamed Ali
Conference NameProceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization
Date PublishedMarch 2016
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4078-6
Keywordsaudits, compositionality, Encryption, encryption audits, homomorphic encryption, Metrics, nfv privacy, peks, pubcrawl, resilience
Abstract

Aiming to reduce the cost and complexity of maintaining networking infrastructures, organizations are increasingly outsourcing their network functions (e.g., firewalls, traffic shapers and intrusion detection systems) to the cloud, and a number of industrial players have started to offer network function virtualization (NFV)-based solutions. Alas, outsourcing network functions in its current setting implies that sensitive network policies, such as firewall rules, are revealed to the cloud provider. In this paper, we investigate the use of cryptographic primitives for processing outsourced network functions, so that the provider does not learn any sensitive information. More specifically, we present a cryptographic treatment of privacy-preserving outsourcing of network functions, introducing security definitions as well as an abstract model of generic network functions, and then propose a few instantiations using partial homomorphic encryption and public-key encryption with keyword search. We include a proof-of-concept implementation of our constructions and show that network functions can be privately processed by an untrusted cloud provider in a few milliseconds.

URLhttps://dl.acm.org/doi/10.1145/2876019.2876021
DOI10.1145/2876019.2876021
Citation Keymelis_private_2016