Visible to the public Privacy-preserving Network Provenance

TitlePrivacy-preserving Network Provenance
Publication TypeJournal Article
Year of Publication2017
AuthorsZhang, Yuankai, O'Neill, Adam, Sherr, Micah, Zhou, Wenchao
JournalProc. VLDB Endow.
Volume10
Pagination1550–1561
ISSN2150-8097
Keywordscomposability, pubcrawl, Resiliency, Searchable encryption
AbstractNetwork accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Network provenance significantly aids network administrators in these tasks by explaining system behavior and revealing the dependencies between system states. Although resourceful, network provenance can sometimes be too rich, revealing potentially sensitive information that was involved in system execution. In this paper, we propose a cryptographic approach to preserve the confidentiality of provenance (sub)graphs while allowing users to query and access the parts of the graph for which they are authorized. Our proposed solution is a novel application of searchable symmetric encryption (SSE) and more generally structured encryption (SE). Our SE-enabled provenance system allows a node to enforce access control policies over its provenance data even after the data has been shipped to remote nodes (e.g., for optimization purposes). We present a prototype of our design and demonstrate its practicality, scalability, and efficiency for both provenance maintenance and querying.
URLhttps://doi.org/10.14778/3137628.3137661
DOI10.14778/3137628.3137661
Citation Keyzhang_privacy-preserving_2017