skip to main content
10.1145/3201595.3201601acmconferencesArticle/Chapter ViewAbstractPublication PagessccConference Proceedingsconference-collections
research-article

Enabling Secure and Dynamic Deep Packet Inspection in Outsourced Middleboxes

Authors Info & Claims
Published:23 May 2018Publication History

ABSTRACT

Outsourced middlebox services have been a natural trend in modern enterprise networks to handle advanced traffic processing such as deep packet inspection, traffic classification, and load balancing. However, traffic redirection to outsourced middleboxes raises new security and privacy concerns, as this service model gives cloud providers full access to all the enterprise's traffic flows and proprietary middlebox rules. To ease these concerns, recent efforts are made to design secure middlebox services that can directly function over encrypted traffic and middlebox rules. But security concerns from dynamic network functions like stateful deep packet inspection and firewall rule updates are still not yet fully addressed. In this paper, we first propose a practical system architecture for outsourced middleboxes to perform dynamic deep packet inspection with forward and backward privacy. That is, newly added rules cannot be linked to previous inspection results, and deleted rules remain inaccessible to the server. Several recent papers have shown that it is a strong property that makes adaptive attacks less effective. Furthermore, we provide a generic solution that handles stateful inspection while still ensuring the state privacy protection. Rigorous analysis and prototype evaluations demonstrate the security, efficiency, and effectiveness of the design.

References

  1. H. Asghar, L. Melis, C. Soldani, E. Cristofaro, M. Kaafar, and L. Mathy. Splitbox: Toward efficient private network function virtualization. In Proc. of ACM HotMiddlebox, 2016. Google ScholarGoogle ScholarCross RefCross Ref
  2. R. Bost, B. Minaud, and O. Ohrimenko. Forward and backward private searchable encryption from constrained cryptographic primitives. In Proc. of ACM CCS, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Cash, P. Grubbs, J. Perry, and T. Ristenpart. Leakage-abuse attacks against searchable encryption. In Proc. of ACM CCS, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner. Dynamic searchable encryption in very large databases: Data structures and implementation. In Proc. of NDSS, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  5. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. In Proc. of ACM CCS, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Etemad, A. Küpccü, C. Papamanthou, and D. Evans. Efficient dynamic searchable encryption with forward privacy. In Proc. of PETS, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  7. Y. Guo, C. Wang, X. Yuan, and X. Jia. Enabling privacy-preserving header matching for outsourced middleboxes. In Proc. of IWQoS, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  8. Y. Ishai, E. Kushilevitz, S. Lu, and R. Ostrovsky. Private large-scale databases with distributed searchable symmetric encryption. In Proc. of CT-RSA, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Islam, M. Kuzu, and M. Kantarcioglu. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Proc. of NDSS, 2012.Google ScholarGoogle Scholar
  10. D. Joseph and I. Stoica. Modeling middleboxes. Netwrk. Mag. of Global Internetwkg., 22(5):20--25, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Juniper Networks. Firewall filters feature guide for ex9200 switches. Online at https://www.juniper.net/, 2016.Google ScholarGoogle Scholar
  12. S. Kamara, C. Papamanthou, and T. Roeder. Dynamic searchable symmetric encryption. In Proc. of ACM CCS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. R. Khakpour and A. X. Liu. First step toward cloud-based firewalling. In Proc. of IEEE SRDS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. K. Kurosawa and Y. Ohtaki. Uc-secure searchable symmetric encryption. In Financial Cryptography and Data Security, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  15. C. Lan, J. Sherry, R. A. Popa, S. Ratnasamy, and Z. Liu. Embark: Securely outsourcing middleboxes to the cloud. In Proc. of NSDI, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. Melis, H. Asghar, E. Cristofaro, and M. Kaafar. Private processing of outsourced network functions: Feasibility and constructions. In Proc. of ACM Int'l Workshop on Security in SDN & NFV, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Naveed, S. Kamara, and C. V. Wright. Inference attacks on property-preserving encrypted databases. In Proc. of ACM CCS, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Northcutt, L. Zeltser, S. Winters, K. Kent, and R. W. Ritchey. Inside Network Perimeter Security. Sams, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy, and V. Sekar. Making middleboxes someone else's problem: network processing as a cloud service. In Proc. of ACM SIGCOMM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. Sherry, C. Lan, R. A. Popa, and S. Ratnasamy. Blindbox: Deep packet inspection for encrypted traffic. In Proc. of ACM SIGCOMM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Shi, Y. Zhang, and S. Zhong. Privacy-preserving network functionality outsourcing. arXiv preprint arXiv:1502.00389, 2015.Google ScholarGoogle Scholar
  22. M.-W. Shih, M. Kumar, T. Kim, and A. Gavrilovska. S-NFV: Securing NFV states by using SGX. In Proc. of ACM Int'l Workshop on Security in SDN & NFV, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. D. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In Proc. of IEEE S&P, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. E. Stefanov, C. Papamanthou, and E. Shi. Practical dynamic searchable symmetric encryption with small leakage. In Proc. of NDSS, 2014.Google ScholarGoogle Scholar
  25. C. Wang, X. Yuan, Y. Cui, and K. Ren. Toward secure outsourced middlebox services: Practices, challenges, and beyond. IEEE Network, 32(1):166--171, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  26. X. Yuan, H. Duan, and C. Wang. Bringing execution assurances of pattern matching in outsourced middleboxes. In Proc. of IEEE ICNP, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  27. X. Yuan, Y. Guo, X. Wang, C. Wang, B. Li, and X. Jia. Enckv: An encrypted key-value store with rich queries. In Proc. of ACM AsiaCCS, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. X. Yuan, X. Wang, J. Lin, and C. Wang. Privacy-preserving deep packet inspection in outsourced middleboxes. In Proc. of IEEE INFOCOM, 2016.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Enabling Secure and Dynamic Deep Packet Inspection in Outsourced Middleboxes

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SCC '18: Proceedings of the 6th International Workshop on Security in Cloud Computing
        May 2018
        71 pages
        ISBN:9781450357593
        DOI:10.1145/3201595

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 23 May 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SCC '18 Paper Acceptance Rate6of17submissions,35%Overall Acceptance Rate64of159submissions,40%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader