Privacy-preserving network path validation

The end-users communicating over a network path currently have no control over the path. For a better quality of service, the source node often opts for a superior (or premium) network path to send packets to the destination node. However, the current Internet architecture provides no assurance that...

Full description

Saved in:
Bibliographic Details
Main Authors: SENGUPTA, Binanda, LI, Yingjiu, BU, Kai, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2020
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/5099
https://ink.library.smu.edu.sg/context/sis_research/article/6102/viewcontent/3372046.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-6102
record_format dspace
spelling sg-smu-ink.sis_research-61022020-04-09T06:50:55Z Privacy-preserving network path validation SENGUPTA, Binanda LI, Yingjiu BU, Kai DENG, Robert H. The end-users communicating over a network path currently have no control over the path. For a better quality of service, the source node often opts for a superior (or premium) network path to send packets to the destination node. However, the current Internet architecture provides no assurance that the packets indeed follow the designated path. Network path validation schemes address this issue and enable each node present on a network path to validate whether each packet has followed the specific path so far. In this work, we introduce two notions of privacy—path privacy and index privacy—in the context of network path validation. We show that, in case a network path validation scheme does not satisfy these two properties, the scheme is vulnerable to certain practical attacks (that affect the privacy, reliability, neutrality and quality of service offered by the underlying network). To the best of our knowledge, ours is the first work that addresses privacy issues related to network path validation. We design PrivNPV, a privacy-preserving network path validation protocol, that satisfies both path privacy and index privacy. We discuss several attacks related to network path validation and how PrivNPV defends against these attacks. Finally, we discuss the practicality of PrivNPV based on relevant parameters. 2020-02-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5099 info:doi/10.1145/3372046 https://ink.library.smu.edu.sg/context/sis_research/article/6102/viewcontent/3372046.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University index privacy Network path validation path privacy source authentication Information Security OS and Networks
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic index privacy
Network path validation
path privacy
source authentication
Information Security
OS and Networks
spellingShingle index privacy
Network path validation
path privacy
source authentication
Information Security
OS and Networks
SENGUPTA, Binanda
LI, Yingjiu
BU, Kai
DENG, Robert H.
Privacy-preserving network path validation
description The end-users communicating over a network path currently have no control over the path. For a better quality of service, the source node often opts for a superior (or premium) network path to send packets to the destination node. However, the current Internet architecture provides no assurance that the packets indeed follow the designated path. Network path validation schemes address this issue and enable each node present on a network path to validate whether each packet has followed the specific path so far. In this work, we introduce two notions of privacy—path privacy and index privacy—in the context of network path validation. We show that, in case a network path validation scheme does not satisfy these two properties, the scheme is vulnerable to certain practical attacks (that affect the privacy, reliability, neutrality and quality of service offered by the underlying network). To the best of our knowledge, ours is the first work that addresses privacy issues related to network path validation. We design PrivNPV, a privacy-preserving network path validation protocol, that satisfies both path privacy and index privacy. We discuss several attacks related to network path validation and how PrivNPV defends against these attacks. Finally, we discuss the practicality of PrivNPV based on relevant parameters.
format text
author SENGUPTA, Binanda
LI, Yingjiu
BU, Kai
DENG, Robert H.
author_facet SENGUPTA, Binanda
LI, Yingjiu
BU, Kai
DENG, Robert H.
author_sort SENGUPTA, Binanda
title Privacy-preserving network path validation
title_short Privacy-preserving network path validation
title_full Privacy-preserving network path validation
title_fullStr Privacy-preserving network path validation
title_full_unstemmed Privacy-preserving network path validation
title_sort privacy-preserving network path validation
publisher Institutional Knowledge at Singapore Management University
publishDate 2020
url https://ink.library.smu.edu.sg/sis_research/5099
https://ink.library.smu.edu.sg/context/sis_research/article/6102/viewcontent/3372046.pdf
_version_ 1770575219953500160