Privacy-preserving network path validation
The end-users communicating over a network path currently have no control over the path. For a better quality of service, the source node often opts for a superior (or premium) network path to send packets to the destination node. However, the current Internet architecture provides no assurance that...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2020
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/5099 https://ink.library.smu.edu.sg/context/sis_research/article/6102/viewcontent/3372046.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-6102 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-61022020-04-09T06:50:55Z Privacy-preserving network path validation SENGUPTA, Binanda LI, Yingjiu BU, Kai DENG, Robert H. The end-users communicating over a network path currently have no control over the path. For a better quality of service, the source node often opts for a superior (or premium) network path to send packets to the destination node. However, the current Internet architecture provides no assurance that the packets indeed follow the designated path. Network path validation schemes address this issue and enable each node present on a network path to validate whether each packet has followed the specific path so far. In this work, we introduce two notions of privacy—path privacy and index privacy—in the context of network path validation. We show that, in case a network path validation scheme does not satisfy these two properties, the scheme is vulnerable to certain practical attacks (that affect the privacy, reliability, neutrality and quality of service offered by the underlying network). To the best of our knowledge, ours is the first work that addresses privacy issues related to network path validation. We design PrivNPV, a privacy-preserving network path validation protocol, that satisfies both path privacy and index privacy. We discuss several attacks related to network path validation and how PrivNPV defends against these attacks. Finally, we discuss the practicality of PrivNPV based on relevant parameters. 2020-02-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5099 info:doi/10.1145/3372046 https://ink.library.smu.edu.sg/context/sis_research/article/6102/viewcontent/3372046.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University index privacy Network path validation path privacy source authentication Information Security OS and Networks |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
index privacy Network path validation path privacy source authentication Information Security OS and Networks |
spellingShingle |
index privacy Network path validation path privacy source authentication Information Security OS and Networks SENGUPTA, Binanda LI, Yingjiu BU, Kai DENG, Robert H. Privacy-preserving network path validation |
description |
The end-users communicating over a network path currently have no control over the path. For a better quality of service, the source node often opts for a superior (or premium) network path to send packets to the destination node. However, the current Internet architecture provides no assurance that the packets indeed follow the designated path. Network path validation schemes address this issue and enable each node present on a network path to validate whether each packet has followed the specific path so far. In this work, we introduce two notions of privacy—path privacy and index privacy—in the context of network path validation. We show that, in case a network path validation scheme does not satisfy these two properties, the scheme is vulnerable to certain practical attacks (that affect the privacy, reliability, neutrality and quality of service offered by the underlying network). To the best of our knowledge, ours is the first work that addresses privacy issues related to network path validation. We design PrivNPV, a privacy-preserving network path validation protocol, that satisfies both path privacy and index privacy. We discuss several attacks related to network path validation and how PrivNPV defends against these attacks. Finally, we discuss the practicality of PrivNPV based on relevant parameters. |
format |
text |
author |
SENGUPTA, Binanda LI, Yingjiu BU, Kai DENG, Robert H. |
author_facet |
SENGUPTA, Binanda LI, Yingjiu BU, Kai DENG, Robert H. |
author_sort |
SENGUPTA, Binanda |
title |
Privacy-preserving network path validation |
title_short |
Privacy-preserving network path validation |
title_full |
Privacy-preserving network path validation |
title_fullStr |
Privacy-preserving network path validation |
title_full_unstemmed |
Privacy-preserving network path validation |
title_sort |
privacy-preserving network path validation |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2020 |
url |
https://ink.library.smu.edu.sg/sis_research/5099 https://ink.library.smu.edu.sg/context/sis_research/article/6102/viewcontent/3372046.pdf |
_version_ |
1770575219953500160 |