期刊文献+

基于前缀保持加密的网络功能外包系统 被引量:1

Network function outsourcing system based on prefix-preserving encryption
在线阅读 下载PDF
导出
摘要 基于硬件中间盒实现的网络功能成本高且可扩展性差等问题,越来越多的企业用户将网络功能的实现外包给云服务商。现有的网络功能外包方案要求用户对云服商公开通信流量和网络功能策略,暴露了用户内网的私密信息。基于轻量级的前缀保持加密方案,提出一种保护隐私的网络功能外包系统。与现有同类方案相比,该系统不仅为企业用户同时实现了通信流量与网络功能策略的隐私保护,而且具有更高的吞吐量和更低的时延。 Due to the problem of high cost and limited scalability of dedicated hardware middleboxes,it is popular for enterprises to outsource middleboxes as software processes to the cloud service provider.In the current network function outsourcing schemes,the cloud service provider requires the enterprise’s communication traffic and network strategy which poses a serious threat to the enterprise’s piracy.Based on prefix-preserving encryption,a privacy preserving network function outsourcing system was proposed.Compared with other similar schemes,the system not only realizes the privacy protection of communication traffic,but also has higher throughput and lower delay.
作者 魏凌波 冯晓兵 张驰 盛化龙 俞能海 WEI Lingbo;FENG Xiaobing;ZHANG Chi;SHENG Hualong;YU Nenghai(CAS Key Laboratory of Electromagnetic Space Information,School of Information Science and Technology,University of Science and Technology of China,Hefei 230026,China;State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China)
出处 《通信学报》 EI CSCD 北大核心 2018年第4期159-166,共8页 Journal on Communications
基金 国家重点研发计划基金资助项目(No.2017YFB0802200) 国家自然科学基金资助项目(No.61702474)~~
关键词 网络功能外包 云计算 前缀保持加密 隐私保护 network function outsourcing cloud computing prefix-preserving encryption privacy preserving
作者简介 魏凌波(1979-),女,陕西周至人,博士,中国科学技术大学副研究员,主要研究方向为应用密码学。;冯晓兵(1992-),女,山东聊城人,中国科学技术大学硕士生,主要研究方向为网络安全。;通信作者:张驰,chizhang@ustc.edu.cn。男,湖北武汉人,博士,中国科学技术大学副教授,主要研究方向为无线网络与网络安全。;盛化龙(1991-),男,安徽阜阳人,中国科学技术大学硕士生,主要研究方向为网络安全。;俞能海(1964-),男,安徽无为人,中国科学技术大学教授,主要研究方向为多媒体数据处理与分析、数字内容安全。
  • 相关文献

参考文献2

二级参考文献17

  • 1李伟男,鄂跃鹏,葛敬国,钱华林.多模式匹配算法及硬件实现[J].软件学报,2006,17(12):2403-2415. 被引量:42
  • 2Aho AV, Corasick MJ. Efficient string matching: An aid to bibliographic search. Communications of the ACM, 1975,18(6): 333-340. [doi: 10.1145/360825.360855].
  • 3Li WN, E YP, Ge JG, Qian HL. Multi-Pattern matching algorithms and hardware based implementation. Journal of Software, 2006, 17(12):2403-2415 (in Chinese with English abstract), http://www.j os.org.cn/1000-9825/17/2403.htm [doi: 10.1360/j os 172403 ].
  • 4Hopcroft JE, Motwani R, Ullman JD. Introduction to Automata Theory, Languages, and Computation. 3rd ed., Reading: Addison Wesley, 2006.
  • 5Hopcroft J. An O(n log n) algorithm for minimizing states in a finite automaton. Technical Report, STAN-CS-TR-71-190, Stanford: Stanford University, 1971.
  • 6Yu F, Chen ZF, Diao YL, Lakshman TV, Katz RH. Fast and memory-efficient regular expression matching for deep packet inspection. In: Bhuyan LN, Dubois M, Eatherton W, eds. Proe. of the 2006 ACM/IEEE Symp. on Architecture for Networking and Communications Systems. New York: ACM, 2006.93-102. [doi: 10.1145/1185347.1185360].
  • 7AbuHmed T, Mohaisen A, Nyang D. A survey on deep packet inspection for intrusion detection systems. Magazine of Korea Telecommunication Society, 2007,24(11):25-36.
  • 8BrodieBC, Cytron RK, Taylor DE. A scalable architecture for high-throughput regular-expression pattern matching. In: Kaeli D, ed. Proc. of the 33rd Int'l Symp. on Computer Architecture. New York: ACM, 2006. 191-202. [doi: 10.1109/ISCA.2006.7].
  • 9Becchi M, Crowley P. An improved algorithm to accelerate regular expression evaluation. In: Yavatkar R, Grunwald D, Ramakrishnan KK, eds. Proc. of the 2007 ACM/IEEE Symp. on Architecture for Networking and Communications Systems. New York: Association for Computing Machinery, 2007. 145-154. [doi: 10.1145/1323548.1323573].
  • 10Kumar S, Dharmapurikar S, Yu F, Crowley P, Turner J. Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In: Rizzo L, Anderson T, McKeown N, eds. Proc. of the 2006 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York: Association for Computing Machinery, 2006. 339-350. [doi: 10.1145/1159913.1159952].

共引文献28

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部