Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries

被引:3
作者
Sancho, Jorge [1 ]
Garcia, Jose [1 ]
Alesanco, Alvaro [1 ]
机构
[1] Univ Zaragoza, Aragon Inst Engn Res I3A, Zaragoza 50009, Spain
关键词
FRAMEWORK;
D O I
10.1155/2020/8856379
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we introduce the system boundary security vs. privacy dilemma, where border devices (e.g., firewall devices) require unencrypted data inspection to prevent data exfiltration or unauthorized data accesses, but unencrypted data inspection violates data privacy. To shortcut this problem, we present Oblivious Inspection, a novel approach based on garbled circuits to perform a stateful application-aware inspection of encrypted network traffic in a privacy-preserving way. We also showcase an inspection algorithm for Fast Healthcare Interoperability Resources (FHIR) standard compliant packets along with its performance results. The results point out the importance of the inspection function being aligned with the underlying garbled circuit protocol. In this line, mandatory encryption algorithms for TLS 1.3 have been analysed observing that packets encrypted using Chacha20 can be filtered up to 17 and 25 times faster compared with AES128-GCM and AES256-GCM, respectively. All together, this approach penalizes performance to align system security and data privacy, but it could be appropriate for those scenarios where this performance degradation can be justified by the sensibility of the involved data such as healthcare scenarios.
引用
收藏
页数:9
相关论文
共 18 条
[1]  
Asghar H. J., 2016, P 2016 WORKSH HOT TP, P7
[2]   Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis [J].
Enaizan, Odai ;
Zaidan, A. A. ;
Alwi, N. H. M. ;
Zaidan, B. B. ;
Alsalem, M. A. ;
Albahri, O. S. ;
Albahri, A. S. .
HEALTH AND TECHNOLOGY, 2020, 10 (03) :795-822
[3]  
Evans D., 2018, Foundations and Trends in Privacy and Security, V2, P70
[4]   Secure Function Evaluation Using an FPGA Overlay Architecture [J].
Fang, Xin ;
Ioannidis, Stratis ;
Leeser, Miriam .
FPGA'17: PROCEEDINGS OF THE 2017 ACM/SIGDA INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE GATE ARRAYS, 2017, :257-266
[5]   Validation of the Apple Watch for Heart Rate Variability Measurements during Relax and Mental Stress in Healthy Subjects [J].
Hernando, David ;
Roca, Surya ;
Sancho, Jorge ;
Alesanco, Alvaro ;
Bailon, Raquel .
SENSORS, 2018, 18 (08)
[6]   Conceptual framework for the security of mobile health applications on Android platform [J].
Hussain, Muzammil ;
Zaidan, A. A. ;
Zidan, B. B. ;
Iqbal, S. ;
Ahmed, M. M. ;
Albahri, O. S. ;
Albahri, A. S. .
TELEMATICS AND INFORMATICS, 2018, 35 (05) :1335-1354
[7]  
Lan C, 2016, 13TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI '16), P255
[8]  
Lu RX, 2012, IEEE INFOCOM SER, P1395, DOI 10.1109/INFCOM.2012.6195504
[9]  
Sancho J., 2019, P MED C MED BIOL ENG, P855
[10]   PRI: Privacy Preserving Inspection of Encrypted Network Traffic [J].
Schiff, Liron ;
Schmid, Stefan .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, :296-303