Title :
On the optimization of key revocation schemes for network telemetry data distribution
Author :
Gopularam, Bhanu Prakash ; Nalini, N.
Author_Institution :
Nitte Meenakshi Inst. of Technol., Oracle India Private Ltd., Bangalore, India
Abstract :
Consider a cloud deployment where the organizational network pertaining to a tenant having routers, switches sharing network telemetry data on regular basis. Among different ways of managing networks flow-based network monitoring is most sought after approach because of accuracy and economies of scale. In the event of host compromise the device credentials are revoked thereby disabling its ability to read future communications. Broadcast Encryption techniques having strong key revocation mechanism can be used in this context. Waters et. al [?] is one the broadcast encryption schemes which facilitate efficient sharing using small size keys and the related Attribute-Based Encryption scheme uses dual encryption technique and is capable of handling non-monotonous access structure again with small keys. In this paper we experiment with broadcast encryption and attribute based encryotion schemes with real-time network telemetry data and provide detailed analysis of performace. Though the original scheme provides smaller keys, few changes to the algorithm improves the performance and efficiency and makes it acceptable for large scale usage. We found the optimized scheme is 20% more performant than inital scheme.
Keywords :
IP networks; cloud computing; computer network management; computer network performance evaluation; computer network security; cryptography; data privacy; private key cryptography; telecommunication network routing; telecommunication traffic; attribute-based encryption scheme; broadcast encryption schemes; cloud deployment; device credential revocation; dual-encryption technique; efficiency improvement; key revocation scheme optimization; network telemetry data distribution; networks flow-based network monitoring management; nonmonotonous access structure handling; organizational network; performance improvement; routers; small-size key sharing; switches; Encryption; Libraries; Measurement; Optimization; Telemetry; Attribute Based Encryption; Broadcast Encryption; Key Revocation; Log privacy;
Conference_Titel :
Advance Computing Conference (IACC), 2015 IEEE International
Conference_Location :
Banglore
Print_ISBN :
978-1-4799-8046-8
DOI :
10.1109/IADCC.2015.7154765