Polymorphic Encryption and Pseudonymisation of IP Network Flows

11/06/2019
by   Abraham Westerbaan, et al.
0

We describe a system, PEP3, for storage and retrieval of IP flow information in which the IP addresses are replaced by pseudonyms. Every eligible party gets its own set of pseudonyms. A single entity, the transcryptor, that is composed of five independent peers, is responsible for the generation of, depseudonymisation of, and translation between different sets of pseudonyms. These operations can be performed by any three of the five peers, preventing a single point of trust or failure. Using homomorphic aspects of ElGamal encryption the peers perform their operations on encrypted and –potentially– pseudonymised IP addresses only, thereby never learning the (pseudonymised) IP addresses handled by the parties. Moreover, using Schnorr type proofs, the behaviour of the peers can be verified, without revealing the (pseudonymised) IP addresses either. Hence the peers are central, but need not be fully trusted. The design of our system, while easily modified to other settings, is tuned to the sheer volume of data presented by IP flow information.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/01/2021

IP-based Subject Access Requests Denied

Understanding the legal status of IP addresses is complex. In Europe, th...
research
06/19/2023

Cyber Key Terrain Identification Using Adjusted PageRank Centrality

The cyber terrain contains devices, network services, cyber personas, an...
research
11/01/2019

Assessing the Privacy Benefits of Domain Name Encryption

As Internet users have become more savvy about the potential for their I...
research
03/12/2018

Hardware Trojan Detection through Information Flow Security Verification

Semiconductor design houses are increasingly becoming dependent on third...
research
02/16/2021

Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting

Domain name encryptions (DoTH and ESNI) have been proposed to improve se...
research
11/29/2021

Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing

System-on-chip (SoC) developers increasingly rely on pre-verified hardwa...
research
08/09/2021

Efficient algorithms for collecting the statistics of large-scale IP address data

Compiling the statistics of large-scale IP address data is an essential ...

Please sign up or login with your details

Forgot password? Click here to reset