Privacy Preserving Collaborative Enforcement of Firewall Policies in Virtual Private
#1

Privacy Preserving Collaborative Enforcement of Firewall Policies in Virtual Private Networks
Abstract
The widely deployed Virtual Private Network (VPN) technology allows roaming users to build an encrypted tunnel to a VPN
server, which henceforth allows roaming users to access some resources as if that computer were residing on their home organization’s
network. Although VPN technology is very useful, it imposes security threats on the remote network because its firewall does not know
what traffic is flowing inside the VPN tunnel. To address this issue, we propose VGuard, a framework that allows a policy owner and a
request owner to collaboratively determine whether the request satisfies the policy without the policy owner knowing the request and
the request owner knowing the policy. We first present an efficient protocol, called Xhash, for oblivious comparison, which allows two
parties, where each party has a number, to compare whether they have the same number, without disclosing their numbers to each
other. Then, we present the VGuard framework that uses Xhash as the basic building block. The basic idea of VGuard is to first convert
a firewall policy to non-overlapping numerical rules and then use Xhash to check whether a request matches a rule. Comparing with
the Cross-Domain Cooperative Firewall (CDCF) framework, which represents the state-of-the-art, VGuard is not only more secure but
also orders of magnitude more efficient. On real-life firewall policies, for processing packets, our experimental results show that VGuard
is three to four orders of magnitude faster than CDCF.
Index Terms—Virtual Private Networks, Privacy, Network Security.
1 INTRODUCTION
1.1 Background and Motivation VIRTUAL Private Network (VPN) is a widely deployed technology that allows roaming users to securely use a remote computer on the public Internet as if that computer were residing on their organization’s network, which henceforth allows roaming users to access some resources that are only accessible from their organization’s network. VPN works in the following manner. Suppose IBM sends a field representative to one of its customers, say Michigan State University (MSU). Assume that MSU’s IP addresses are in the range 1.1.0.0 ∼ 1.1.255.255 and IBM’s IP addresses are in the range 2.2.0.0 ∼ 2.2.255.255. To access resources (say a confidential customer database server with IP address 2.2.0.2) that are only accessible within IBM’s network, the IBM representative uses an MSU computer (or his laptop) with an MSU IP address (say 1.1.0.10) to establish a secure VPN tunnel to the VPN server (with IP address 2.2.0.1) in IBM’s network. Upon establishing the VPN tunnel, the IBM representative’s computer is temporarily assigned a virtual IBM IP address (say 2.2.0.25). Using the VPN tunnel, the IBM representative can access any computer on the Internet as if his computer were residing on IBM’s network with IP address 2.2.0.25. The payload of each packet inside the VPN tunnel is • Alex X. Liu and Fei Chen are with the Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, 48824. E-mail: {alexliu, feichen}[at]cse.msu.edu 1. The preliminary version of this paper titled “Collaborative Enforcement of Firewall Policies in Virtual Private Networks” was published in proceedings of the Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), pages 95-104, Canada, August 2008. another packet (to or from the newly assigned IBM IP address 2.2.0.25), which is typically encrypted. Fig. 1 illustrates an example packet that traverses from the IBM representative’s computer on MSU’s network to the customer database server in IBM’s network.


Download full report
http://googleurl?sa=t&source=web&cd=1&ve...DS2010.pdf&ei=FAI9TvmwEcmurAe4kvEX&usg=AFQjCNFmel67D0lhW1e2hT2AeT4d2s-yCg
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: hr policies of toyota company, traffic enforcement cameras ppt, student loans forgiveness for law enforcement, virtual firewall seminar, honda company hr policies, compensation policies at airtel pdfstem, jamming and anti jamming technologies for law enforcement,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Salt-and-Pepper Noise Removal by Median-type Noise Detectors and Detail-preserving seminar class 1 2,305 24-10-2012, 01:45 PM
Last Post: seminar details
  Hot Virtual Keyboard computer girl 0 623 08-06-2012, 12:40 PM
Last Post: computer girl
  Performance of 60 GHz Virtual Cellular Networks using Multiple Receiving Antennas smart paper boy 0 788 21-07-2011, 12:33 PM
Last Post: smart paper boy
  REMOTE ACCESSIBLE VIRTUAL INSTRUMENTATION CONTROL LAB smart paper boy 0 933 16-07-2011, 01:37 PM
Last Post: smart paper boy
  Home Wireless Security and Privacy: A Practical Protocol Mixing seminar class 0 1,097 06-05-2011, 02:24 PM
Last Post: seminar class
  IMPLEMENTATION OF EDGE PRESERVING TECHNIQUES FOR EFFICIENT REMOVAL OF IMPULSE NOISE seminar class 0 1,562 19-04-2011, 12:20 PM
Last Post: seminar class
  APPLAUS - Privacy Preserving Location proof Updating System seminar class 0 731 06-04-2011, 09:55 AM
Last Post: seminar class
  A VIRTUAL ELECTRONICS EXPERIMENT FOR ELECTRICAL RESONANCE STUDIES seminar surveyer 0 1,081 30-12-2010, 11:38 AM
Last Post: seminar surveyer
  Virtual switching panel seminar surveyer 0 1,121 29-12-2010, 02:39 PM
Last Post: seminar surveyer
  PROTECTION OF DATABASE SECURITY VIA COLLABORATIVE INFERENCE DETECTION computer science crazy 0 1,437 17-09-2009, 10:13 PM
Last Post: computer science crazy

Forum Jump: