Privacy-Preserving Content-Based Similarity Detection Over in-the-Cloud Middleboxes

Jing Yao, Xiangyi Meng, Yifeng Zheng, Cong Wang

Research output: Journal article publicationJournal articleAcademic researchpeer-review

Abstract

It is increasingly popular for cloud providers to offer middlebox service that supports content-based similarity detection for enterprises. However, redirecting network traffic to the cloud for such service raises security concerns. While trusted execution environments such as Intel SGX have emerged as a pragmatic solution for designing secure in-the-cloud middleboxes, it remains challenging to practically support content-based similarity detection. In this paper, we design a secure in-the-cloud middlebox system that can detect content-based similar flows in encrypted traffic dynamically. To cope with the constrained enclave memory, we adopt the caching technique and devise a compact index to increase the cache hit rate for effective similarity detection inside the enclave. We also present a parallel algorithm for performance speedup, with an efficient enclave thread management mechanism. Extensive evaluations demonstrate that the overhead of our system compared to native processing (without SGX) is limited to 2.1×. Meanwhile, our tailored design can achieve up to 14:4× better computational efficiency compared to simply moving the target functionality to the SGX enclave via existing popular library operating systems like Graphene-SGX and Occlum. Our secure system can achieve a normalized similarity detection precision of about 90%.

Original languageEnglish
Pages (from-to)1854-1870
Number of pages17
JournalIEEE Transactions on Cloud Computing
Volume11
Issue number2
DOIs
Publication statusPublished - Apr 2022

Keywords

  • Cloud computing
  • content-based similarity detection
  • middleboxes
  • privacy preservation
  • trusted hardware

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Privacy-Preserving Content-Based Similarity Detection Over in-the-Cloud Middleboxes'. Together they form a unique fingerprint.

Cite this