Middleboxes in a computer network system inspect and analyse network traffic . But encrypted traffic hinders the ability of middleboxes to perform such services . A common practice in addressing this issue is by employing a “Man-in-the-middle” approach . MitM violates end-to-end privacy guarantee, raising privacy concerns . New practical and privacy-preserving techniques for inspectionover encrypted traffic were proposed . We examine them to compare theiradvantages, limitations and challenges . We categorise them into four main categories by defining a framework that consist of system architectures, usecases, trust and threat models . These are searchable encryption, accesscontrol, machine learning and trusted hardware . We also give insights on the gaps between researchwork and industrial deployment, which leads us to the discussion on the challenges and research directions. We also provide an in-depth comparisons of their advantages and challenges. We first discuss theman an an anan-in the middle approach as a baseline, then discuss in details each of them, then provide in detail each of their objectives and provide in depth comparisons of each of those that include machine learning, access control, machinelearning and trust models. These are Searchable encryption and machine learning. We describe in details

Author(s) : Geong Sen Poh, Dinil Mon Divakaran, Hoon Wei Lim, Jianting Ning, Achintya Desai

Links : PDF - Abstract

Code :

Keywords : privacy - traffic - middleboxes - provide - network -

Leave a Reply

Your email address will not be published. Required fields are marked *