skip to main content
10.1145/2959424.2959427acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
short-paper

Towards Securing Internet eXchange Points Against Curious onlooKers

Published:16 July 2016Publication History

ABSTRACT

The growing relevance of Internet eXchange Points (IXPs), where an increasing number of networks exchange routing information, poses fundamental questions regarding the privacy guarantees of confidential business information. To facilitate the exchange of routes among their members, IXPs provide Route Server (RS) services to dispatch the routes according to each member's export policies. Nowadays, to make use of RSes, these policies must be disclosed to the IXP. This state of affairs raises privacy concerns among network administrators and even deters some networks from subscribing to RS services. We design SIXPACK (which stands for "Securing Internet eXchange Points Against Curious onlooKers"), a RS service that leverages Secure Multi-Party Computation (SMPC) techniques to keep export policies confidential, while maintaining the same functionalities as today's RSes. We assess the effectiveness and scalability of our system by evaluating our prototype implementation and using traces of data from one of the largest IXPs in the world.

References

  1. 1.Real-Time-Statistics AMS-IX. https://ams-ix.net/technical/statistics/real-time-stats.Google ScholarGoogle Scholar
  2. 2.B. Ager, N. Chatzis, A. Feldmann, N. Sarrar, S. Uhlig, and W. Willinger. Anatomy of a Large European IXP. In SIGCOMM'12, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.D. Demmler, T. Schneider, and M. Zohner. ABY – A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In NDSS'15.Google ScholarGoogle Scholar
  4. 4.O. Goldreich, S. Micali, and A. Wigderson. How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. In STOC'87. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.A. Gupta, R. MacDavid, R. Birkner, M. Canini, N. Feamster, J. Rexford, and L. Vanbever†. An Industrial-Scale Software Defined Internet Exchange Point. In NSDI'16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.D. Gupta, A. Segal, A. Panda, G. Segev, M. Schapira, J. Feigenbaum, J. Rexford, and S. Shenker. A new approach to interdomain routing based on secure multi-party computation. In HotNets'12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian. Delayed Internet Routing Convergence. In SIGCOMM'00. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.S. Machiraju and R. H. Katz. Reconciling Cooperation with Confidentiality in Multi-Provider Distributed Systems. Technical report, EECS Department, University of California, Berkeley, Aug 2004.Google ScholarGoogle Scholar
  9. 9.Z. M. Mao, R. Bush, T. Griffin, and M. Roughan. BGP Beacons. In IMC'03. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.P. Richter, G. Smaragdakis, A. Feldmann, N. Chatzis, J. Boettger, and W. Willinger. Peering at Peerings: On the Role of IXP Route Servers. In IMC'14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.A. C. Yao. How to Generate and Exchange Secrets. In FOCS'86. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards Securing Internet eXchange Points Against Curious onlooKers

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ANRW '16: Proceedings of the 2016 Applied Networking Research Workshop
        July 2016
        93 pages
        ISBN:9781450344432
        DOI:10.1145/2959424

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 July 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        ANRW '16 Paper Acceptance Rate18of30submissions,60%Overall Acceptance Rate34of58submissions,59%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader