STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Completeness theorems for non-cryptographic fault-tolerant distributed computation
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Software protection and simulation on oblivious RAMs
Journal of the ACM (JACM)
Communications of the ACM
Distributed Algorithms
Cisco OSPF Command and Configuration Handbook
Cisco OSPF Command and Configuration Handbook
Universally Composable Security: A New Paradigm for Cryptographic Protocols
FOCS '01 Proceedings of the 42nd IEEE symposium on Foundations of Computer Science
Measuring ISP topologies with rocketfuel
IEEE/ACM Transactions on Networking (TON)
Foundations of Cryptography: Volume 2, Basic Applications
Foundations of Cryptography: Volume 2, Basic Applications
Achieving sub-second IGP convergence in large IP networks
ACM SIGCOMM Computer Communication Review
How to lease the internet in your spare time
ACM SIGCOMM Computer Communication Review
Privacy preserving error resilient dna searching through oblivious automata
Proceedings of the 14th ACM conference on Computer and communications security
OpenFlow: enabling innovation in campus networks
ACM SIGCOMM Computer Communication Review
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Analyzing and Modeling Router---Level Internet Topology
Information Networking. Towards Ubiquitous Networking and Services
CoreLab: an emerging network testbed employing hosted virtual machine monitor
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Accountability in hosted virtual networks
Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures
Network virtualization: state of the art and research challenges
IEEE Communications Magazine
Privacy-Preserving graph algorithms in the semi-honest model
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Secure two-party context free language recognition
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
Traffic engineering with traditional IP routing protocols
IEEE Communications Magazine
BGP routing policies in ISP networks
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Although the virtual collocation of service providers (SPs) on top of infrastructure providers (InPs) via network virtualization brings various benefits, we posit that operational confidentiality has not been considered in this network model. We extend and apply the Secure Multiparty Computation (SMC) protocol to solving Minimum Disclosure Routing (MDR), namely, enabling an SP to route packets without disclosing routing information to InPs. We implement the proposed MDR protocol and evaluate its performance via experiments by comparing it against the prediction based on our analytical performance model. Our study reveals that MDR can be securely achieved with marginal latency overhead with regard to the convergence time in well-engineered nonsecure routing algorithms. Our study sheds light on the path for network virtualization to be used to resolve the challenges for the ISPs of today.