Sashank Dara, Bhanu Prakash Gopularam, V. Muralidhara, N. Nalini
{"title":"Experimental Evaluation of Network Telemetry Anonymization for Cloud Based Security Analysis","authors":"Sashank Dara, Bhanu Prakash Gopularam, V. Muralidhara, N. Nalini","doi":"10.1109/CCEM.2015.10","DOIUrl":null,"url":null,"abstract":"Network telemetry data is considered a gold mine for researchers for performing traffic analysis, QoS, security forensics, malware spread etc. Cloud Consumers could benefit from variety of Cloud based security services if such telemetry data is made available. But there is a compelling need for ensuring privacy of sensitive fields before data is shared with any Cloud provider. In this paper we provide thorough experimental evaluation of data anonymization techniques. We explore the viability of onion layered encryption techniques for practical security forensics on anonymized data. We provide results of such experiments and our analysis of the same. Our major observation is that onion layered techniques do not scale for more advanced analytic use cases.","PeriodicalId":339923,"journal":{"name":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCEM.2015.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Network telemetry data is considered a gold mine for researchers for performing traffic analysis, QoS, security forensics, malware spread etc. Cloud Consumers could benefit from variety of Cloud based security services if such telemetry data is made available. But there is a compelling need for ensuring privacy of sensitive fields before data is shared with any Cloud provider. In this paper we provide thorough experimental evaluation of data anonymization techniques. We explore the viability of onion layered encryption techniques for practical security forensics on anonymized data. We provide results of such experiments and our analysis of the same. Our major observation is that onion layered techniques do not scale for more advanced analytic use cases.