A Efficient Privacy Based Multi User Computation Using Inter Domain Routing Decision

Authors

  • Altamash Ali  Department of CSE, Shadan College of Engineering and Technology Hyderabad, Telangana. Tamil Nadu, India
  • Md Ateeq Ur Rahman  Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Tamil Nadu, India

Keywords:

Collaborative Verification, Inter Domain Routing, Privacy, Security

Abstract

In this paper, we tend to show a network will allow its peers to verify variety of nontrivial properties of its inter domain routing selections while not revealing any further information. If all the properties hold, the peers learn nothing beyond what the inter domain routing protocol already reveals; if a property doesn’t hold, a minimum of one peer will notice this and prove the violation. We tend to gift SPIDeR, a sensible system that applies this approach to the Border entree Protocol, and we report results from AN experimental analysis to demonstrate that SPIDeR encompasses a cheap overhead. Some aspects could also be unconcealed to neighbours, enclosed in a very route written record, or exposed indirectly via glass services, however we tend to cannot expect network operators to conform to use any system that reveals even a lot of their private info. Existing work has shown that it’s attainable to make deductions concerning that autonomous systems area unit connected, and even concerning some aspects of policy however these inferences have restricted accuracy and require extended effort to hold out, creating them unsuitable for substantiate routing selections.

References

  1. Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen, Micah Sherr, and Boon Thau Loo, "Private and Verifiable Inter domain Routing Decisions", IEEE/ACM Transactions on Networking, Vol. 24, No. 2, April 2016.
  2. AS Relationships Dataset from CAIDA, Online]. Available: http://www.caida.org/data/active/as-relationships/
  3. M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proc. ACM CCS ‘93, Fairfax, VA, USA, 1993.
  4. O. Bonaventure and B. Quoitin, "Common utilizations of the BGP community attribute," Internet Draft, 2003 Online]. Available: http://tools.ietf.org/html/draft-bonaventure-quoitin-bgp-communities-00
  5. D. Catalano, M. Di Raimondo, D. Fiore, and M. Messina, "Zero-knowledge sets with short proofs," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2488-2502, Apr. 2011.
  6. E. Chen and T. Bates, "An application of the BGP community attribute in multi-home routing," in RFC 1998, Aug. 1996 Online]. Available: https://tools.ietf.org/html/rfc1998
  7. X. Dimitropoulos et al., "AS relationships: Inference and validation," ACM SIGCOMM CCR, no. 1, pp. 29-40, Jan. 2007.
  8. B. Donnet and O. Bonaventure, "On BGP communities," ACM CCR, vol. 38, no. 2, pp. 55-59, Apr. 2008.
  9. P. Faratin, D. Clark, P. Gilmore, S. Bauer, A. Berger, and W. Lehr, "Complexity of Internet interconnections: Technology, incentives and implications for policy," presented at the 35th Annu. Telecomm. Policy Research Conf. (TPRC), Arlington, VA, USA, Sep. 2007.
  10. N. Feamster, Z. M. Mao, and J. Rexford, "Border Guard: Detecting cold potatoes from peers," presented at the 2004 Internet Measurement Conf., IMC ‘04, Taormina, Sicily, Italy, Oct. 2004.
  11. L. Gao, "On inferring autonomous system relationships in the Internet," IEEE/ACM Trans. Netw., vol. 9, pp. 733-745, Dec. 2001.
  12. L. Gao and J. Rexford, "Stable Internet routing without global coordination," IEEE/ACM Trans. Netw., vol. 9, no. 6, pp. 681-692, Dec. 2001.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Altamash Ali, Md Ateeq Ur Rahman, " A Efficient Privacy Based Multi User Computation Using Inter Domain Routing Decision, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.352-359, July-August-2017.