Preserving privacy at IXPS

Xiaohe Hu, Arpit Gupta, Nick Feamster, Aurojit Panda, Scott Shenker

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Autonomous systems (ASes) on the Internet increasingly rely on Internet Exchange Points (IXPs) for peering. A single IXP may interconnect several 100s or 1000s of participants (ASes) all of which might peer with each other through BGP sessions. IXPs have addressed this scaling challenge through the use of route servers. However, route servers require participants to trust the IXP and reveal their policies, a drastic change from the accepted norm where all policies are kept private. In this paper we look at techniques to build route servers which provide the same functionality as existing route servers without requiring participants to reveal their policies thus preserving the status quo and enabling wider adoption of IXPs. Prior work has looked at secure multiparty computation (SMPC) as a means of implementing such route servers however this affects performance and reduces policy flexibility. In this paper we take a different tack and build on trusted execution environments (TEEs) such as Intel SGX to keep policies private and flexible. We present results from an initial route server implementation that runs under Intel SGX and show that our approach has 20x better performance than SMPC based approaches. Furthermore, we demonstrate that the additional privacy provided by our approach comes at minimal cost and our implementation is at worse 2.1x slower than a current route server implementation (and in some situations up to 2x faster).

Original languageEnglish (US)
Title of host publicationAPNet 2018 - Proceedings of the 2018 Asia-Pacific Workshop on Networking
PublisherAssociation for Computing Machinery
Pages43-49
Number of pages7
ISBN (Electronic)9781450363952
DOIs
StatePublished - Aug 1 2018
Event2nd Asia-Pacific Workshop on Networking, APNet 2018 - Beijing, China
Duration: Aug 2 2018Aug 3 2018

Publication series

NameACM International Conference Proceeding Series

Conference

Conference2nd Asia-Pacific Workshop on Networking, APNet 2018
CountryChina
CityBeijing
Period8/2/188/3/18

Fingerprint

Servers
Internet
Costs

Keywords

  • BGP
  • IXP
  • Policy
  • Privacy

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Cite this

Hu, X., Gupta, A., Feamster, N., Panda, A., & Shenker, S. (2018). Preserving privacy at IXPS. In APNet 2018 - Proceedings of the 2018 Asia-Pacific Workshop on Networking (pp. 43-49). (ACM International Conference Proceeding Series). Association for Computing Machinery. https://doi.org/10.1145/3232565.3232575

Preserving privacy at IXPS. / Hu, Xiaohe; Gupta, Arpit; Feamster, Nick; Panda, Aurojit; Shenker, Scott.

APNet 2018 - Proceedings of the 2018 Asia-Pacific Workshop on Networking. Association for Computing Machinery, 2018. p. 43-49 (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hu, X, Gupta, A, Feamster, N, Panda, A & Shenker, S 2018, Preserving privacy at IXPS. in APNet 2018 - Proceedings of the 2018 Asia-Pacific Workshop on Networking. ACM International Conference Proceeding Series, Association for Computing Machinery, pp. 43-49, 2nd Asia-Pacific Workshop on Networking, APNet 2018, Beijing, China, 8/2/18. https://doi.org/10.1145/3232565.3232575
Hu X, Gupta A, Feamster N, Panda A, Shenker S. Preserving privacy at IXPS. In APNet 2018 - Proceedings of the 2018 Asia-Pacific Workshop on Networking. Association for Computing Machinery. 2018. p. 43-49. (ACM International Conference Proceeding Series). https://doi.org/10.1145/3232565.3232575
Hu, Xiaohe ; Gupta, Arpit ; Feamster, Nick ; Panda, Aurojit ; Shenker, Scott. / Preserving privacy at IXPS. APNet 2018 - Proceedings of the 2018 Asia-Pacific Workshop on Networking. Association for Computing Machinery, 2018. pp. 43-49 (ACM International Conference Proceeding Series).
@inproceedings{ea4152fc40f44e8c8041c1f0345316f4,
title = "Preserving privacy at IXPS",
abstract = "Autonomous systems (ASes) on the Internet increasingly rely on Internet Exchange Points (IXPs) for peering. A single IXP may interconnect several 100s or 1000s of participants (ASes) all of which might peer with each other through BGP sessions. IXPs have addressed this scaling challenge through the use of route servers. However, route servers require participants to trust the IXP and reveal their policies, a drastic change from the accepted norm where all policies are kept private. In this paper we look at techniques to build route servers which provide the same functionality as existing route servers without requiring participants to reveal their policies thus preserving the status quo and enabling wider adoption of IXPs. Prior work has looked at secure multiparty computation (SMPC) as a means of implementing such route servers however this affects performance and reduces policy flexibility. In this paper we take a different tack and build on trusted execution environments (TEEs) such as Intel SGX to keep policies private and flexible. We present results from an initial route server implementation that runs under Intel SGX and show that our approach has 20x better performance than SMPC based approaches. Furthermore, we demonstrate that the additional privacy provided by our approach comes at minimal cost and our implementation is at worse 2.1x slower than a current route server implementation (and in some situations up to 2x faster).",
keywords = "BGP, IXP, Policy, Privacy",
author = "Xiaohe Hu and Arpit Gupta and Nick Feamster and Aurojit Panda and Scott Shenker",
year = "2018",
month = "8",
day = "1",
doi = "10.1145/3232565.3232575",
language = "English (US)",
series = "ACM International Conference Proceeding Series",
publisher = "Association for Computing Machinery",
pages = "43--49",
booktitle = "APNet 2018 - Proceedings of the 2018 Asia-Pacific Workshop on Networking",

}

TY - GEN

T1 - Preserving privacy at IXPS

AU - Hu, Xiaohe

AU - Gupta, Arpit

AU - Feamster, Nick

AU - Panda, Aurojit

AU - Shenker, Scott

PY - 2018/8/1

Y1 - 2018/8/1

N2 - Autonomous systems (ASes) on the Internet increasingly rely on Internet Exchange Points (IXPs) for peering. A single IXP may interconnect several 100s or 1000s of participants (ASes) all of which might peer with each other through BGP sessions. IXPs have addressed this scaling challenge through the use of route servers. However, route servers require participants to trust the IXP and reveal their policies, a drastic change from the accepted norm where all policies are kept private. In this paper we look at techniques to build route servers which provide the same functionality as existing route servers without requiring participants to reveal their policies thus preserving the status quo and enabling wider adoption of IXPs. Prior work has looked at secure multiparty computation (SMPC) as a means of implementing such route servers however this affects performance and reduces policy flexibility. In this paper we take a different tack and build on trusted execution environments (TEEs) such as Intel SGX to keep policies private and flexible. We present results from an initial route server implementation that runs under Intel SGX and show that our approach has 20x better performance than SMPC based approaches. Furthermore, we demonstrate that the additional privacy provided by our approach comes at minimal cost and our implementation is at worse 2.1x slower than a current route server implementation (and in some situations up to 2x faster).

AB - Autonomous systems (ASes) on the Internet increasingly rely on Internet Exchange Points (IXPs) for peering. A single IXP may interconnect several 100s or 1000s of participants (ASes) all of which might peer with each other through BGP sessions. IXPs have addressed this scaling challenge through the use of route servers. However, route servers require participants to trust the IXP and reveal their policies, a drastic change from the accepted norm where all policies are kept private. In this paper we look at techniques to build route servers which provide the same functionality as existing route servers without requiring participants to reveal their policies thus preserving the status quo and enabling wider adoption of IXPs. Prior work has looked at secure multiparty computation (SMPC) as a means of implementing such route servers however this affects performance and reduces policy flexibility. In this paper we take a different tack and build on trusted execution environments (TEEs) such as Intel SGX to keep policies private and flexible. We present results from an initial route server implementation that runs under Intel SGX and show that our approach has 20x better performance than SMPC based approaches. Furthermore, we demonstrate that the additional privacy provided by our approach comes at minimal cost and our implementation is at worse 2.1x slower than a current route server implementation (and in some situations up to 2x faster).

KW - BGP

KW - IXP

KW - Policy

KW - Privacy

UR - http://www.scopus.com/inward/record.url?scp=85063077176&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85063077176&partnerID=8YFLogxK

U2 - 10.1145/3232565.3232575

DO - 10.1145/3232565.3232575

M3 - Conference contribution

AN - SCOPUS:85063077176

T3 - ACM International Conference Proceeding Series

SP - 43

EP - 49

BT - APNet 2018 - Proceedings of the 2018 Asia-Pacific Workshop on Networking

PB - Association for Computing Machinery

ER -