Hybridx: New hybrid index for volume-hiding range queries in data outsourcing services

K Ren, Y Guo, J Li, X Jia, C Wang… - 2020 IEEE 40th …, 2020 - ieeexplore.ieee.org
An encrypted index is a data structure that assisting untrusted servers to provide various
query functionalities in the ciphertext domain. Although traditional index designs can prevent …

Building in-the-cloud network functions: Security and privacy challenges

P Jiang, Q Wang, M Huang, C Wang, Q Li… - Proceedings of the …, 2021 - ieeexplore.ieee.org
Network function virtualization (NFV) has been promising to improve the availability,
programmability, and flexibility of network function deployment and communication facilities …

Privacy-preserving efficient verifiable deep packet inspection for cloud-assisted middlebox

H Ren, H Li, D Liu, G Xu, N Cheng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the increasing traffic volume, enterprises choose to outsource their middlebox services,
such as deep packet inspection, to the cloud to acquire rich computational and …

PFcrowd: Privacy-preserving and federated crowdsourcing framework by using blockchain

C Zhang, Y Guo, H Du, X Jia - 2020 IEEE/ACM 28th …, 2020 - ieeexplore.ieee.org
Crowdsourcing is a promising computing paradigm that utilizes collective intelligence to
solve complex tasks. While it is valuable, traditional crowdsourcing systems lock …

Practical encrypted network traffic pattern matching for secure middleboxes

S Lai, X Yuan, SF Sun, JK Liu… - … on Dependable and …, 2021 - ieeexplore.ieee.org
Network Function Virtualisation (NFV) advances the adoption of composable software
middleboxes. Accordingly, cloud data centres become major NFV vendors for enterprise …

DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes

M Deng, K Zhang, P Wu, M Wen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Secure outsourced middleboxes are deployed in network function virtualization services that
detect malicious activities on communications, which provides privacy-preserving deep …

SoK: A systematic study of attacks in efficient encrypted cloud data search

J Yao, Y Zheng, Y Guo, C Wang - … of the 8th International Workshop on …, 2020 - dl.acm.org
Searchable encryption allows one to search encrypted data hosted by an untrusted cloud. In
terms of efficiency, symmetric key-based searchable encryption is promising for practical …

Privacy-preserving packet header checking over in-the-cloud middleboxes

Y Guo, M Wang, C Wang, X Yuan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The explosive growth of network traffic is pushing forward the paradigm of cloud-based
middlebox services today. However, due to the increasing attacking surfaces, redirecting …

Veil: A Storage and Communication Efficient Volume-Hiding Algorithm

S Han, V Chakraborty, MT Goodrich… - Proceedings of the …, 2023 - dl.acm.org
This paper addresses volume leakage (ie, leakage of the number of records in the answer
set) when processing keyword queries in encrypted key-value (KV) datasets. Volume …

Enabling secure and versatile packet inspection with probable cause privacy for outsourced middlebox

H Ren, H Li, D Liu, G Xu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Middlebox is an intermediary network equipment which can be outsourced to remote cloud
servers for low-cost and customizable network services, such as load balancer and intrusion …