Partition-based prefix preserving anonymization approach for network traces containing IP addresses
11316831 · 2022-04-26
Assignee
Inventors
- Meisam MOHAMMADY (Montreal, CA)
- Yosr JARRAYA (Montreal, CA)
- Lingyu WANG (Montreal, CA)
- Mourad Debbabi (Dollard des Ormeaux, CA)
- Makan Pourzandi (Montreal, CA)
Cpc classification
H04L63/0421
ELECTRICITY
H04L63/0407
ELECTRICITY
H04L12/40045
ELECTRICITY
H04W12/02
ELECTRICITY
H04L9/088
ELECTRICITY
H04W12/04
ELECTRICITY
G06F21/6254
PHYSICS
International classification
H04L9/08
ELECTRICITY
H04W12/02
ELECTRICITY
Abstract
A node including processing circuitry configured to: generate anonymized data based at least in part on a first cryptographic key and network data, calculate a coordination vector, generate initialized data based at least in part on the anonymized data, a second cryptographic key and the coordination vector, transmit the initialized data, the random vector, a security policy and instructions to analyze n iterations of the initialized data and the security policy using the random vector and the second cryptographic key, and receive results of the analysis of the n iterations of the initialized data and the security policy using the random vector and the second cryptographic key. The analysis of an m iteration of the n iterations correspond to an analysis of the initialized data with prefix preservation where the analysis of the remaining iterations of the n iterations fail to be prefixed preserved.
Claims
1. A node for anonymizing network data for analysis by another node, the node comprising: processing circuitry configured to: generate anonymized data based at least in part on a first cryptographic key and network data; calculate a coordination vector based at least in part on a random vector; generate initialized data based at least in part on the anonymized data, a second cryptographic key and the coordination vector, the second cryptographic key being independent from the first cryptographic key; transmit the initialized data, the random vector, a security policy, the second cryptographic key and instructions to analyze n iterations of the initialized data and the security policy using the random vector and the second cryptographic key; receive results of the analysis of the n iterations of the initialized data and the security policy using the random vector and the second cryptographic key; and the analysis of an m iteration of the n iterations corresponding to an analysis of the initialized data with prefix preservation, the analysis of the remaining iterations of the n iterations failing to be prefixed preserved, where n and m are integers and n is greater than m.
2. The node of claim 1, wherein the processing circuitry is further configured to partition the network data into a plurality of non-overlapping partitions, the generating of the initialized data includes applying at least one cryptographically based anonymization function to each one of the plurality of non-overlapping partitions.
3. The node of claim 1, wherein the coordination vector is calculated based at least in part on the random vector and a key combination vector, the key combination vector allowing for the m iteration to be prefix preserved.
4. The node of claim 1, wherein if m times the random vector is added to the coordination vector, a resulting vector of this addition operation providing prefix preservation of the initialized data with respect to the network data during the analysis.
5. The node of claim 1, wherein the network data includes a plurality of destination internet protocol addresses and a plurality of source internet protocol addresses.
6. The node of claim 1, wherein the security policy includes at least one rule to be applied during the analysis.
7. The node of claim 1, wherein the anonymized data is generated by applying at least one cryptographic operation to the network data using the first cryptographic key; and the initialized data is generated by applying the at least one cryptographic operation to the anonymized data using the second cryptographic key and the coordination vector.
8. The node of claim 1, wherein the instructions to analyze n iterations of the initialized data and the security policy using the random vector and the second cryptographic key includes instructions to apply at least one cryptographic operation to the initialized data using the second cryptographic key and the random vector.
9. The node of claim 1, wherein the processing circuitry (18) is further configured to transmit the second cryptographic key.
10. A method for a node for anonymizing network data for analysis by another node, the method comprising: generating anonymized data based at least in part on a first cryptographic key and network data; calculating a coordination vector based at least in part on a random vector; generating initialized data based at least in part on the anonymized data, a second cryptographic key and the coordination vector, the second cryptographic key being independent from the first cryptographic key; transmitting the initialized data, the random vector, a security policy, the second cryptographic key and instructions to analyze n iterations of the initialized data and the security policy using the random vector and the second cryptographic key; receiving results of the analysis of the n iterations of the initialized data and the security policy using the random vector and the second cryptographic key; and the analysis of an m iteration of the n iterations corresponding to an analysis of the initialized data with prefix preservation, the analysis of the remaining iterations of the n iterations failing to be prefixed preserved, where n and m are integers and n is greater than m.
11. The method of claim 10, further comprising partitioning the network data into a plurality of non-overlapping partitions, the generating of the initialized data includes applying at least one cryptographically based anonymization function to each one of the plurality of non-overlapping partitions.
12. The method of claim 10, wherein the coordination vector is calculated based at least in part on the random vector and a key combination vector, the key combination vector allowing for the m iteration to be prefix preserved.
13. The method of claim 10, wherein if m times the random vector is added to the coordination vector, a resulting vector of this addition operation providing prefix preservation of the initialized data with respect to the network data during the analysis.
14. The method of claim 10, wherein the network data includes a plurality of destination internet protocol addresses and a plurality of source internet protocol addresses.
15. The method of claim 10, wherein the security policy includes at least one rule to be applied during the analysis.
16. The method of claim 10, wherein the anonymized data is generated by applying at least one cryptographic operation to the network data using the first cryptographic key; and the initialized data is generated by applying the at least one cryptographic operation to the anonymized data using the second cryptographic key and the coordination vector.
17. The method of claim 10, wherein the instructions to analyze n iterations of the initialized data and the security policy using the random vector and the second cryptographic key includes instructions to apply at least one cryptographic operation to the initialized data using the second cryptographic key and the random vector.
18. The method of claim 10, further comprising transmitting the second cryptographic key.
19. A node for anonymizing network data for analysis by another node, the node comprising: an anonymization module configured to: generate anonymized data based at least in part on a first cryptographic key and network data; calculate a coordination vector based at least in part on a random vector; generate initialized data based at least in part on the anonymized data, a second cryptographic key and the coordination vector, the second cryptographic key being independent from the first cryptographic key; transmit the initialized data, the random vector, a security policy and instructions to analyze n iterations of the initialized data and the security policy using the random vector and the second cryptographic key; receive results of the analysis of the n iterations of the initialized data and the security policy using the random vector and the second cryptographic key; and the analysis of an m iteration of the n iterations corresponding to an analysis of the initialized data with prefix preservation, the analysis of the remaining iterations of the n iterations failing to be prefixed preserved, where n and m are integers and n is greater than m.
20. The node of claim 19, wherein the anonymization module is further configured to partition the network data into a plurality of non-overlapping partitions, the generating of the initialized data includes applying at least one cryptographically based anonymization function to each one of the plurality of non-overlapping partitions.
21. The node of claim 19, wherein the coordination vector is calculated based at least in part on the random vector and a key combination vector, the key combination vector allowing for the m iteration to be prefix preserved.
22. The node of claim 19, wherein if m times the random vector is added to the coordination vector, a resulting vector of this addition operation providing prefix preservation of initialed data with respect to the network data during the analysis.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) A more complete understanding of the present embodiments, and the attendant advantages and features thereof, will be more readily understood by reference to the following detailed description when considered in conjunction with the accompanying drawings wherein:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
DETAILED DESCRIPTION
(19) A potential weakness in CryptoPAn is that the prefix-preserving methodology of CryptoPAn anonymizes addresses such that any given bit of the anonymized address is dependent on all previous bits of the unanonymized address. This dependence can cause a single deanonymization to affect all anonymized addresses that share a prefix with the true address. In fact, one study described above demonstrated how active probing attacks can be used to systematically undermine the CryptoPAn anonymization scheme.
(20) The disclosure relates to wireless communications, and in particular, to partition-based prefix preserving anonymization for network data. The disclosure describes a new approach for publishing the network trace while maintaining the tenant's privacy. This approach can improve the trade-off between privacy-utility by introducing extra computation. There is no extra storage overhead for log/data management with this approach. In this approach, the network traces from Cloud Service Provider (CSP) are anonymized and sent to the 3rd party for evaluation against some security policy or some compliance framework such as Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM).
(21) The original data set is anonymized by the log (i.e., data or network data) owner or log node (e.g., CSP) and sent to the analyst or analyst node, i.e., third party. Intuitively, several views are built from the original anonymized data set. The analyst analyzes each view and returns the results to the log owner. However, since one of those views, which is referred to herein as the utility-driven view, is a dataset that corresponds to the original dataset, its corresponding analysis result will be the valid analysis result. This result will be easily identified by the log owner who primarily calculated all views. Note that the analyst cannot know what results among those sent to the log owner is the right one, as described herein. Additionally, this approach described herein could not find out what's the PP mechanism used to perform the anonymization.
(22) In other words, among other benefits, the approach described herein improves the trade-off between privacy-utility by introducing extra computation. There is no extra storage overhead for log management with this approach.
(23) Privacy:
(24) To solve semantic attacks, e.g., injection and fingerprinting attacks on CryptoPAn, a partition-based prefix preserving anonymization approach is introduced herein. Semantic attacks are effective when the anonymization function is known and there is a one-to-one correspondence between the original and anonymized values.
(25) The anonymization approach described herein applies different number/quantity of cryptographic operations (i.e., PP) on different partitions. Therefore, the approach described herein is a one-to-many function. Hence de-anonymization will be difficult. Instead of finding one mapping function F to de-anonymize the information in the traces, we now define r partitions are defined, namely PP.sub.1, . . . , PP.sub.r, corresponding each to a partition. This renders semantic attacks techniques not efficient.
(26) Utility:
(27) Some embodiments described herein include a privacy-preserving technique that entirely preserves the utility of the outsources log. All existing studies/works in data publishing normally trade-off privacy with utility of the log, by removing all sensitive data from the original data, making it no more useful for certain analysis such as auditing or any analysis that needs to keep certain structure of the trace log. The approach described herein, on the other hand, preserves privacy in trade-off with computation cost. Intuitively, several views of the original data are sent to the analyst and results of analyzing each view will be returned. However, since one of those views, referred to herein as the utility-driven view, is a dataset that is very close to the original dataset, its corresponding analysis result will be the valid analysis result. This result will be easily identified by the log owner who primarily calculated all views. In one or more embodiments, a view may generally refer to encrypted data and/or original data and/or a dataset.
(28) Note that the data log owner generates different views of the original log so that:
(29) 1. The utility-driven view must be kept hidden among all other views, i.e., all views must be equally indistinguishable.
(30) 2. Each of the views other than the utility-driven view one must be designed so that they do not leak too much information about the original dataset.
(31) Some embodiments described herein solve the overhead problem which represent a problem in several state-of-the-art studies/works that claim to be one-to-many techniques (mainly applied in data mining applications). These studies/works insert fake entries into the records and thus increase the log size, while in the approach described herein, the size of the anonymized log is not increased since fake records are not inserted. Rather, in one or more embodiments, different views of the same log are generated using different combinations of the same key. In one or more embodiments described herein, key refers to a cryptographic key. The result of the fully prefix preserving view is sent back to the log owner without the analyst knowing which of the security reports produced is the correct one. In one or more embodiments, retrieval is performed by private information retrieval. This technique preserves the utility of the log (original values for all the field and fully prefix preserving mapping of IP addresses).
(32) Before describing in detail exemplary embodiments, it is noted that the embodiments reside primarily in combinations of node components and processing steps related to partition-based prefix preserving anonymization for network data such as network traces. Accordingly, components have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
(33) As used herein, relational terms, such as “first” and “second,” “top” and “bottom,” and the like, may be used solely to distinguish one entity or element from another entity or element without necessarily requiring or implying any physical or logical relationship or order between such entities or elements.
(34) Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs. It will be further understood that terms used herein should be interpreted as having a meaning that is consistent with their meaning in the context of this specification and the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
(35) In embodiments described herein, the joining term, “in communication with” and the like, may be used to indicate electrical or data communication, which may be accomplished by physical contact, induction, electromagnetic radiation, radio signaling, infrared signaling or optical signaling, for example. One having ordinary skill in the art will appreciate that multiple components may interoperate and modifications and variations are possible of achieving the electrical and data communication.
(36) Referring now to drawing figures in which like reference designators refer to like elements there is shown in
(37) Node 12 includes one or more communication interfaces 16 for communicating with analyst node 14, other nodes and/or other entities in system 10 via one or more communication protocols, e.g., TCP/IP, wired and/or wireless communication protocols, among other communication protocols described herein and/or known in the art. In one or more embodiments, one or more communication interfaces 16 are replaced one or more transmitters and/or one or more receivers communicating signals, packets, etc.
(38) Node 12 includes processing circuitry 18. Processing circuitry 18 includes processor 20 and memory 22. Processing circuitry 18 may comprise integrated circuitry for processing and/or control, e.g., one or more processors and/or processor cores and/or FPGAs (Field Programmable Gate Array) and/or ASICs (Application Specific Integrated Circuitry). Processor 20 may be configured to access (e.g., write to and/or reading from) memory 22, which may comprise any kind of volatile and/or nonvolatile memory, e.g., cache and/or buffer memory and/or RAM (Random Access Memory) and/or ROM (Read-Only Memory) and/or optical memory and/or EPROM (Erasable Programmable Read-Only Memory). Such memory 22 may be configured to store code executable by processor 20 and/or other data, e.g., data pertaining to communication, e.g., configuration and/or address data of nodes, etc.
(39) Processing circuitry 18 may be configured to control any of the methods and/or processes described herein and/or to cause such methods and/or processes to be performed, e.g., by node 12. Corresponding instructions may be stored in memory 22, which may be readable and/or readably connected to processor 20. One or more processors 20 are configured to perform node 12 functions described herein. Memory 22 is configured to store data, programmatic software code and/or other information described herein. Memory 22 is configured to store anonymization code 24. For example, anonymization code 24 includes instructions that, when executed by processor 20, causes processor 20 to perform the one or more processes discussed herein with respect to node 12, i.e., data owner. Note further, that functions described herein as being performed by node 12 may be distributed over a plurality of nodes 12 and/or other nodes. In other words, it is contemplated that the functions of node 12 described herein are not limited to performance by a single physical device and, in fact, can be distributed among several physical devices within a single physical location or across a network such as the Internet.
(40) Analyst node 14 includes one or more communication interfaces 26 for communicating with node 12, other nodes and/or other entities in system 10 via one or more communication protocols e.g., TCP/IP, wired and/or wireless communication protocols, among other communication protocols described herein and/or known in the art. In one or more embodiments, one or more communication interfaces 16 are replaced one or more transmitters and/or one or more receivers communicating signals, packets, etc.
(41) Analyst node 14 includes processing circuitry 28. Processing circuitry 28 includes processor 30 and memory 32. Processing circuitry 28 may comprise integrated circuitry for processing and/or control, e.g., one or more processors and/or processor cores and/or FPGAs (Field Programmable Gate Array) and/or ASICs (Application Specific Integrated Circuitry). Processor 30 may be configured to access (e.g., write to and/or reading from) memory 32, which may comprise any kind of volatile and/or nonvolatile memory, e.g., cache and/or buffer memory and/or RAM (Random Access Memory) and/or ROM (Read-Only Memory) and/or optical memory and/or EPROM (Erasable Programmable Read-Only Memory). Such memory 32 may be configured to store code executable by processor 30 and/or other data, e.g., data pertaining to communication, e.g., configuration and/or address data of nodes, etc.
(42) Processing circuitry 28 may be configured to control any of the methods and/or processes described herein and/or to cause such methods and/or processes to be performed, e.g., by analyst node 14. Corresponding instructions may be stored in memory 32, which may be readable and/or readably connected to processor 30. One or more processors 30 are configured to perform analyst node 14 functions described herein. Memory 32 is configured to store data, programmatic software code and/or other information described herein. Memory 32 is configured to store analyst code 34. For example, analyst code 34 includes instructions that, when executed by processor 30, causes processor 30 to perform the one or more processes discussed herein with respect to analyst node 14, i.e., analyst. Note further, that functions described herein as being performed by analyst node 14 may be distributed over a plurality of analyst node 14 and/or other nodes. In other words, it is contemplated that the functions analyst node 14 described herein are not limited to performance by a single physical device and, in fact, can be distributed among several physical devices within a single physical location or across a network such as the Internet.
(43)
(44) Processing circuitry 18 is configured to transmit the initialized data (L.sub.0), random vector (V), a security policy (SecPolicy.sub.1), the second cryptographic key (k) and instructions to analyze N iterations of the initialized data (L.sub.0) and the security policy (SecPolicy.sub.1) using the random vector (V) with the second/master cryptographic key (k), as described herein (Block S106). In one or more embodiments, the transmitted security policy (SecPolicy.sub.1) is based on a security policy (SecPolicy.sub.0) that is anonymized in a similar manner as the anonymization of the initialized data. Processing circuitry 18 is configured to receive results of the analysis of the n iterations of the initialized data (L.sub.0) and security policy (SecPolicy.sub.1) using the random vector (V) and the master/second cryptographic key (k), as described herein (Block S108). In one or more embodiments, the analysis of an m iteration of the n iterations corresponds to an analysis of the initialized data with prefix preservation where the analysis of the remaining iterations of the n iterations fail to be prefixed preserved, where n and m are integers and n is greater than m.
(45) According to one or more embodiments, the processing circuitry 18 is further configured to partition the network data into a plurality of non-overlapping partitions where the generating of the initialized data includes applying at least one cryptographically based anonymization function to each one of the plurality of non-overlapping partitions. According to one or more embodiments, the coordination vector is calculated based at least in part on the random vector and a key combination vector where the key combination vector allows for the m iteration to be prefix preserved. According to one or more embodiments, if m times the random vector is added to the coordination vector, a resulting vector of this addition operation provides prefix preservation of initialed data with respect to the network data during the analysis.
(46) According to one or more embodiments, the network data includes a plurality of destination internet protocol addresses and a plurality of source internet protocol addresses. According to one or more embodiments, the security policy includes at least one rule to be applied during the analysis. According to one or more embodiments of this aspect, the anonymized data is generated by applying at least one cryptographic operation to the network data using the first cryptographic key. The initialized data is generated by applying the at least one cryptographic operation to the anonymized data using the second cryptographic key and the coordination vector. According to one or more embodiments of this aspect, the instructions to analyze n iterations of the initialized data and the security policy using the random vector and the second cryptographic key includes instructions to apply at least one cryptographic operation to the initialized data using the second cryptographic key and the random vector. According to one or more embodiments, the processing circuitry 18 is further configured to transmit the second cryptographic key.
(47)
(48) According to one or more embodiments, the encrypted anonymized data is based at least in part on: encryption of first network data including the first tenant identifier using second cryptographic key to generate first encrypted data; anonymizing of the first encrypted data to generate anonymized data where the anonymizing of the first encrypted data includes segmenting the first encrypted data based at least in part on the encrypted first tenant identifier and where the anonymizing of the first encrypted data preserves relationships among the first network data associated with the first tenant identifier; and encryption of the anonymized data using the first cryptographic key to generate the encrypted anonymized data. According to one or more embodiments, the at least one analysis parameter is a two dimensional matrix where values of the two dimensional matrix indicate a quantity of times to apply a cryptographically based function to a segment of the encrypted anonymized data using the first cryptographic key.
(49) According to one or more embodiments, a quantity of columns in the two dimensional matrix indicate a quantity of copies of the encrypted anonymized data to generate; and each data view corresponding to an application of a respective column of the two dimensional matrix to a respective copy of the encrypted anonymized data. According to one or more embodiments, a quantity of rows in the two dimensional matrix correspond to a quantity of segments in the encrypted anonymized data. According to one or more embodiments, the encrypted anonymized data is further based at least in part on: encrypting second data including a second tenant identifier using a third cryptographic key to generate second encrypted data, and anonymizing of the second encrypted data to generate a portion of the anonymized data where the anonymizing of the second encrypted data includes segmenting the second encrypted data based at least in part on the encrypted second tenant identifier and where the anonymizing of the second encrypted data preserves relationships among the second data associated with the second tenant identifier. According to one or more embodiments, each data view includes: a portion that preserves relationships among the second data associated with the second tenant identifier; and a portion that fails to preserve relationships among the second data associated with the second tenant identifier.
(50) Additional details are provided as follows:
(51) Preliminaries
(52) A log L consists of a set of records or network data. Each record r.sub.i is a combination various fields. For example, the following fields are the minimum set of fields found in a NetFlow record: IP address pairs (source/-destination), port pairs (source/-destination), protocol (Transmission Control Protocol (TCP)/User Datagram Protocol (UDP)/Internet Control Message Protocol (ICMP)), packets per second, byte counts, and timestamps. One example of record time entries is shown in NetFlow trace log file illustrated in
(53) S=(srcIP, dstIP).
(54) The anonymization of IP addresses is considered as described below.
(55) Two IP addresses a and b such that a=a.sub.1a.sub.2 . . . an and b=b.sub.1b.sub.2 . . . n, share a prefix of k bits (0≤k≤n), if a.sub.1a.sub.2 . . . a.sub.k=b.sub.1b.sub.2 . . . b.sub.k and a.sub.k+1≠b.sub.k+1.
(56) An anonymization function F is defined as a one-to-one function F: {0,1}.sup.n.fwdarw.{0,1}.sup.n. An anonymization function F is prefix-preserving, if, given two IP addresses a and b that share a k-bit prefix, F(a) and F(b) also share a k-bit prefix. A prefix preservation anonymization function F takes necessarily the following canonical form:
F(a):=a′.sub.1a′.sub.2. . . a′.sub.n where a′.sub.i=a.sub.i⊕ƒ.sub.i-1(a.sub.1a.sub.2. . . a.sub.i-1)
Such that a=a.sub.1a.sub.2 . . . an is an IP address and ƒ.sub.i: {0,1}.sup.n.fwdarw.{0,1}.sup.n are a set of functions and ƒ.sub.0 is a constant function, with i=1 . . . n and ⊕ is the exclusive “or” operation.
(57) An instantiation of functions ƒ.sub.i with cryptographically strong stream cipher or block ciphers is made such that
ƒ.sub.i(a.sub.1a.sub.2. . . a.sub.n):(
(
(a.sub.1a.sub.2. . . a.sub.n),k))
Where k is the cryptographic key used in the pseudorandom function , which is the pseudorandom function or a pseudorandom permutation (i.e., a block cipher). The function
is a padding function that expands a.sub.1a.sub.2 . . . a.sub.i into a longer string that matches the block size of
. Length of k should follow the guideline specified for the pseudorandom function that is adopted (i.e. between 128 and 256 bits in 32-bit steps). The function
returns the “least significant bit”.
(58) PP is the cryptographically based prefix preserving IP address anonymization function, such that, given a=a.sub.1a.sub.2 . . . a.sub.n an IP address and k a cryptographic key.
PP(a,k)=a′=a′.sub.1a′.sub.2. . . a′.sub.n
(59) One of the properties of PP is that if it can be applied iteratively and the end result will always preserve the prefixes, which means PP(PP(a, k.sub.0), k.sub.1)=a″ and PP(PP(b, k.sub.0), k.sub.1)=b″ such that a and b share the same k-bit prefix then a″ and b″ would share the same k-bit prefix. An example, of applying PP on records/data of a previous log trace/data is illustrated in
(60) The iterative application of PP using key k is denoted as follows PP.sup.j(−, k). For example, PP.sup.2(−, k)=PP(PP(−, k), k). This can be generalized to any number/quantity of iteration. This iterative application of PP has the following property:
PP.sup.m(−,k)=PP.sup.m.sup.
PP is applied on a subset of records {r.sub.j}.sub.j∈[j.sub.
It is assumed that a log can be partitioned into a set of non-overlapping partitions {P.sub.i}. Let P.sub.i={r.sub.j}.sub.j∈[j.sub.
(61)
of dimension R.
Let
(62)
then it can be written as
(63)
(64) The one-to-many IP mapping depicted in
(65) Let
(66)
then this notation is used
(67)
as a shorthand to denote that PP(−, k) is applied a certain number/quantity of times v.sub.i over the corresponding partition.
(68) For instance, for R=2 with partitions P.sub.1 and P.sub.2, the vector V=[.sub.3.sup.2] signifies that it is run 2 times k for the first partition and 3 times for the second partition. Then for any number/quantity of partitions, property two is as follows.
PP(PP(L,V.sub.1*k),V.sub.2*k)=PP(L,(V1+V2)*k) Property 2:
(69) The latter property will play a role in the privacy-utility network trace anonymization technique described herein.
(70) Approach
(71) Two roles are identified: data/log trace owner, i.e., node 12, and analyst, i.e., analyst node 14.
(72)
(73) Step 1: Data owner: Keys Generation and Initial Anonymization Data owner, i.e., node 12, generates two independent keys, namely k.sub.0 (initial key as referred to as KO in the figures) and k (Master key K). Data owner, i.e., node 12, applies PP using the initial key k.sub.0 such that L.sub.0=PP (L, k.sub.0). The goal of k.sub.0 is, in one or more embodiments, for addressing cryptographic attack. Mainly, attacks on PP are divided into two main categories: 1— Cryptographic attacks 2—Semantic attacks and both are addressed while outsourcing master key K. Data owner, i.e., node 12, computes Secpolicy.sub.0 using k.sub.0 to anonymize the security policy (example of security policy IP1 must not communicate with IP2) using PP(−, k.sub.0) (example of security policy PP(IP1, k.sub.0) must not communicate with PP(IP2, k.sub.0). In one or more embodiments, a security policy defines one or more rules to be applied during the analysis.
(74) Step 2: Data owner: Parameters Generation Log partitioning: Data owner, i.e., node 12, selects a partitioning size R as discussed herein, and assigns different records (r.sub.i) to different partitions (P.sub.j), as discussed herein. Choosing the numbers/quantities of iterations m and n: m represents the quantity of iterations that allows for one to obtain a fully prefix preserving log view, i.e., utility view, and n is the quantity of iteration the analyst needs to apply on a given log trace in total. In one or more embodiments, n and m are respective integers. In one or more embodiments, n and m are integers. Note, the m value corresponds to the fully prefix preserving log/data view, i.e., the view's analysis corresponds to the real/correct/true analysis of the data set. The data owner, i.e., node 12, selects the specific iteration m where the fully prefix preservation is reached (all IP in all records would be prefix-preserved), and the total number/quantity of iteration n (the n value can be any value as long as n>m. Though, the value of n defines a trade-off between the costs and security. As n increases, the security increases as the possible values for m increases. At the same time, a larger n (indicates more iterations and therefore more computation costs) defines the quantity of iteration that the analyst node 14 applies PP to the initially anonymized data, i.e., initialized data. Data owner, i.e., node 12, chooses V.sub.u the coordination at step m. V.sub.u is the ultimate key combination vector to get a fully prefix preserving log among all partitions where all element are identical integers. Let q∈[−B, B] be a uniform random number that is kept secret by the log owner, i.e., node 12, such that B is a fixed and large enough number (e.g., B can be of the order of 100s or 1000s) to increase the privacy property of this process. Let
(75)
of dimension R, where R is the quantity of partitions. Data owner, i.e., node 12, generates a random vector V of dimension R. Data owner, i.e., node 12, computes the initial coordination V.sub.0: Data owner calculates a first combination of applying the key on different partitions of the log.
(76) This is called the initial vector denoted by V.sub.0. V.sub.0 is calculated based on V and V.sub.u and both V.sub.0 and V.sub.u may be kept secret by the log owner. Since the current coordination is the summation of previous coordination with the initial coordination V.sub.0 (i.e. V.sub.0=V.sub.u−m*V), this results in the guarantee that if data log owner initially applies L.sub.1=PP(L, V.sub.0*k), after m iterations, L.sub.m=PP.sup.m(L.sub.1, V*k), the analyst, even ignoring when it will precisely happen, will reach some point L.sub.m, where L.sub.m=L.sub.u=PP(L.sub.1, V.sub.u*k). However, as the analyst, i.e., analyst node 14, ignores m, the analyst will not be able to precisely identify which iteration leads to a fully prefix preserved version of log. Analyst node 14 will actually continue to apply vector V n minus m times. In one or more embodiments, if m times the random vector V is added to the coordination vector V.sub.0, a resulting vector V.sub.u of this addition operation provides prefix preservation of initialed data with respect to the network data during the analysis. As a corollary, the equation can also be written as V.sub.0=V.sub.u−Σ.sub.i=1.sup.mV.sub.i where m vectors V.sub.i are generated randomly, representing each a different combination of k for each partition and for each iteration i. In this case, instead of applying the same matrix V at each iteration, different Vi matrices are applied. In practice this indicates that the PP operations, e.g., application of prefix preserving cryptographic function(s), on different partitions may differ from one iteration to another. Note that as for one approach, at step m, it may have the V.sub.u applied to the data set. To illustrate this, for example, in first iterations k is applied 3 times on P1, P4 and 2 times on P2, and P3. Though, the final number of applications may always q at step m.
(77) Step 3: Data owner: Partition-based PP Anonymization.
(78) Step 4: Analyst: one to many Log generation and Log analysis.
(79) For i=1 to (n) perform do
(80) Apply V on the Li
(81) Apply V on SecPolicy_i
(82) Audit(L_i, SecPolicy_i) and store result as audit_result_i
(83) Step 5: Data owner: Validation of audit results The log owner, i.e., node 12, only considers the audit result done at iteration m. If there is a security breach, the data owner, i.e., node 12, can reverse logs using PP with K and k.sub.0. Reversibility of PP is provided in the appendix document. As a corollary, the audit_result_m can be returned to the data owner, i.e., node 12, using private information retrieval (PIR), which also limits the overhead.
(84) Log Partitioning
(85) In this section, the scheme used to divide the original log into different partitions is described, i.e., describes the partitioning of network data. Partitioning is chosen by the data owner and can be based on any characteristic including IP value, Time stamps, etc. Different partitioning algorithm results in different privacy guarantee.
(86) Partitioning+Pre-Outsource Processing is discussed below. As depicted in
(87) TABLE-US-00001 Algorithm 1: Partitioning and Pre-Processing Input: : original set of network IPs R: Number of partitions Output: IP-Partitions:
.sub.1, ...,
.sub.R based on IP values Partitioning: 1 Divide IPs into R partition based on IP values Pre-outsource Processing: 2 Assign all IPs to maximally disjoint subnets S.sub.1, S.sub.2, ..., S.sub.i 3 Find its biggest subnet S.sub.j and its heavy hitter IP H.sub.j 4 Substitute Heavy Hitter IPs: H.sub.1, H.sub.2, ..., H.sub.i in subnets S.sub.1, S.sub.2, ..., S.sub.i with P P.sup.a.sup.
.sub.1, ...,
.sub.R
(88) Line 3 identifies the so-called “heavy hitter” IP addresses (IPs) in one of the subnets in the log. Heavy hitter IPs corresponds to the most frequent IP address of a subnet. Line 4 and Line 5 help ensure that the relationship among IP addresses, e.g., subnet co-residency, would be kept at iteration u while provide the potential of migration in the meantime.
(89) Experimental Results
(90)
(91) The plots for each cryptography-based algorithm in
(92)
(93) The results illustrated in
(94)
(95) The results illustrated in
(96)
(97)
(98)
(99) Therefore, the disclosure advantageously provides an anonymization technique for IP addresses that preserves IP addresses prefixes while improving privacy and utility and decreasing overhead. The disclosure advantageously partitions the log records into different partitions to be anonymized differently. The disclosure advantageously applies different cryptographic keys on different such that for the same IP address in different partitions corresponds different anonymized IP addresses. As a corollary, different combinations of the same key can be used for different partitions. The disclosure advantageously anonymizes IP addresses in both the log and the security policies for an increased privacy. The solution anonymizes the IP addresses in the security policy using different cryptographic keys consistently with the anonymization of these IP addresses in the anonymized log file. As a corollary, different combinations of the same key can be used for anonymization of the IP addresses in the security policy consistently with the anonymization of these IP addresses in the anonymized log file. The solution proposes a one-to-many mapping of the same log trace to be built and then analyzed by the analyst to increase the privacy benefit of the anonymization solution and to decrease the chances that the analyst learn information from the received log trace or the security policy.
(100) As will be appreciated by one of skill in the art, the concepts described herein may be embodied as a method, data processing system, and/or computer program product. Accordingly, the concepts described herein may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects all generally referred to herein as a “circuit” or “module.” Furthermore, the disclosure may take the form of a computer program product on a tangible computer usable storage medium having computer program code embodied in the medium that can be executed by a computer. Any suitable tangible computer readable medium may be utilized including hard disks, CD-ROMs, electronic storage devices, optical storage devices, or magnetic storage devices.
(101) Some embodiments are described herein with reference to flowchart illustrations and/or block diagrams of methods, systems and computer program products. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general-purpose computer (to thereby create a special purpose computer), special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
(102) These computer program instructions may also be stored in a computer readable memory or storage medium that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture including instruction means which implement the function/act specified in the flowchart and/or block diagram block or blocks.
(103) The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
(104) It is to be understood that the functions/acts noted in the blocks may occur out of the order noted in the operational illustrations. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved. Although some of the diagrams include arrows on communication paths to show a primary direction of communication, it is to be understood that communication may occur in the opposite direction to the depicted arrows.
(105) Computer program code for carrying out operations of the concepts described herein may be written in an object-oriented programming language such as Java® or C++. However, the computer program code for carrying out operations of the disclosure may also be written in conventional procedural programming languages, such as the “C” programming language. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer. In the latter scenario, the remote computer may be connected to the user's computer through a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
(106) Many different embodiments have been disclosed herein, in connection with the above description and the drawings. It will be understood that it would be unduly repetitious and obfuscating to literally describe and illustrate every combination and subcombination of these embodiments. Accordingly, all embodiments can be combined in any way and/or combination, and the present specification, including the drawings, shall be construed to constitute a complete written description of all combinations and subcombinations of the embodiments described herein, and of the manner and process of making and using them, and shall support claims to any such combination or subcombination.
(107) It will be appreciated by persons skilled in the art that the embodiments described herein are not limited to what has been particularly shown and described herein above. In addition, unless mention was made above to the contrary, it should be noted that all of the accompanying drawings are not to scale. A variety of modifications and variations are possible in light of the above teachings