A Real-Time Processing System for Anonymization of Mobile Core Network Traffic

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10067)

Abstract

With the advancement of mobile telecommunication technologies, the effective mining of user data is regard as an very important requirement. However, due to the original data may contain sensitive information about individuals, sharing user dataset can lead to serious privacy breaches, such as the notorious scandal, the privacy leakage of American on Line (AOL). Up to now, there are already existing several available tools or libraries for packet anonymization, like PktAnon, Anonym, Pcaplib. But little research has actually gone into supporting packets in high speed mobile core network which contains several packet encapsulation structure. In this paper, we propose a real-time processing system called ANTW for providing packet anonymization on mobile core network. It involves two mechanisms: First, real-time packet processing, such as decapsulation, decompression and PPP character unescape. Second, packet anonymization which protects the privacy in the sensitive fields of each packet while preserving the utility. We evaluated the performance and availability of ANTW over a wide-area real network. Evaluation results indicate that our system can achieve more than 10 Gbps.

Keywords

Anonymous system Mobile core network Real-time process Hardware acceleration High performance 

References

  1. 1.
    Portable ipro. http://www.exfo.com
  2. 2.
    Farah, T., Trajković, L.: Anonym: a tool for anonymization of the internet traffic. In: 2013 IEEE International Conference on Cybernetics (CYBCONF), pp. 261–266. IEEE (2013)Google Scholar
  3. 3.
    Jacobson, V.: xlp400 series. http://www.broadcom.com/products/Processors
  4. 4.
    Lin, Y.D., Lin, P.C., Wang, S.H., Chen, I.W., Lai, Y.C.: Pcaplib: a system of extracting, classifying, and anonymizing real packet traces (2014)Google Scholar
  5. 5.
    McSherry, F., Mahajan, R.: Differentially-private network trace analysis. In: ACM SIGCOMM Computer Communication Review, vol. 40, pp. 123–134. ACM (2010)Google Scholar
  6. 6.
    Mian, C., Baokang, Z., Jinshu, S.: Terip: a data distribution approach for mobile core network intrusion detection. In: The Fifth CCF Internet Confernece of China (CCF ICOC) (2016)Google Scholar
  7. 7.
    Mian, C., Yipin, S., Jinshu, S.: A real-time pre-processing system for mobile core network measurement. In: The Sixth International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC) (2016)Google Scholar
  8. 8.
    Xu, J., Fan, J., Ammar, M.H., Moon, S.B.: Prefix-preserving ip address anonymization: measurement-based security evaluation and a new cryptography-based scheme. In: Proceedings of the 10th IEEE International Conference on Network Protocols, pp. 280–289. IEEE (2002)Google Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  1. 1.College of ComputerNational University of Defense TechnologyChangshaChina
  2. 2.National Laboratory for Parallel and Distribution ProcessingNational University of Defense TechnologyChangshaChina

Personalised recommendations