Skip to main content

Impact of Bloom Filters on Security and Efficiency of SecaaS Services

  • Conference paper
  • First Online:
Multimedia Communications, Services and Security (MCSS 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1284))

  • 468 Accesses


With a rapid growth of cybercrime, security services play a crucial role in protecting modern networks. In order to minimize the costs of deployment and management of the infrastructure, businesses have started outsourcing those services to cloud service providers. A privacy preserving solution becomes necessary to protect confidentiality of a security policy. Therefore, a certain level of false positive packets is introduced using a tree-based structure of security policy and Bloom Filters in a public cloud. This approach results in shading the decision made for each of packets. A conventional firewall placed in a private cloud is responsible for performing the ultimate filtering and dropping all unwanted traffic. Usage of this hybrid cloud model allows to anonymize the security policy itself and reduce the possibility of information gaining after traffic eavesdropping. However, the appropriate choice of Bloom Filters’ parameters is crucial to distribute the load between potentially unlimited public cloud resources and finite private cloud resources. The results of research reveals that lowering the number of false positive packets that have to be filtered within the private cloud has an effect only to some point. Thus, a trade-off between a level of privacy of the security policy and utilization of private cloud can be found. It allows to meet security and performance requirements of the customers of SecaaS services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others


  1. Official Annual Cybercrime Report. Accessed 02 Feb 2020

  2. Gouda, M.G., Liu, X.-Y.A.: Firewall design: consistency, completeness and compactness. In: 24th IEEE International Conference on Distributed Computing Systems (2004)

    Google Scholar 

  3. Cloud Shift Impacts All IT Markets. Accessed 02 Feb 2020

  4. Khakpour, A.R., Liu, A.X.: First step toward cloud-based firewalling. In: 31st IEEE International Symposium on Reliable Distributed Systems, pp. 41–50 (2012)

    Google Scholar 

  5. Kurek, T., Niemiec, M., Lason, A.: Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality. Int. J. Inf. Secur. 15(3), 235–250 (2015).

    Article  Google Scholar 

  6. Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)

    Article  MATH  Google Scholar 

  7. Bloom Indexes in PostgreSQL. Accessed 02 Feb 2020

  8. Chromium Code Review: Transition Safe Browsing from Bloom Filter to Prefix Set. Accessed 02 Feb 2020

  9. Medium: What are Bloom Filters?. Accessed 02 Feb 2020

  10. Maggs, B.M., Sitaraman, R.K.: Algorithmic nuggets in content delivery. ACM SIGCOMM Comput. Commun. 45(3), 52–66 (2015)

    Article  Google Scholar 

  11. Mell, P., Grance, T.: The NIST Definition of Cloud Computing. National Institute of Standards and Technology Special Publication 800-145, Gaithersburg (2016)

    Google Scholar 

  12. Duan, Y., Fu, G., Zhou, N., Sun, X., Narendra, N.C., Hu, B.: Everything as a service (Xaas) on the cloud: origins, current and future trends. In: 8th IEEE International Conference on Cloud Computing, pp. 621–628 (2015)

    Google Scholar 

  13. Duan, Y., Cao, Y., Sun, X.: Various “aaS” of everything as a service. In: 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (2015)

    Google Scholar 

  14. Varadharajan, V., Tupakula, U.: Security as a service model for cloud environment. IEEE Trans. Netw. Serv. Manag. 11, 60–75 (2015)

    Article  Google Scholar 

  15. Kurek, T., Niemiec, M., Lason, A., Pach, A.R.: Universal privacy-preserving platform for SecaaS services. Int. J. Netw. Manag. 27, e1994 (2017)

    Article  Google Scholar 

  16. Fulp, E.W., Tarsa, S.J.: Trie-based policy representations for network firewalls. In: 10th IEEE International Symposium on Computers and Communications, pp. 434–441 (2005)

    Google Scholar 

Download references


This work has been funded by the European Union’s Horizon 2020 Research and Innovation Programme, under Grant Agreement no. 830943, project ECHO (European network of Cybersecurity centres and competence Hub for innovation and Operations).

Author information

Authors and Affiliations


Corresponding author

Correspondence to Marcin Niemiec .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mencner, M., Niemiec, M. (2020). Impact of Bloom Filters on Security and Efficiency of SecaaS Services. In: Dziech, A., Mees, W., Czyżewski, A. (eds) Multimedia Communications, Services and Security. MCSS 2020. Communications in Computer and Information Science, vol 1284. Springer, Cham.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-58999-8

  • Online ISBN: 978-3-030-59000-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics