Polymorphic Encryption and Pseudonymisation of IP Network Flows

Abraham Westerbaan, Luuk Hendriks

Research output: Working paperPreprintAcademic

47 Downloads (Pure)

Abstract

We describe a system, PEP3, for storage and retrieval of IP flow information in which the IP addresses are replaced by pseudonyms. Every eligible party gets its own set of pseudonyms. A single entity, the transcryptor, that is composed of five independent peers, is responsible for the generation of, depseudonymisation of, and translation between different sets of pseudonyms. These operations can be performed by any three of the five peers, preventing a single point of trust or failure. Using homomorphic aspects of ElGamal encryption the peers perform their operations on encrypted and --potentially-- pseudonymised IP addresses only, thereby never learning the (pseudonymised) IP addresses handled by the parties. Moreover, using Schnorr type proofs, the behaviour of the peers can be verified, without revealing the (pseudonymised) IP addresses either. Hence the peers are central, but need not be fully trusted. The design of our system, while easily modified to other settings, is tuned to the sheer volume of data presented by IP flow information.
Original languageEnglish
PublisherArXiv.org
DOIs
Publication statusPublished - 6 Nov 2019

Keywords

  • cs.CR

Fingerprint

Dive into the research topics of 'Polymorphic Encryption and Pseudonymisation of IP Network Flows'. Together they form a unique fingerprint.
  • Polymorphic Encryption and Pseudonymisation of IP Network Flows

    Westerbaan, A. & Hendriks, L., Jun 2020, IFIP Networking 2020 Conference and Workshops, Networking 2020. Piscataway, NJ: IEEE, p. 494-498 5 p. 9142777

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cite this