Polymorphic Encryption and Pseudonymisation of IP Network Flows

  • Abraham Westerbaan
  • , Luuk Hendriks

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Abstract

We describe a system, PEP3, for storage and retrieval of IP flow information in which the IP addresses are replaced by pseudonyms. Every eligible party gets its own set of pseudonyms. A single entity, the transcryptor, that is composed of five independent peers, is responsible for the generation of, depseudonymisation of, and translation between different sets of pseudonyms. These operations can be performed by any three of the five peers, preventing a single point of trust or failure. Using homomorphic aspects of ElGamal encryption the peers perform their operations on encrypted -and potentially- pseudonymised IP addresses only, thereby never learning the (pseudonymised) IP addresses handled by the parties. Moreover, using Schnorr type proofs, the behaviour of the peers can be verified, without revealing the (pseudonymised) IP addresses either. Hence the peers are central, but need not be fully trusted. The design of our system, while easily modified to other settings, is tuned to the sheer volume of data presented by IP flow information.

Original languageEnglish
Title of host publicationIFIP Networking 2020 Conference and Workshops, Networking 2020
Place of PublicationPiscataway, NJ
PublisherIEEE
Pages494-498
Number of pages5
ISBN (Electronic)978-3-903176-28-7
ISBN (Print)978-1-7281-6710-7
Publication statusPublished - Jun 2020
EventIFIP Networking Conference and Workshops, Networking 2020 - Paris, France
Duration: 22 Jun 202025 Jun 2020

Conference

ConferenceIFIP Networking Conference and Workshops, Networking 2020
Country/TerritoryFrance
CityParis
Period22/06/2025/06/20

Keywords

  • Network flow
  • Polymorphic encryption and pseudonymisation

Fingerprint

Dive into the research topics of 'Polymorphic Encryption and Pseudonymisation of IP Network Flows'. Together they form a unique fingerprint.

Cite this