Flowrider: Fast On-Demand Key Provisioning for Cloud Networks

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

206 Downloads (Pure)

Abstract

Increasingly fine-grained cloud billing creates incentives to review the software execution footprint in virtual environments. For example, virtual execution environments move towards lower overhead: from virtual machines to containers, unikernels, and serverless cloud computing. However, the execution footprint of security components in virtualized environments has either remained the same or even increased. We present Flowrider, a novel key provisioning mechanism for cloud networks that unlocks scalable use of symmetric keys and significantly reduces the related computational load on network endpoints. We describe the application of Flowrider to common transport security protocols, the results of its formal verification, and its prototype implementation. Our evaluation shows that Florwider uses up to an order of magnitude less CPU to establish a TLS session while preventing by construction some known attacks.
Original languageEnglish
Title of host publicationSecureComm 2021 - Proceedings of the 2021 EAI International Conference on Security and Privacy in Communication Networks
PublisherEAI
Publication statusPublished - 2021
EventEAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks - Virtual, Canterbury (Virtual), United Kingdom
Duration: 2021 Sept 62021 Sept 9

Conference

ConferenceEAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks
Country/TerritoryUnited Kingdom
CityCanterbury (Virtual)
Period2021/09/062021/09/09

Subject classification (UKÄ)

  • Computer Systems

Free keywords

  • Network Security
  • Software Defined Networking
  • Secure Communication
  • Key Management
  • Cloud Security

Fingerprint

Dive into the research topics of 'Flowrider: Fast On-Demand Key Provisioning for Cloud Networks'. Together they form a unique fingerprint.

Cite this