Designing privacy preserving router scheduling policies

Sachin Kadloor, Xun Gong, Negar Kiyavash, Parv Venkitasubramaniam

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We study the privacy compromise due to a queuing side channel which arises when a resource is shared between two users in the context of packet networks. The adversary tries to learn about the legitimate users activities by sending a small but frequent probe stream to the shared resource (e.g., a router). We show that for current frequently used scheduling policies, the waiting time of the adversary is highly correlated with traffic pattern of the legitimate user, thus compromising user privacy. Through precise modeling of the constituent flows and the scheduling policy of the shared resource, we develop a dynamic program to compute the optimal privacy preserving policy that minimizes the correlation between users traffic and adversarys waiting times. While the explosion of state-space for the problem prohibits us from characterizing the optimal policy, we derive a sub-optimal policy using a myopic approximation to the problem. Through simulation results, we show that indeed the sub-optimal policy does very well in the high traffic regime. Adapting the intuition from the myopic policy, we propose scheduling policies that demonstrate good tradeoff between privacy and delay in the low and medium traffic regime as well.

Original languageEnglish (US)
Title of host publication2011 45th Annual Conference on Information Sciences and Systems, CISS 2011
DOIs
StatePublished - 2011
Externally publishedYes
Event2011 45th Annual Conference on Information Sciences and Systems, CISS 2011 - Baltimore, MD, United States
Duration: Mar 23 2011Mar 25 2011

Publication series

Name2011 45th Annual Conference on Information Sciences and Systems, CISS 2011

Other

Other2011 45th Annual Conference on Information Sciences and Systems, CISS 2011
Country/TerritoryUnited States
CityBaltimore, MD
Period3/23/113/25/11

ASJC Scopus subject areas

  • Information Systems

Fingerprint

Dive into the research topics of 'Designing privacy preserving router scheduling policies'. Together they form a unique fingerprint.

Cite this