TY - GEN
T1 - Designing privacy preserving router scheduling policies
AU - Kadloor, Sachin
AU - Gong, Xun
AU - Kiyavash, Negar
AU - Venkitasubramaniam, Parv
PY - 2011
Y1 - 2011
N2 - We study the privacy compromise due to a queuing side channel which arises when a resource is shared between two users in the context of packet networks. The adversary tries to learn about the legitimate users activities by sending a small but frequent probe stream to the shared resource (e.g., a router). We show that for current frequently used scheduling policies, the waiting time of the adversary is highly correlated with traffic pattern of the legitimate user, thus compromising user privacy. Through precise modeling of the constituent flows and the scheduling policy of the shared resource, we develop a dynamic program to compute the optimal privacy preserving policy that minimizes the correlation between users traffic and adversarys waiting times. While the explosion of state-space for the problem prohibits us from characterizing the optimal policy, we derive a sub-optimal policy using a myopic approximation to the problem. Through simulation results, we show that indeed the sub-optimal policy does very well in the high traffic regime. Adapting the intuition from the myopic policy, we propose scheduling policies that demonstrate good tradeoff between privacy and delay in the low and medium traffic regime as well.
AB - We study the privacy compromise due to a queuing side channel which arises when a resource is shared between two users in the context of packet networks. The adversary tries to learn about the legitimate users activities by sending a small but frequent probe stream to the shared resource (e.g., a router). We show that for current frequently used scheduling policies, the waiting time of the adversary is highly correlated with traffic pattern of the legitimate user, thus compromising user privacy. Through precise modeling of the constituent flows and the scheduling policy of the shared resource, we develop a dynamic program to compute the optimal privacy preserving policy that minimizes the correlation between users traffic and adversarys waiting times. While the explosion of state-space for the problem prohibits us from characterizing the optimal policy, we derive a sub-optimal policy using a myopic approximation to the problem. Through simulation results, we show that indeed the sub-optimal policy does very well in the high traffic regime. Adapting the intuition from the myopic policy, we propose scheduling policies that demonstrate good tradeoff between privacy and delay in the low and medium traffic regime as well.
UR - http://www.scopus.com/inward/record.url?scp=79957858189&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79957858189&partnerID=8YFLogxK
U2 - 10.1109/CISS.2011.5766104
DO - 10.1109/CISS.2011.5766104
M3 - Conference contribution
AN - SCOPUS:79957858189
SN - 9781424498475
T3 - 2011 45th Annual Conference on Information Sciences and Systems, CISS 2011
BT - 2011 45th Annual Conference on Information Sciences and Systems, CISS 2011
T2 - 2011 45th Annual Conference on Information Sciences and Systems, CISS 2011
Y2 - 23 March 2011 through 25 March 2011
ER -