TY - GEN
T1 - Network Transparent Decrypting of Cryptographic Stream Considering Service Provision at the Edge
AU - Hiraga, Hiroki
AU - Nishi, Hiroaki
N1 - Funding Information:
This work was supported by JST CREST Grant Number JPMJCR19K1 and the commissioned research by National Institute of Information and Communications Technology (NICT, Grant Number 22004) , JAPAN.
Publisher Copyright:
© 2021 IEEE.
PY - 2021
Y1 - 2021
N2 - The spread of Internet of Things (IoT) devices and high-speed communications, such as 5G, makes their services rich and diverse. Therefore, it is desirable to perform functions of rich services transparently and use edge computing environments flexibly at intermediate locations on the Internet, from the perspective of a network system. When this type of edge computing environment is achieved, IoT nodes as end devices of the Internet can fully utilize edge computing systems and cloud systems without any change, such as switching destination IP addresses between them, along with protocol maintenance for the switching. However, when the data transfer in the communication is encrypted, a decryption method is necessary at the edge, to realize these transparent edge services. In this study, a transparent common key-exchanging method with cloud service has been proposed as the destination node of a communication pair, to transparently decrypt a secure sockets layer-encrypted communication stream at the edge area. This enables end devices to be free from any changes and updates to communicate with the destination node.
AB - The spread of Internet of Things (IoT) devices and high-speed communications, such as 5G, makes their services rich and diverse. Therefore, it is desirable to perform functions of rich services transparently and use edge computing environments flexibly at intermediate locations on the Internet, from the perspective of a network system. When this type of edge computing environment is achieved, IoT nodes as end devices of the Internet can fully utilize edge computing systems and cloud systems without any change, such as switching destination IP addresses between them, along with protocol maintenance for the switching. However, when the data transfer in the communication is encrypted, a decryption method is necessary at the edge, to realize these transparent edge services. In this study, a transparent common key-exchanging method with cloud service has been proposed as the destination node of a communication pair, to transparently decrypt a secure sockets layer-encrypted communication stream at the edge area. This enables end devices to be free from any changes and updates to communicate with the destination node.
KW - Deep packet inspection
KW - Edge computing
KW - Encrypted stream decryption
KW - Network transparency
KW - Secure sockets layer
UR - http://www.scopus.com/inward/record.url?scp=85125568332&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85125568332&partnerID=8YFLogxK
U2 - 10.1109/INDIN45523.2021.9557366
DO - 10.1109/INDIN45523.2021.9557366
M3 - Conference contribution
AN - SCOPUS:85125568332
T3 - IEEE International Conference on Industrial Informatics (INDIN)
BT - Proceedings - 2021 IEEE 19th International Conference on Industrial Informatics, INDIN 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 19th IEEE International Conference on Industrial Informatics, INDIN 2021
Y2 - 21 July 2021 through 23 July 2021
ER -