Privacy Performance Trade-off in Web Services

被引:0
|
作者
Selvam, Hari Hara Sudhan [1 ]
Hanawal, Manjesh K. [2 ]
Kulkarni, Sameer G. [1 ]
机构
[1] Indian Inst Technol Gandhinagar, Palaj, India
[2] Indian Inst Technol, MLiONS Lab, IEOR, Mumbai, Maharashtra, India
关键词
Security; Privacy; HTTP/3; QUIC; TLS; ECH;
D O I
10.1109/LCN60385.2024.10639729
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security and Privacy have become fundamental requirements of modern Internet services. Over the years, both Hypertext Transfer Protocol (HTTP) and Transport Layer Security (TLS) have evolved significantly to meet the performance, privacy and security demands of the web services. However, the usage of Service Name Identity (SNI) in TLS carry service-related information in plain-text, which potentially reveal the user's activity and compromise the privacy. In this work, we analyse the performance, security and privacy trade-offs offered by the recent developments in HTTP and TLS protocols namely HTTP/3 and TLS1.3. Our results indicate the end-to-end performance of HTTP/3 and HTTP/2 to be very similar, but HTTP/3 offers better security and privacy. Further, we quantify the overheads associated with HTTP/3 and find that the computational complexity with HTTP/3 for SNI obfuscation and extraction from 'ClientHello' packets is nearly 10 times more than HTTP/2. Further, we find that the user-space implementations of QUIC in HTTP/3 are more compute-intensive and prone to be unstable. We conclude that a leaner alternative would be the adoption of "Encrypted ClientHello" (ECH), that proposes to overcome this privacy issue by extending TLS 1.3, where all the information that could potentially reveal the service type is encrypted using a public key. The widespread adoption of TLS 1.3 with ECH is imperative to enable complete privacy in web services.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] BIO performance complexity trade-off
    Alshin, Alexander
    Alshina, Elena
    2016 PICTURE CODING SYMPOSIUM (PCS), 2016,
  • [22] Differential Privacy for Anomaly Detection: Analyzing the Trade-Off Between Privacy and Explainability
    Ezzeddine, Fatima
    Saad, Mirna
    Ayoub, Omran
    Andreoletti, Davide
    Gjoreski, Martin
    Sbeity, Ihab
    Langheinrich, Marc
    Giordano, Silvia
    EXPLAINABLE ARTIFICIAL INTELLIGENCE, PT III, XAI 2024, 2024, 2155 : 294 - 318
  • [23] Differential privacy: On the trade-off between utility and information leakage
    INRIA, LIX, Ecole Polytechnique, France
    不详
    Lect. Notes Comput. Sci., (39-54):
  • [24] Privacy-utility trade-off under continual observation
    Erdogdu, Murat A.
    Fawaz, Nadia
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1801 - 1805
  • [25] Privacy protection and utility trade-off for social graph embedding
    Cai, Lin
    Tang, Jinchuan
    Dang, Shuping
    Chen, Gaojie
    INFORMATION SCIENCES, 2024, 676
  • [26] Optimal Accuracy-Privacy Trade-Off for Secure Computations
    Ah-Fat, Patrick
    Huth, Michael
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (05) : 3165 - 3182
  • [27] On Optimizing the Trade-off between Privacy and Utility in Data Provenance
    Deutch, Daniel
    Frankenthal, Ariel
    Gilad, Amir
    Moskovitch, Yuval
    SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2021, : 379 - 391
  • [28] Optimal Accuracy-Privacy Trade-Off of Inference as Service
    Jin, Yulu
    Lai, Lifeng
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2022, 70 : 4031 - 4046
  • [29] Who are you? The trade-off between information utility and privacy
    Miller, Jim
    IEEE INTERNET COMPUTING, 2008, 12 (04) : 93 - 96
  • [30] Athenian University Students on Facebook and Privacy: A Fair "Trade-Off"?
    Papathanassopoulos, Stylianos
    Athanasiadis, Elias
    Xenofontos, Maria
    SOCIAL MEDIA + SOCIETY, 2016, 2 (03):