{"id":"https://openalex.org/W2585617513","doi":"https://doi.org/10.1109/glocom.2016.7841497","title":"A Firewall of Two Clouds: Preserving Outsourced Firewall Policy Confidentiality with Heterogeneity","display_name":"A Firewall of Two Clouds: Preserving Outsourced Firewall Policy Confidentiality with Heterogeneity","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2585617513","doi":"https://doi.org/10.1109/glocom.2016.7841497","mag":"2585617513"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2016.7841497","pdf_url":null,"source":{"id":"https://openalex.org/S4363607712","display_name":"2015 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068782320","display_name":"Lingbo Wei","orcid":"https://orcid.org/0000-0003-1222-1006"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"funder","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingbo Wei","raw_affiliation_strings":["CAS Key Laboratory of Electromagnetic Space Information, University of Science and Technology of China, Hefei, P. R. China","Science and Technology on Communication Security Laboratory, Chengdu, P. R. China","State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences, Beijing, P. R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences, Beijing, P. R. China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"CAS Key Laboratory of Electromagnetic Space Information, University of Science and Technology of China, Hefei, P. R. China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, Chengdu, P. R. China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100458193","display_name":"Chi Zhang","orcid":"https://orcid.org/0000-0002-6528-1427"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"funder","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chi Zhang","raw_affiliation_strings":["CAS Key Laboratory of Electromagnetic Space Information, University of Science and Technology of China, Hefei, P. R. China"],"affiliations":[{"raw_affiliation_string":"CAS Key Laboratory of Electromagnetic Space Information, University of Science and Technology of China, Hefei, P. R. China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035287134","display_name":"Yanmin Gong","orcid":"https://orcid.org/0000-0002-1761-2834"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"funder","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yanmin Gong","raw_affiliation_strings":["ECE Department, University of Florida, Gainesville, Florida, USA"],"affiliations":[{"raw_affiliation_string":"ECE Department, University of Florida, Gainesville, Florida, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016290340","display_name":"Yuguang Fang","orcid":"https://orcid.org/0000-0002-1079-3871"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"funder","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuguang Fang","raw_affiliation_strings":["ECE Department, University of Florida, Gainesville, Florida, USA"],"affiliations":[{"raw_affiliation_string":"ECE Department, University of Florida, Gainesville, Florida, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101672513","display_name":"Kefei Chen","orcid":"https://orcid.org/0000-0003-1961-5614"},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"funder","lineage":["https://openalex.org/I163151501"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kefei Chen","raw_affiliation_strings":["School of Science, Hangzhou Normal University, Hangzhou, P. R. China","Science and Technology on Communication Security Laboratory, Chengdu, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Science, Hangzhou Normal University, Hangzhou, P. R. China","institution_ids":["https://openalex.org/I163151501"]},{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, Chengdu, P. R. China","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.437,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":8,"citation_normalized_percentile":{"value":0.560172,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.9141483},{"id":"https://openalex.org/keywords/context-based-access-control","display_name":"Context-based access control","score":0.5605294}],"concepts":[{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.9141483},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7099987},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.70451343},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6943549},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.69144446},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.62001765},{"id":"https://openalex.org/C42934231","wikidata":"https://www.wikidata.org/wiki/Q1128692","display_name":"Context-based access control","level":5,"score":0.5605294},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5534706},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.5098821},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34342173},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1942473},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11988565},{"id":"https://openalex.org/C2776401274","wikidata":"https://www.wikidata.org/wiki/Q3756855","display_name":"Accretion (finance)","level":2,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2016.7841497","pdf_url":null,"source":{"id":"https://openalex.org/S4363607712","display_name":"2015 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.67,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W1510054322","https://openalex.org/W1967074206","https://openalex.org/W2016068847","https://openalex.org/W2056616673","https://openalex.org/W2100566114","https://openalex.org/W2108834246","https://openalex.org/W2134929016","https://openalex.org/W2142972529","https://openalex.org/W2160886020","https://openalex.org/W2256235146","https://openalex.org/W2913753768","https://openalex.org/W3121827341","https://openalex.org/W4242277708","https://openalex.org/W4298527176","https://openalex.org/W7540341","https://openalex.org/W760576894"],"related_works":["https://openalex.org/W8359669","https://openalex.org/W4363647490","https://openalex.org/W2916429898","https://openalex.org/W2583381754","https://openalex.org/W2495628081","https://openalex.org/W2365857366","https://openalex.org/W2361515550","https://openalex.org/W2347324149","https://openalex.org/W2082371893","https://openalex.org/W2057573940"],"abstract_inverted_index":{"It":[0],"is":[1],"increasingly":[2],"common":[3],"for":[4],"enterprises":[5],"and":[6,21,25,58,67,107,115,124,147,164,168],"other":[7],"organizations":[8],"to":[9,12,17,36,51,79,110],"outsource":[10],"firewalls":[11],"public":[13,113],"clouds":[14],"in":[15,23,94],"order":[16],"reduce":[18],"the":[19,37,87,98,101,116,130,141,144,149,157],"cost":[20],"complexity":[22],"deploying":[24],"maintaining":[26],"dedicated":[27],"hardware":[28],"middleboxes.":[29],"However,":[30],"this":[31,63],"poses":[32],"a":[33,69,72],"serious":[34],"threat":[35,150],"enterprise":[38],"network":[39,43,88,137],"security":[40],"because":[41],"sensitive":[42],"policies,":[44],"such":[45],"as":[46],"firewall":[47,102,121,162],"rules,":[48],"are":[49,97],"revealed":[50],"cloud":[52,77],"providers,":[53],"which":[54],"may":[55],"be":[56],"leaked":[57],"exploited":[59],"by":[60,139],"attackers.":[61],"In":[62],"paper,":[64],"we":[65],"design":[66],"implement":[68],"SE-":[70],"FWaaS,":[71],"secured":[73],"system":[74,159],"that":[75],"enables":[76],"providers":[78],"support":[80],"middlebox":[81],"(e.g.,":[82],"firewall)":[83],"outsourcing":[84],"while":[85],"preserving":[86],"policy":[89,105],"confidentiality.":[90],"The":[91],"key":[92],"ingredients":[93],"our":[95],"SE-FWaaS":[96,128],"distribution":[99],"of":[100,119,134,136,143,151],"primitives,":[103],"namely":[104],"checking":[106],"verdict":[108],"enforcing,":[109],"two":[111],"independent":[112],"clouds,":[114],"enabling":[117],"techniques":[118],"efficient":[120],"rule":[122],"obfuscation":[123],"oblivious":[125],"rule-matching.":[126],"Our":[127],"provides":[129],"maximum":[131],"achievable":[132],"level":[133],"protection":[135],"policies":[138],"enforcing":[140],"principle":[142],"least":[145],"privilege":[146],"removing":[148],"offline":[152],"probing":[153],"attacks.":[154],"We":[155],"evaluate":[156],"proposed":[158],"over":[160],"real-world":[161],"rules":[163],"demonstrate":[165],"its":[166],"effectiveness":[167],"feasibility.":[169]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2585617513","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":2}],"updated_date":"2025-04-19T15:26:04.166717","created_date":"2017-02-10"}