Network Transparent Decrypting of Cryptographic Stream Considering Service Provision at the Edge

Hiroki Hiraga, Hiroaki Nishi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The spread of Internet of Things (IoT) devices and high-speed communications, such as 5G, makes their services rich and diverse. Therefore, it is desirable to perform functions of rich services transparently and use edge computing environments flexibly at intermediate locations on the Internet, from the perspective of a network system. When this type of edge computing environment is achieved, IoT nodes as end devices of the Internet can fully utilize edge computing systems and cloud systems without any change, such as switching destination IP addresses between them, along with protocol maintenance for the switching. However, when the data transfer in the communication is encrypted, a decryption method is necessary at the edge, to realize these transparent edge services. In this study, a transparent common key-exchanging method with cloud service has been proposed as the destination node of a communication pair, to transparently decrypt a secure sockets layer-encrypted communication stream at the edge area. This enables end devices to be free from any changes and updates to communicate with the destination node.

Original languageEnglish
Title of host publicationProceedings - 2021 IEEE 19th International Conference on Industrial Informatics, INDIN 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728143958
DOIs
Publication statusPublished - 2021
Event19th IEEE International Conference on Industrial Informatics, INDIN 2021 - Mallorca, Spain
Duration: 2021 Jul 212021 Jul 23

Publication series

NameIEEE International Conference on Industrial Informatics (INDIN)
Volume2021-July
ISSN (Print)1935-4576

Conference

Conference19th IEEE International Conference on Industrial Informatics, INDIN 2021
Country/TerritorySpain
CityMallorca
Period21/7/2121/7/23

Keywords

  • Deep packet inspection
  • Edge computing
  • Encrypted stream decryption
  • Network transparency
  • Secure sockets layer

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'Network Transparent Decrypting of Cryptographic Stream Considering Service Provision at the Edge'. Together they form a unique fingerprint.

Cite this