Secure Outsourcing of Network Flow Data Analysis

Document Type


Publication Date


Subject: LCSH

TCP/IP (Computer network protocol), Data privacy, Computer security, Computer networks--Management, Cloud computing


Computer Engineering | Computer Sciences | Electrical and Computer Engineering


In this paper, we identify a new and challenging application for the growing field of research on data anonymization and secure outsourcing of storage and computations to the cloud. Network flow data analysis is of high importance for network monitoring and management. Network monitoring applications reveal new challenges not yet addressed in the secure outsourcing literature. The secure and verifiable outsourcing of computation on anonymized network flow records provides a practical tool for network operators in order to harness the cloud benefits, which untapped until now because of privacy concerns. We present representative use-cases and problems, and identify sample related work that can be utilized for developing an effective solution.


Article is part of the 2013 IEEE International Congress on Big Data, Santa Clara, CA, USA, 27 June-2 July 2013.

University of New Haven Community can access the full-text through our IEEE Xplore Electronic Library database.



Publisher Citation

M. Nassar, B. al Bouna and Q. Malluhi, "Secure Outsourcing of Network Flow Data Analysis," 2013 IEEE International Congress on Big Data, 2013, pp. 431-432, doi: 10.1109/BigData.Congress.2013.71.

Check your library