About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
4th International IEEE Conference on Broadband Communications, Networks, Systems

Research Article

SAABCOT: Secure application-agnostic bandwidth conservation techniques

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/BROADNETS.2007.4550480,
        author={Chad D.  Mano and David C. Salyers and Qi Liao and Andrew Blaich and Aaron Striegel},
        title={SAABCOT: Secure application-agnostic bandwidth conservation techniques},
        proceedings={4th International IEEE Conference on Broadband Communications, Networks, Systems},
        publisher={IEEE},
        proceedings_a={BROADNETS},
        year={2010},
        month={5},
        keywords={Access protocols  Bandwidth  Computer science  Data engineering  Data security  Electronic mail  IP networks  Intelligent networks  Local area networks  Virtual private networks},
        doi={10.1109/BROADNETS.2007.4550480}
    }
    
  • Chad D. Mano
    David C. Salyers
    Qi Liao
    Andrew Blaich
    Aaron Striegel
    Year: 2010
    SAABCOT: Secure application-agnostic bandwidth conservation techniques
    BROADNETS
    IEEE
    DOI: 10.1109/BROADNETS.2007.4550480
Chad D. Mano1,*, David C. Salyers2,*, Qi Liao2,*, Andrew Blaich2,*, Aaron Striegel2,*
  • 1: Department of Computer Science Utah State University, Logan, UT 84322 USA
  • 2: Department of Computer Science and Engineering University of Notre Dame, Notre Dame, IN 46556 USA
*Contact email: chad.mano@usu.edu, dsalyers@nd.edu, qliao@nd.edu, ablaich@nd.edu, striegel@nd.edu

Abstract

High speed modern networks are tasked with moving large amounts of data to diverse groups of interested parties. Often under heavy loads, a significant portion of the data exhibits large amounts of redundancy on short and/or long-term time scales. As a result, a large body of work has emerged offering bandwidth conservation exemplified by the work in caching and multicast. The majority of the techniques that have experienced widespread adoption rely on parsing / reacting to applicationspecific data. With the advent of simplified end-to-end security, as introduced by IPv6, these techniques will no longer have access to the plaintext data. We present a novel technique for preserving security while allowing in-network devices to identify redundant data flows in order to apply bandwidth conservation techniques. Our communication protocol does not require modifications to existing applications nor does it inflict a significant amount of overhead to the existing network infrastructure.

Keywords
Access protocols Bandwidth Computer science Data engineering Data security Electronic mail IP networks Intelligent networks Local area networks Virtual private networks
Published
2010-05-16
Publisher
IEEE
Modified
2010-05-16
http://dx.doi.org/10.1109/BROADNETS.2007.4550480
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL