Research Article
SAABCOT: Secure application-agnostic bandwidth conservation techniques
@INPROCEEDINGS{10.1109/BROADNETS.2007.4550480, author={Chad D. Mano and David C. Salyers and Qi Liao and Andrew Blaich and Aaron Striegel}, title={SAABCOT: Secure application-agnostic bandwidth conservation techniques}, proceedings={4th International IEEE Conference on Broadband Communications, Networks, Systems}, publisher={IEEE}, proceedings_a={BROADNETS}, year={2010}, month={5}, keywords={Access protocols Bandwidth Computer science Data engineering Data security Electronic mail IP networks Intelligent networks Local area networks Virtual private networks}, doi={10.1109/BROADNETS.2007.4550480} }
- Chad D. Mano
David C. Salyers
Qi Liao
Andrew Blaich
Aaron Striegel
Year: 2010
SAABCOT: Secure application-agnostic bandwidth conservation techniques
BROADNETS
IEEE
DOI: 10.1109/BROADNETS.2007.4550480
Abstract
High speed modern networks are tasked with moving large amounts of data to diverse groups of interested parties. Often under heavy loads, a significant portion of the data exhibits large amounts of redundancy on short and/or long-term time scales. As a result, a large body of work has emerged offering bandwidth conservation exemplified by the work in caching and multicast. The majority of the techniques that have experienced widespread adoption rely on parsing / reacting to applicationspecific data. With the advent of simplified end-to-end security, as introduced by IPv6, these techniques will no longer have access to the plaintext data. We present a novel technique for preserving security while allowing in-network devices to identify redundant data flows in order to apply bandwidth conservation techniques. Our communication protocol does not require modifications to existing applications nor does it inflict a significant amount of overhead to the existing network infrastructure.