4th International IEEE Conference on Broadband Communications, Networks, Systems

Research Article

SAABCOT: Secure application-agnostic bandwidth conservation techniques

  • @INPROCEEDINGS{10.1109/BROADNETS.2007.4550480,
        author={Chad D.  Mano and David C. Salyers and Qi Liao and Andrew Blaich and Aaron Striegel},
        title={SAABCOT: Secure application-agnostic bandwidth conservation techniques},
        proceedings={4th International IEEE Conference on Broadband Communications, Networks, Systems},
        keywords={Access protocols  Bandwidth  Computer science  Data engineering  Data security  Electronic mail  IP networks  Intelligent networks  Local area networks  Virtual private networks},
  • Chad D. Mano
    David C. Salyers
    Qi Liao
    Andrew Blaich
    Aaron Striegel
    Year: 2010
    SAABCOT: Secure application-agnostic bandwidth conservation techniques
    DOI: 10.1109/BROADNETS.2007.4550480
Chad D. Mano1,*, David C. Salyers2,*, Qi Liao2,*, Andrew Blaich2,*, Aaron Striegel2,*
  • 1: Department of Computer Science Utah State University, Logan, UT 84322 USA
  • 2: Department of Computer Science and Engineering University of Notre Dame, Notre Dame, IN 46556 USA
*Contact email: chad.mano@usu.edu, dsalyers@nd.edu, qliao@nd.edu, ablaich@nd.edu, striegel@nd.edu


High speed modern networks are tasked with moving large amounts of data to diverse groups of interested parties. Often under heavy loads, a significant portion of the data exhibits large amounts of redundancy on short and/or long-term time scales. As a result, a large body of work has emerged offering bandwidth conservation exemplified by the work in caching and multicast. The majority of the techniques that have experienced widespread adoption rely on parsing / reacting to applicationspecific data. With the advent of simplified end-to-end security, as introduced by IPv6, these techniques will no longer have access to the plaintext data. We present a novel technique for preserving security while allowing in-network devices to identify redundant data flows in order to apply bandwidth conservation techniques. Our communication protocol does not require modifications to existing applications nor does it inflict a significant amount of overhead to the existing network infrastructure.