{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:12:23Z","timestamp":1775913143795,"version":"3.50.1"},"reference-count":202,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61822207"],"award-info":[{"award-number":["61822207"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["U20B2049"],"award-info":[{"award-number":["U20B2049"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["62132011"],"award-info":[{"award-number":["62132011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["U21B2018"],"award-info":[{"award-number":["U21B2018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61822309"],"award-info":[{"award-number":["61822309"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61773310"],"award-info":[{"award-number":["61773310"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["U1736205"],"award-info":[{"award-number":["U1736205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["62032021"],"award-info":[{"award-number":["62032021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61772236"],"award-info":[{"award-number":["61772236"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2042021gf0006"],"award-info":[{"award-number":["2042021gf0006"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002920","name":"Research Grants Council of Hong Kong","doi-asserted-by":"publisher","award":["CityU 11217819"],"award-info":[{"award-number":["CityU 11217819"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002920","name":"Research Grants Council of Hong Kong","doi-asserted-by":"publisher","award":["CityU 11217620"],"award-info":[{"award-number":["CityU 11217620"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002920","name":"Research Grants Council of Hong Kong","doi-asserted-by":"publisher","award":["R6021-20F"],"award-info":[{"award-number":["R6021-20F"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017582","name":"Beijing National Research Center for Information Science and Technology","doi-asserted-by":"publisher","award":["BNR2020RC01013"],"award-info":[{"award-number":["BNR2020RC01013"]}],"id":[{"id":"10.13039\/501100017582","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"publisher","award":["2020YFB1406900"],"award-info":[{"award-number":["2020YFB1406900"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanxi Province Key Industry Innovation Program","award":["2021ZDLGY01-02"],"award-info":[{"award-number":["2021ZDLGY01-02"]}]},{"name":"Zhejiang Key Research and Development Plan","award":["2019C03133"],"award-info":[{"award-number":["2019C03133"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/jproc.2021.3127277","type":"journal-article","created":{"date-parts":[[2021,12,9]],"date-time":"2021-12-09T21:09:02Z","timestamp":1639084142000},"page":"1888-1919","source":"Crossref","is-referenced-by-count":20,"title":["Building In-the-Cloud Network Functions: Security and Privacy Challenges"],"prefix":"10.1109","volume":"109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5702-7181","authenticated-orcid":false,"given":"Peipei","family":"Jiang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8967-8525","authenticated-orcid":false,"given":"Qian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Muqi","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0547-315X","authenticated-orcid":false,"given":"Cong","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8776-8730","authenticated-orcid":false,"given":"Qi","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6959-0569","authenticated-orcid":false,"given":"Chao","family":"Shen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3441-6277","authenticated-orcid":false,"given":"Kui","family":"Ren","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","year":"2021","journal-title":"Clamav"},{"key":"ref172","first-page":"551","article-title":"DFC: Accelerating string pattern matching for network applications","author":"choi","year":"2016","journal-title":"Proc USENIX NSDI"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/1232919.1232927"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243753"},{"key":"ref176","article-title":"Inferring AS relationships from BGP attributes","volume":"abs 1106 2417","author":"giotsas","year":"2011","journal-title":"CoRR"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/90.929852"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663757"},{"key":"ref177","article-title":"Leveraging BGP dynamics to reverse-engineer routing policies","author":"machiraju","year":"2006"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00192"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_25"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841497"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA.2016.37"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4435"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354204"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761954"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3201595.3201601"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876021"},{"key":"ref36","first-page":"1","article-title":"Privacy-preserving network functionality outsourcing","volume":"abs 1502 389","author":"shi","year":"2015","journal-title":"CoRR"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3065652"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_1"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018439"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_28"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45353-9_31"},{"key":"ref183","year":"2021","journal-title":"DPDK"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10433-6_1"},{"key":"ref189","first-page":"568","article-title":"A secure one-roundtrip index for range queries","author":"boelter","year":"2016","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978345"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876032"},{"key":"ref186","article-title":"Snort intrusion detection system with Intel software guard extension (Intel SGX)","volume":"abs 1802 508","author":"kuvaiskii","year":"2018","journal-title":"CoRR"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2753044"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69471-9_9"},{"key":"ref179","first-page":"218","article-title":"How to play any mental game or a completeness theorem for protocols with honest majority","author":"goldreich","year":"1987","journal-title":"Proc ACM STOC"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03326-2_5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339814"},{"key":"ref22","first-page":"735","article-title":"Achieving keyless CDNs with conclaves","author":"herwig","year":"2020","journal-title":"Proc USENIX Security07"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806681"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787502"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3016785"},{"key":"ref26","first-page":"255","article-title":"Embark: Securely outsourcing middleboxes to the cloud","author":"lan","year":"2016","journal-title":"Proc USENIX NSDI"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524526"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2017.7969150"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3028846"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22174-8_3"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3023386"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674994"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75670-5_17"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23103"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510993"},{"key":"ref151","first-page":"1","article-title":"Innovative technology for CPU based attestation and sealing","author":"anati","year":"2013","journal-title":"Proc Int Workshop Hardw Architectural Secur Privacy"},{"key":"ref146","article-title":"Access pattern disclosure on searchable encryption: Ramification, attack and mitigation","author":"islam","year":"2012","journal-title":"Proc NDSS"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"ref148","first-page":"707","article-title":"All your queries are belong to us: The power of file-injection attacks on searchable encryption","author":"zhang","year":"2016","journal-title":"Proc USENIX Security07"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354213"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2535828.2535831"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342434"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2850333"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2846791"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524346"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2577301"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2238910"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491228"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624187"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.06.015"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0292-y"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2012.31"},{"key":"ref162","first-page":"518","article-title":"Similarity search in high dimensions via hashing","author":"gionis","year":"1999","journal-title":"Proc VLDB"},{"key":"ref161","first-page":"508","article-title":"Multi-key searchable encryption","author":"popa","year":"2018","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44586-2_16"},{"key":"ref4","year":"0","journal-title":"Global NFV Market Size is Projected to Grow From USD 12 9 Billion in 2019 to USD 36 3 Billion by 2024 at a CAGR of 22 9%"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.10.040"},{"key":"ref159","first-page":"1143","article-title":"$\\sum{\\mathrm {o}}\\varphi{\\mathrm {o}}\\varsigma$\n: Forward secure searchable encryption","author":"bost","year":"2016","journal-title":"Proc ACM CCS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0474-9"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2017.8117581"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.002"},{"key":"ref9","year":"2021","journal-title":"Amazon CloudFront"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23298"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143362"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0033"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2940147.2940150"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2811807"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390238"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2978261"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2015.41"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733586"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2859449"},{"key":"ref72","first-page":"162","article-title":"How to generate and exchange secrets (extended abstract)","author":"yao","year":"1986","journal-title":"Proc FOCS"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053013"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00021"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3417988"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700060"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900724"},{"key":"ref79","first-page":"1","article-title":"A survey of privacy-preserving techniques for encrypted traffic inspection over network middleboxes","volume":"abs 2101 4338","author":"poh","year":"2021","journal-title":"CoRR"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7784424"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737435"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2822837"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2991167"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.14"},{"key":"ref65","year":"2021","journal-title":"McAfee Network Security Platform"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.13"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787482"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23547"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143383"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_1"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733615"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485890"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_33"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23052"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_5"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3024883"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231276"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1250586"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_20"},{"key":"ref93","first-page":"1","article-title":"A comprehensive study on load balancers for VNF chains horizontal scaling","volume":"abs 1810 3238","author":"ma","year":"2018","journal-title":"CoRR"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_7"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2014.31"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56617-7_4"},{"key":"ref91","first-page":"523","article-title":"Maglev: A fast and reliable software network load balancer","author":"eisenbud","year":"2016","journal-title":"Proc USENIX NSDI"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.96"},{"key":"ref98","year":"2021","journal-title":"Hulu"},{"key":"ref99","year":"2021","journal-title":"Radioshack Sells Customer Data After Settling With States"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347408"},{"key":"ref97","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/2377677.2377680","article-title":"Making middleboxes someone else&#x2019;s problem: Network processing as a cloud service","author":"sherry","year":"2012","journal-title":"Proc ACM Sigcomm"},{"key":"ref82","article-title":"Bro: A system for detecting network intruders in real-time","author":"paxson","year":"1998","journal-title":"Proc USENIX Security07"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674984"},{"key":"ref84","year":"2021","journal-title":"SNORT"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"ref80","year":"2021","journal-title":"The Perils of Deep Packet Inspection"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2008.4626226"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/253769.253802"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.9"},{"key":"ref87","year":"2021","journal-title":"The netfilter org project"},{"key":"ref88","first-page":"113","article-title":"mOS: A reusable networking stack for flow monitoring middleboxes","author":"jamshed","year":"2017","journal-title":"Proc USENIX NSDI"},{"key":"ref200","first-page":"3345","article-title":"Weaponizing middleboxes for TCP reflected amplification","author":"bock","year":"2021","journal-title":"Proc USENIX Security07"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.24"},{"key":"ref100","year":"2021","journal-title":"Nearly 80% of Companies Experienced a Cloud Data Breach in Past 18 Months"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"ref202","doi-asserted-by":"crossref","first-page":"40:1","DOI":"10.1145\/2480741.2480757","article-title":"A survey of security issues in hardware virtualization","volume":"45","author":"p\u00e9k","year":"2013","journal-title":"ACM Comput Surv"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.94"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_22"},{"key":"ref129","first-page":"610","article-title":"Candidate multilinear maps from ideal lattices and applications","author":"garg","year":"2012","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_26"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"ref131","first-page":"645","article-title":"Graph-induced multilinear maps from lattices","author":"gentry","year":"2014","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_24"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67816-0_15"},{"key":"ref135","first-page":"661","article-title":"Reducing the leakage in practical order-revealing encryption","author":"cash","year":"2016","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref138","first-page":"1125","article-title":"Practical order-revealing encryption with limited leakage","author":"chenette","year":"2015","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.38"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978376"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_19"},{"key":"ref141","first-page":"895","article-title":"Leakage-abuse attacks against order-revealing encryption","author":"grubbs","year":"2016","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978379"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2593444"},{"key":"ref1","year":"2021","journal-title":"Network Functions Virtualisation An Introduction Benefits Enablers Challenges and Call for Action"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2818651"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref108","year":"2021","journal-title":"Tcpcrypt&#x2014;Encrypting the Internet"},{"key":"ref107","author":"seo","year":"2005","journal-title":"Security architecture for the Internet protocol"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2006.881998"},{"key":"ref105","first-page":"179","article-title":"Dissent in numbers: Making strong anonymity scale","author":"wolinsky","year":"2012","journal-title":"Proc USENIX OSDI"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134074"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2465934"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00048"},{"key":"ref112","article-title":"Software grand exposure: SGX Cache attacks are practical","author":"brasser","year":"2017","journal-title":"Proc USENIX Workshop Offensive Technol"},{"key":"ref110","first-page":"817","article-title":"Bohatei: Flexible and elastic DDoS defense","author":"fayaz","year":"2015","journal-title":"Proc USENIX Security07"},{"key":"ref10","year":"2021","journal-title":"Azure Firewall"},{"key":"ref11","year":"2021","journal-title":"Google Networking Services"},{"key":"ref12","year":"2021","journal-title":"VMware Expands Its VMware Ready for Telco Cloud Program to Accelerate the Deployment of 5G Services on Its Telco Cloud Platform"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834100"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.34"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3106989.3106994"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3040992.3040994"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185469"},{"key":"ref117","first-page":"111","article-title":"Fully homomorphic encryption without bootstrapping","volume":"18","author":"brakerski","year":"2011","journal-title":"Electron Colloq Comput Complex"},{"key":"ref18","first-page":"1","article-title":"ISA-based trusted network functions and server applications in the untrusted cloud","volume":"abs 1802 6970","author":"mastorakis","year":"2018","journal-title":"CoRR"},{"key":"ref19","first-page":"201","article-title":"SafeBricks: Shielding network functions in the cloud","author":"poddar","year":"2018","journal-title":"Proc USENIX NSDI"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_22"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_36"},{"key":"ref121","first-page":"187","article-title":"How to exchange secrets with oblivious transfer","author":"rabin","year":"2005","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/357980.358017"},{"key":"ref123","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"rivest","year":"1978","journal-title":"Found Secure Comput"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5\/9645052\/09645060.pdf?arnumber=9645060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,8]],"date-time":"2022-03-08T21:41:47Z","timestamp":1646775707000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9645060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":202,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/jproc.2021.3127277","relation":{},"ISSN":["0018-9219","1558-2256"],"issn-type":[{"value":"0018-9219","type":"print"},{"value":"1558-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]}}}