International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 287

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 6.8 / 10


     

A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)

Priyanka Padole, Purnima Selokar


Abstract: For securing private network the firewall have been widely used. Based on the policy a firewall checks each incoming and outgoing packet whether to accept or reject the packet. Optimization of firewall policies is important to improve the performance of the network. There are two types of firewall intra firewall and inter firewall. The prior work on optimization of firewall is based on either intra firewall or inter firewall optimization where the privacy of firewall policies is not a concern within one administrative domain. This paper explores inter firewall optimization between two administrative domains. The firewall policies cannot be shared across domains because a firewall policy contains confidential data and potential security holes, which can be attacked by attackers which is a key technical challenge. In this paper, we introduce the commutative encryption for privacy preserving in firewall optimization. The main objective of the application is to remove the redundant rules from two firewall from two different administrative domains without disclosing the actual value of rules to each other. This method preserves the privacy of each firewall.


Keywords: Firewall optimization, privacy preserving, Commutative Encryption


Edition: Volume 3 Issue 11, November 2014


Pages: 2990 - 2992



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Priyanka Padole, Purnima Selokar, "A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 2990-2992, URL: https://www.ijsr.net/getabstract.php?paperid=SUB14139, DOI: https://www.doi.org/10.21275/SUB14139



Downloads: 656 | Views: 2000

Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj


Downloads: 401 | Views: 718

Computer Science & Engineering, India, Volume 7 Issue 11, November 2018

Pages: 1951 - 1955

Hadoop Performance Improvement using Metadata and Securing with Oauth Token

Swapnali A. Salunkhe, Amol B. Rajmane


Downloads: 386 | Views: 698

Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.


Downloads: 354 | Views: 698

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Downloads: 336 | Views: 687

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2148 - 2152

The Impact and Application of 3D Printing Technology

Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera


Top