A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)

Priyanka Padole, Purnima Selokar

For securing private network the firewall have been widely used. Based on the policy a firewall checks each incoming and outgoing packet whether to accept or reject the packet. Optimization of firewall policies is important to improve the performance of the network. There are two types of firewall intra firewall and inter firewall. The prior work on optimization of firewall is based on either intra firewall or inter firewall optimization where the privacy of firewall policies is not a concern within one administrative domain. This paper explores inter firewall optimization between two administrative domains. The firewall policies cannot be shared across domains because a firewall policy contains confidential data and potential security holes, which can be attacked by attackers which is a key technical challenge. In this paper, we introduce the commutative encryption for privacy preserving in firewall optimization. The main objective of the application is to remove the redundant rules from two firewall from two different administrative domains without disclosing the actual value of rules to each other. This method preserves the privacy of each firewall.

Keywords: Firewall optimization, privacy preserving, Commutative Encryption

Edition: Volume 3 Issue 11, November 2014

Pages: 2990 - 2992

Share this Article

How to Cite this Article?

Priyanka Padole, Purnima Selokar, "A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14139, Volume 3 Issue 11, November 2014, 2990 - 2992

89 PDF Views | 60 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Firewall optimization'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1982 - 1985

Review: Firewall Privacy Preservation By Packet Filtering Management

Akshay Dattatray Kachare, Geeta Atkar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2990 - 2992

A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)

Priyanka Padole, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1006 - 1010

Policy Optimization and Anomaly Detection of Firewall

Akshay Dattatray Kachare, Geeta Atkar

Share this Article

Similar Articles with Keyword 'privacy preserving'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1981 - 1983

Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism

Gajendra Singh, Monali V. Ghode

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this Article

Similar Articles with Keyword 'Commutative Encryption'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2990 - 2992

A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)

Priyanka Padole, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 700 - 702

Privacy-Preserving Two-Party Distributed Association Rules Mining on Horizontally Partitioned Data

Patil Suraj Kakaso, Gadage Shriniwas

Share this Article
Top