P3LI5: Practical and Confidential Lawful Interception on the 5G Core

Francesco Intoci,Julian Sturm,Daniel Fraunholz,Apostolos Pyrgelis,Colin Barschel
2023-08-28
Abstract:Lawful Interception (LI) is a legal obligation of Communication Service Providers (CSPs) to provide interception capabilities to Law Enforcement Agencies (LEAs) in order to gain insightful data from network communications for criminal proceedings, e.g., network identifiers for tracking suspects. With the privacy-enhancements of network identifiers in the 5th generation of mobile networks (5G), LEAs need to interact with CSPs for network identifier resolution. This raises new privacy issues, as untrusted CSPs are able to infer sensitive information about ongoing investigations, e.g., the identities of their subscribers under suspicion. In this work, we propose P3LI5, a novel system that enables LEAs to privately query CSPs for network identifier resolution leveraging on an information retrieval protocol, SparseWPIR, that is based on private information retrieval and its weakly private version. As such, P3LI5 can be adapted to various operational scenarios with different confidentiality or latency requirements, by selectively allowing a bounded information leakage for improved performance. We implement P3LI5 on the 5G LI infrastructure using well known open-source projects and demonstrate its scalability to large databases while retaining low latency. To the best of our knowledge, P3LI5 is the first proposal for addressing the privacy issues raised by the mandatory requirement for LI on the 5G core network.
Cryptography and Security,Networking and Internet Architecture
What problem does this paper attempt to address?
The paper attempts to address the privacy issues that arise when implementing Lawful Interception (LI) in the 5G core network. Specifically, due to the enhanced privacy protection of user identifiers in 5G networks, law enforcement agencies (LEAs) need to cooperate with communication service providers (CSPs) to obtain identifier information during lawful interception. However, this process may lead to CSPs inferring sensitive information, such as the identity of the person under investigation, by observing the lawful interception interface. Therefore, the paper proposes a new system, P3LI5, which utilizes the weak privacy information retrieval protocol SparseWPIR. This system ensures the accuracy of data queries while reducing the amount of information CSPs can obtain from the query process, thereby protecting the confidentiality of law enforcement activities and user privacy. The P3LI5 system addresses the above issues in the following ways: 1. **Introducing the SparseWPIR protocol**: This is a new method based on private information retrieval (PIR) that allows law enforcement agencies to query identifier information from CSPs in a privacy-preserving manner. 2. **Balancing privacy and performance**: By adjusting the leakage parameter ϵ, the system can find an appropriate balance between privacy protection and query performance. 3. **Adapting to different scenarios**: P3LI5 can selectively allow a certain degree of information leakage to improve performance based on different confidentiality needs or latency requirements. In summary, the paper aims to develop a practical and privacy-preserving lawful interception scheme to address the privacy challenges brought by lawful interception in the 5G network environment.