NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX

J. B. Djoko, Jack Lange, Adam J. Lee
{"title":"NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX","authors":"J. B. Djoko, Jack Lange, Adam J. Lee","doi":"10.1109/DSN.2019.00049","DOIUrl":null,"url":null,"abstract":"With the rising popularity of file-sharing services such as Google Drive and Dropbox in the workflows of individuals and corporations alike, the protection of client-outsourced data from unauthorized access or tampering remains a major security concern. Existing cryptographic solutions to this problem typically require server-side support, involve non-trivial key management on the part of users, and suffer from severe re-encryption penalties upon access revocations. This combination of performance overheads and management burdens makes this class of solutions undesirable in situations where performant, platform-agnostic, dynamic sharing of user content is required. We present NEXUS, a stackable filesystem that leverages trusted hardware to provide confidentiality and integrity for user files stored on untrusted platforms. NEXUS is explicitly designed to balance security, portability, and performance: it supports dynamic sharing of protected volumes on any platform exposing a file access API without requiring server-side support, enables the use of fine-grained access control policies to allow for selective sharing, and avoids the key revocation and file re-encryption overheads associated with other cryptographic approaches to access control. This combination of features is made possible by the use of a client-side Intel SGX enclave that is used to protect and share NEXUS volumes, ensuring that cryptographic keys never leave enclave memory and obviating the need to reencrypt files upon revocation of access rights. We implemented a NEXUS prototype that runs on top of the AFS filesystem and show that it incurs ×2 overhead for a variety of common file and database operations.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DSN.2019.00049","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 21

Abstract

With the rising popularity of file-sharing services such as Google Drive and Dropbox in the workflows of individuals and corporations alike, the protection of client-outsourced data from unauthorized access or tampering remains a major security concern. Existing cryptographic solutions to this problem typically require server-side support, involve non-trivial key management on the part of users, and suffer from severe re-encryption penalties upon access revocations. This combination of performance overheads and management burdens makes this class of solutions undesirable in situations where performant, platform-agnostic, dynamic sharing of user content is required. We present NEXUS, a stackable filesystem that leverages trusted hardware to provide confidentiality and integrity for user files stored on untrusted platforms. NEXUS is explicitly designed to balance security, portability, and performance: it supports dynamic sharing of protected volumes on any platform exposing a file access API without requiring server-side support, enables the use of fine-grained access control policies to allow for selective sharing, and avoids the key revocation and file re-encryption overheads associated with other cryptographic approaches to access control. This combination of features is made possible by the use of a client-side Intel SGX enclave that is used to protect and share NEXUS volumes, ensuring that cryptographic keys never leave enclave memory and obviating the need to reencrypt files upon revocation of access rights. We implemented a NEXUS prototype that runs on top of the AFS filesystem and show that it incurs ×2 overhead for a variety of common file and database operations.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用客户端SGX的非可信存储平台上的实用和安全访问控制
随着Google Drive和Dropbox等文件共享服务在个人和企业工作流程中的日益普及,保护客户外包数据免受未经授权的访问或篡改仍然是一个主要的安全问题。针对此问题的现有加密解决方案通常需要服务器端支持,涉及用户的重要密钥管理,并且在访问撤销时遭受严重的重新加密惩罚。这种性能开销和管理负担的组合使得这类解决方案不适用于需要高性能、与平台无关的动态用户内容共享的情况。我们介绍NEXUS,一个可堆叠的文件系统,它利用可信硬件为存储在不可信平台上的用户文件提供机密性和完整性。NEXUS明确地设计为平衡安全性、可移植性和性能:它支持在任何平台上动态共享受保护的卷,而不需要服务器端支持,公开文件访问API,支持使用细粒度访问控制策略以允许选择性共享,并避免与其他加密访问控制方法相关的密钥撤销和文件重新加密开销。通过使用客户端Intel SGX enclave(用于保护和共享NEXUS卷),这种功能组合成为可能,确保加密密钥永远不会离开enclave内存,并避免在撤销访问权限时重新加密文件的需要。我们实现了一个运行在AFS文件系统之上的NEXUS原型,并表明它会为各种常见的文件和数据库操作带来×2开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Exploiting Memory Corruption Vulnerabilities in Connman for IoT Devices Efficient Treatment of Uncertainty in System Reliability Analysis using Importance Measures Characterizing and Understanding HPC Job Failures Over The 2K-Day Life of IBM BlueGene/Q System PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use POLaR: Per-Allocation Object Layout Randomization
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1