首页 > 最新文献

Proceedings of the third ACM conference on Data and application security and privacy最新文献

英文 中文
Session details: Mobile-device security and privacy 会议细节:移动设备安全和隐私
A. Pretschner
{"title":"Session details: Mobile-device security and privacy","authors":"A. Pretschner","doi":"10.1145/3260275","DOIUrl":"https://doi.org/10.1145/3260275","url":null,"abstract":"","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116543174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards secure provenance-based access control in cloud environments 在云环境中实现基于来源的安全访问控制
Adam Bates, Benjamin Mood, Masoud Valafar, Kevin R. B. Butler
As organizations become increasingly reliant on cloud computing for servicing their data storage requirements, the need to govern access control at finer granularities becomes particularly important. This challenge is increased by the lack of policy supporting data migration across geographic boundaries and through organizations with divergent regulatory policies. In this paper, we present an architecture for secure and distributed management of provenance, enabling its use in security-critical applications. Provenance, a metadata history detailing the derivation of an object, contains information that allows for expressive, policy-independent access control decisions. We consider how to manage and validate the metadata of a provenance-aware cloud system, and introduce protocols that allow for secure transfer of provenance metadata between end hosts and cloud authorities. Using these protocols, we develop a provenance-based access control mechanism for Cumulus cloud storage, capable of processing thousands of operations per second on a single deployment. Through the introduction of replicated components, we achieve overhead costs of just 14%, demonstrating that provenance-based access control is a practical and scalable solution for the cloud.
随着组织越来越依赖云计算来满足其数据存储需求,以更细粒度管理访问控制的需求变得尤为重要。由于缺乏支持跨地理边界和通过具有不同监管政策的组织进行数据迁移的政策,这一挑战更加严峻。在本文中,我们提出了一种用于安全分布式来源管理的体系结构,使其能够在安全关键应用程序中使用。出处是详细描述对象派生的元数据历史记录,它包含允许进行表达性的、与策略无关的访问控制决策的信息。我们将考虑如何管理和验证具有溯源意识的云系统的元数据,并引入允许在终端主机和云权威之间安全传输溯源元数据的协议。使用这些协议,我们为Cumulus云存储开发了一种基于来源的访问控制机制,能够在单个部署上每秒处理数千个操作。通过引入复制组件,我们实现的开销成本仅为14%,这表明基于溯源的访问控制是一种实用且可扩展的云解决方案。
{"title":"Towards secure provenance-based access control in cloud environments","authors":"Adam Bates, Benjamin Mood, Masoud Valafar, Kevin R. B. Butler","doi":"10.1145/2435349.2435389","DOIUrl":"https://doi.org/10.1145/2435349.2435389","url":null,"abstract":"As organizations become increasingly reliant on cloud computing for servicing their data storage requirements, the need to govern access control at finer granularities becomes particularly important. This challenge is increased by the lack of policy supporting data migration across geographic boundaries and through organizations with divergent regulatory policies. In this paper, we present an architecture for secure and distributed management of provenance, enabling its use in security-critical applications. Provenance, a metadata history detailing the derivation of an object, contains information that allows for expressive, policy-independent access control decisions. We consider how to manage and validate the metadata of a provenance-aware cloud system, and introduce protocols that allow for secure transfer of provenance metadata between end hosts and cloud authorities. Using these protocols, we develop a provenance-based access control mechanism for Cumulus cloud storage, capable of processing thousands of operations per second on a single deployment. Through the introduction of replicated components, we achieve overhead costs of just 14%, demonstrating that provenance-based access control is a practical and scalable solution for the cloud.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129061337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design 你所有保存在浏览器上的密码都属于我们:一个安全分析和一个基于云计算的新设计
Rui Zhao, Chuan Yue
Web users are confronted with the daunting challenges of creating, remembering, and using more and more strong passwords than ever before in order to protect their valuable assets on different websites. Password manager is one of the most popular approaches designed to address these challenges by saving users' passwords and later automatically filling the login forms on behalf of users. Fortunately, all the five most popular Web browsers have provided password managers as a useful built-in feature. Unfortunately, the designs of all those Browser-based Password Managers (BPMs) have severe security vulnerabilities. In this paper, we uncover the vulnerabilities of existing BPMs and analyze how they can be exploited by attackers to crack users' saved passwords. Moreover, we propose a novel Cloud-based Storage-Free BPM (CSF-BPM) design to achieve a high level of security with the desired confidentiality, integrity, and availability properties. We have implemented a CSF-BPM system into Firefox and evaluated its correctness and performance. We believe CSF-BPM is a rational design that can also be integrated into other popular Web browsers.
为了保护自己在不同网站上的宝贵资产,网络用户正面临着创建、记忆和使用比以往任何时候都要强大的密码的艰巨挑战。密码管理器是解决这些问题的最流行的方法之一,它保存用户的密码,然后代表用户自动填写登录表单。幸运的是,所有五种最流行的Web浏览器都将密码管理器作为有用的内置功能提供了。不幸的是,所有这些基于浏览器的密码管理器(bpm)的设计都存在严重的安全漏洞。在本文中,我们揭示了现有bpm的漏洞,并分析了攻击者如何利用它们来破解用户保存的密码。此外,我们提出了一种新的基于云的无存储BPM (CSF-BPM)设计,以实现具有所需机密性、完整性和可用性属性的高级别安全性。我们在Firefox中实现了一个CSF-BPM系统,并评估了它的正确性和性能。我们相信CSF-BPM是一种合理的设计,也可以集成到其他流行的Web浏览器中。
{"title":"All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design","authors":"Rui Zhao, Chuan Yue","doi":"10.1145/2435349.2435397","DOIUrl":"https://doi.org/10.1145/2435349.2435397","url":null,"abstract":"Web users are confronted with the daunting challenges of creating, remembering, and using more and more strong passwords than ever before in order to protect their valuable assets on different websites. Password manager is one of the most popular approaches designed to address these challenges by saving users' passwords and later automatically filling the login forms on behalf of users. Fortunately, all the five most popular Web browsers have provided password managers as a useful built-in feature. Unfortunately, the designs of all those Browser-based Password Managers (BPMs) have severe security vulnerabilities. In this paper, we uncover the vulnerabilities of existing BPMs and analyze how they can be exploited by attackers to crack users' saved passwords. Moreover, we propose a novel Cloud-based Storage-Free BPM (CSF-BPM) design to achieve a high level of security with the desired confidentiality, integrity, and availability properties. We have implemented a CSF-BPM system into Firefox and evaluated its correctness and performance. We believe CSF-BPM is a rational design that can also be integrated into other popular Web browsers.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115464753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Mining parameterized role-based policies 挖掘基于参数化角色的策略
Zhongyuan Xu, S. Stoller
Role-based access control (RBAC) offers significant advantages over lower-level access control policy representations, such as access control lists (ACLs). However, the effort required for a large organization to migrate from ACLs to RBAC can be a significant obstacle to adoption of RBAC. Role mining algorithms partially automate the construction of an RBAC policy from an ACL policy and possibly other information. These algorithms can significantly reduce the cost of migration to RBAC. This paper defines a parameterized RBAC (PRBAC) framework in which users and permissions have attributes that are implicit parameters of roles and can be used in role definitions. Parameterization significantly enhances the scalability of RBAC, by allowing much more concise policies. This paper presents algorithms for mining such policies and reports the results of evaluating the algorithms on case studies. To the best of our knowledge, these are the first policy mining algorithms for a PRBAC framework. An evaluation on three small but non-trivial case studies demonstrates the effectiveness of our algorithms.
基于角色的访问控制(RBAC)与低级访问控制策略表示(如访问控制列表(acl))相比具有显著的优势。然而,大型组织从acl迁移到RBAC所需的努力可能是采用RBAC的一个重大障碍。角色挖掘算法部分地自动化了从ACL策略和可能的其他信息构建RBAC策略的过程。这些算法可以显著降低迁移到RBAC的成本。本文定义了一个参数化RBAC (PRBAC)框架,其中用户和权限具有作为角色隐含参数的属性,可用于角色定义。通过允许更简洁的策略,参数化显著增强了RBAC的可伸缩性。本文提出了挖掘此类策略的算法,并报告了案例研究中评估算法的结果。据我们所知,这些是PRBAC框架的第一个策略挖掘算法。对三个小但不平凡的案例研究的评估证明了我们的算法的有效性。
{"title":"Mining parameterized role-based policies","authors":"Zhongyuan Xu, S. Stoller","doi":"10.1145/2435349.2435384","DOIUrl":"https://doi.org/10.1145/2435349.2435384","url":null,"abstract":"Role-based access control (RBAC) offers significant advantages over lower-level access control policy representations, such as access control lists (ACLs). However, the effort required for a large organization to migrate from ACLs to RBAC can be a significant obstacle to adoption of RBAC. Role mining algorithms partially automate the construction of an RBAC policy from an ACL policy and possibly other information. These algorithms can significantly reduce the cost of migration to RBAC. This paper defines a parameterized RBAC (PRBAC) framework in which users and permissions have attributes that are implicit parameters of roles and can be used in role definitions. Parameterization significantly enhances the scalability of RBAC, by allowing much more concise policies. This paper presents algorithms for mining such policies and reports the results of evaluating the algorithms on case studies. To the best of our knowledge, these are the first policy mining algorithms for a PRBAC framework. An evaluation on three small but non-trivial case studies demonstrates the effectiveness of our algorithms.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128351915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Data usage control enforcement in distributed systems 分布式系统中的数据使用控制实施
Florian Kelbert, A. Pretschner
Distributed usage control is concerned with how data may or may not be used in distributed system environments after initial access has been granted. If data flows through a distributed system, there exist multiple copies of the data on different client machines. Usage constraints then have to be enforced for all these clients. We extend a generic model for intra-system data flow tracking---that has been designed and used to track the existence of copies of data on single clients---to the cross-system case. When transferring, i.e., copying, data from one machine to another, our model makes it possible to (1) transfer usage control policies along with the data to the end of local enforcement at the receiving end, and (2) to be aware of the existence of copies of the data in the distributed system. As one example, we concretize "transfer of data" to the Transmission Control Protocol (TCP). Based on this concretized model, we develop a distributed usage control enforcement infrastructure that generically and application-independently extends the scope of usage control enforcement to any system receiving usage-controlled data. We instantiate and implement our work for OpenBSD and evaluate its security and performance.
分布式使用控制关注的是在授予初始访问权限后,数据在分布式系统环境中可以或不可以如何使用。如果数据流经分布式系统,则在不同的客户机上存在数据的多个副本。然后必须对所有这些客户机实施使用约束。我们将系统内数据流跟踪的通用模型扩展到跨系统情况,该模型已被设计并用于跟踪单个客户机上数据副本的存在性。当传输(即复制)数据从一台机器到另一台机器时,我们的模型使得(1)将使用控制策略与数据一起传输到接收端的本地执行端,以及(2)了解分布式系统中数据副本的存在。例如,我们将“数据传输”具体化为传输控制协议(TCP)。基于这个具体化的模型,我们开发了一个分布式的使用控制实施基础设施,该基础设施将使用控制实施的范围扩展到任何接收使用控制数据的系统。我们为OpenBSD实例化和实现我们的工作,并评估其安全性和性能。
{"title":"Data usage control enforcement in distributed systems","authors":"Florian Kelbert, A. Pretschner","doi":"10.1145/2435349.2435358","DOIUrl":"https://doi.org/10.1145/2435349.2435358","url":null,"abstract":"Distributed usage control is concerned with how data may or may not be used in distributed system environments after initial access has been granted. If data flows through a distributed system, there exist multiple copies of the data on different client machines. Usage constraints then have to be enforced for all these clients. We extend a generic model for intra-system data flow tracking---that has been designed and used to track the existence of copies of data on single clients---to the cross-system case. When transferring, i.e., copying, data from one machine to another, our model makes it possible to (1) transfer usage control policies along with the data to the end of local enforcement at the receiving end, and (2) to be aware of the existence of copies of the data in the distributed system. As one example, we concretize \"transfer of data\" to the Transmission Control Protocol (TCP). Based on this concretized model, we develop a distributed usage control enforcement infrastructure that generically and application-independently extends the scope of usage control enforcement to any system receiving usage-controlled data. We instantiate and implement our work for OpenBSD and evaluate its security and performance.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128087269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
I see we still like C 看来我们还是喜欢C
R. Killough
The latest rankings of computer language popularity once again list C as the most popular programming language [1]. As a computer scientist that has written a lot of C code over the years, I must admit that makes me smile. While I don't write code much anymore, I like writing code, and I like writing it in C. Apparently so do a lot of other people. However, C was also the most popular programming language 25 years ago which is one indication that, in the field of software development, not much has changed. Are software developers unwilling to accept new paradigms or are the new paradigms proposed to-date simply unacceptable? This talk discusses what has and hasn't changed in the area of software development, how change (or the lack of it) relates to application security, and concludes with some thoughts on possible directions for the future.
最新的计算机语言流行度排名再次将C列为最流行的编程语言[1]。作为一名多年来编写了大量C代码的计算机科学家,我必须承认这让我微笑。虽然我不再写太多代码了,但我喜欢写代码,而且我喜欢用c语言写代码。显然,很多人也是这样。然而,C也是25年前最流行的编程语言,这表明,在软件开发领域,没有太大的变化。是软件开发人员不愿意接受新的范式,还是到目前为止提出的新范式根本无法接受?本次演讲讨论了软件开发领域中哪些变化了,哪些没有变化,变化(或缺乏变化)与应用程序安全性之间的关系,并总结了对未来可能方向的一些思考。
{"title":"I see we still like C","authors":"R. Killough","doi":"10.1145/2435349.2435386","DOIUrl":"https://doi.org/10.1145/2435349.2435386","url":null,"abstract":"The latest rankings of computer language popularity once again list C as the most popular programming language [1]. As a computer scientist that has written a lot of C code over the years, I must admit that makes me smile. While I don't write code much anymore, I like writing code, and I like writing it in C. Apparently so do a lot of other people. However, C was also the most popular programming language 25 years ago which is one indication that, in the field of software development, not much has changed. Are software developers unwilling to accept new paradigms or are the new paradigms proposed to-date simply unacceptable? This talk discusses what has and hasn't changed in the area of software development, how change (or the lack of it) relates to application security, and concludes with some thoughts on possible directions for the future.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133067550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insured access: an approach to ad-hoc information sharing for virtual organizations 有保障的访问:一种用于虚拟组织的临时信息共享方法
Naoki Tanaka, M. Winslett, Adam J. Lee, David K. Y. Yau, F. Bao
A virtual organization (VO) is a group of organizations that have banded together to achieve a common goal. Often a VO could function more effectively if its members were willing to share certain information. However, a typical VO member will not want to share its own information because the member will not benefit directly from the information's reuse, yet will be blamed if the reuse turns out badly. In this paper, we present insured access, the first economically sustainable system for encouraging appropriate information sharing in VOs. Before accessing information, a VO member must purchase a liability policy from the insurance arm of the VO. Insured access uses actuarial principles to set up and run the VO's insurance arm, and provides the following benefits: VO members who share their information are compensated if the information is misused, and can expect a positive benefit from sharing; members who use information well are rewarded and those who misuse it are penalized appropriately; and the level of risk-taking in the system is capped at a certain level. We demonstrate the sustainability of insured sharing through simulations of a map-sharing scenario.
虚拟组织(VO)是为实现共同目标而联合在一起的一组组织。通常,如果组织成员愿意分享某些信息,组织就能更有效地发挥作用。然而,典型的VO成员不会想要共享自己的信息,因为成员不会从信息的重用中直接受益,但如果重用结果很糟糕,则会受到指责。在本文中,我们提出了保险访问,这是第一个经济上可持续的系统,以鼓励适当的信息共享。在访问信息之前,VO成员必须从VO的保险部门购买责任保单。保险接入使用精算原理来建立和运营VO的保险部门,并提供以下好处:如果信息被滥用,共享信息的VO成员将获得补偿,并且可以期望从共享中获得积极利益;善用信息的会员将得到奖励,滥用信息的会员将受到适当的惩罚;系统中的风险承担水平被限制在一定水平。我们通过模拟地图共享场景来证明保险共享的可持续性。
{"title":"Insured access: an approach to ad-hoc information sharing for virtual organizations","authors":"Naoki Tanaka, M. Winslett, Adam J. Lee, David K. Y. Yau, F. Bao","doi":"10.1145/2435349.2435393","DOIUrl":"https://doi.org/10.1145/2435349.2435393","url":null,"abstract":"A virtual organization (VO) is a group of organizations that have banded together to achieve a common goal. Often a VO could function more effectively if its members were willing to share certain information. However, a typical VO member will not want to share its own information because the member will not benefit directly from the information's reuse, yet will be blamed if the reuse turns out badly. In this paper, we present insured access, the first economically sustainable system for encouraging appropriate information sharing in VOs. Before accessing information, a VO member must purchase a liability policy from the insurance arm of the VO. Insured access uses actuarial principles to set up and run the VO's insurance arm, and provides the following benefits: VO members who share their information are compensated if the information is misused, and can expect a positive benefit from sharing; members who use information well are rewarded and those who misuse it are penalized appropriately; and the level of risk-taking in the system is capped at a certain level. We demonstrate the sustainability of insured sharing through simulations of a map-sharing scenario.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132008144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
iBigTable: practical data integrity for bigtable in public cloud iBigTable:公有云大表的实用数据完整性
Wei Wei, Ting Yu, Rui Xue
BigTable is a distributed storage system that is designed to manage large-scale structured data. Deploying BigTable in a public cloud is an economic storage solution to small businesses and researchers who need to deal with data processing tasks over large amount of data but often lack capabilities to obtain their own powerful clusters. As one may not always trust the public cloud provider, one important security issue is to ensure the integrity of data managed by BigTable running at the cloud. In this paper, we present iBigTable, an enhancement of BigTable that provides scalable data integrity assurance. We explore the practicality of different authenticated data structure designs for BigTable, and design a set of security protocols to efficiently and flexibly verify the integrity of data returned by BigTable. More importantly, iBigtable preserves the simplicity, applicability and scalability of BigTable, so that existing applications over BigTable can interact with iBigTable seamlessly with minimum or no change of code (depending on the mode of iBigTable). We implement a prototype of iBigTable based on HBase, an open source BigTable implementation. Our experimental results show that iBigTable imposes reasonable performance overhead while providing integrity assurance.
BigTable是一种分布式存储系统,用于管理大规模结构化数据。对于小型企业和研究人员来说,在公共云中部署BigTable是一种经济的存储解决方案,这些企业和研究人员需要处理大量数据的数据处理任务,但往往缺乏获得自己强大集群的能力。由于人们可能并不总是信任公共云提供商,一个重要的安全问题是确保运行在云上的BigTable管理的数据的完整性。在本文中,我们介绍了iBigTable,它是BigTable的增强版,提供可扩展的数据完整性保证。探讨了BigTable不同认证数据结构设计的实用性,设计了一套安全协议,能够高效灵活地验证BigTable返回数据的完整性。更重要的是,iBigtable保留了BigTable的简便性、适用性和可扩展性,因此现有的BigTable应用程序可以与iBigtable无缝交互,而无需更改代码(取决于iBigtable的模式)。我们基于开源的BigTable实现HBase实现了iBigTable的原型。我们的实验结果表明,iBigTable在提供完整性保证的同时施加了合理的性能开销。
{"title":"iBigTable: practical data integrity for bigtable in public cloud","authors":"Wei Wei, Ting Yu, Rui Xue","doi":"10.1145/2435349.2435399","DOIUrl":"https://doi.org/10.1145/2435349.2435399","url":null,"abstract":"BigTable is a distributed storage system that is designed to manage large-scale structured data. Deploying BigTable in a public cloud is an economic storage solution to small businesses and researchers who need to deal with data processing tasks over large amount of data but often lack capabilities to obtain their own powerful clusters. As one may not always trust the public cloud provider, one important security issue is to ensure the integrity of data managed by BigTable running at the cloud. In this paper, we present iBigTable, an enhancement of BigTable that provides scalable data integrity assurance. We explore the practicality of different authenticated data structure designs for BigTable, and design a set of security protocols to efficiently and flexibly verify the integrity of data returned by BigTable. More importantly, iBigtable preserves the simplicity, applicability and scalability of BigTable, so that existing applications over BigTable can interact with iBigTable seamlessly with minimum or no change of code (depending on the mode of iBigTable). We implement a prototype of iBigTable based on HBase, an open source BigTable implementation. Our experimental results show that iBigTable imposes reasonable performance overhead while providing integrity assurance.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116395797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Accepting the inevitable: factoring the user into home computer security 接受不可避免的事实:将用户纳入家庭计算机安全
Malgorzata Urbanska, M. Roberts, I. Ray, A. Howe, Zinta S. Byrne
Home computer users present unique challenges to computer security. A user's actions frequently affect security without the user understanding how. Moreover, whereas some home users are quite adept at protecting their machines from security threats, a vast majority are not. Current generation security tools, unfortunately, do not tailor security to the home user's needs and actions. In this work, we propose Personalized Attack Graphs (PAG) as a formal technique to model the security risks for the home computer informed by a profile of the user attributes such as preferences, threat perceptions and activities. A PAG also models the interplay between user activities and preferences, attacker strategies, and system activities within the system risk model. We develop a formal model of a user profile to personalize a single, monolithic PAG to different users, and show how to use the user profile to predict user actions.
家用电脑用户对计算机安全提出了独特的挑战。用户的操作经常在用户不了解的情况下影响安全性。此外,尽管一些家庭用户非常擅长保护他们的机器免受安全威胁,但绝大多数人都不是。不幸的是,当前一代的安全工具不能根据家庭用户的需求和行为来定制安全。在这项工作中,我们提出了个性化攻击图(PAG)作为一种正式技术,通过用户属性(如偏好、威胁感知和活动)的配置文件来建模家用计算机的安全风险。PAG还对系统风险模型中的用户活动和首选项、攻击者策略和系统活动之间的相互作用进行建模。我们开发了一个用户配置文件的形式化模型,为不同的用户个性化单个整体PAG,并展示了如何使用用户配置文件来预测用户操作。
{"title":"Accepting the inevitable: factoring the user into home computer security","authors":"Malgorzata Urbanska, M. Roberts, I. Ray, A. Howe, Zinta S. Byrne","doi":"10.1145/2435349.2435396","DOIUrl":"https://doi.org/10.1145/2435349.2435396","url":null,"abstract":"Home computer users present unique challenges to computer security. A user's actions frequently affect security without the user understanding how. Moreover, whereas some home users are quite adept at protecting their machines from security threats, a vast majority are not. Current generation security tools, unfortunately, do not tailor security to the home user's needs and actions. In this work, we propose Personalized Attack Graphs (PAG) as a formal technique to model the security risks for the home computer informed by a profile of the user attributes such as preferences, threat perceptions and activities. A PAG also models the interplay between user activities and preferences, attacker strategies, and system activities within the system risk model. We develop a formal model of a user profile to personalize a single, monolithic PAG to different users, and show how to use the user profile to predict user actions.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125312788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Linking anonymous location traces through driving characteristics 通过驾驶特征链接匿名位置痕迹
Bin Zan, Zhanbo Sun, M. Gruteser, X. Ban
Efforts to anonymize collections of location traces have often sought to reduce re-identification risks by dividing longer traces into multiple shorter, unlinkable segments. To ensure unlinkability, these algorithms delete parts from each location trace in areas where multiple traces converge, so that it is difficult to predict the movements of any one subject within this area and identify which follow-on trace segments belongs to the same subject. In this paper, we ask whether it is sufficient to base the definition of unlinkability on movement prediction models or whether the revealed trace segments themselves contain a fingerprint of the data subject that can be used to link segments and ultimately recover private information. To this end, we study a large set of vehicle locations traces collected through the Next Generation Simulation program. We first show that using vehicle moving characteristics related features, it is possible to identify outliers such as trucks or motorcycles from general passenger automobiles. We then show that even in a dataset containing similar passenger automobiles only, it is possible to use outlier driving behaviors to link a fraction of the vehicle trips. These results show that the definition of unlinkability may have to be extended for very precise location traces.
对位置痕迹进行匿名化处理的方法通常是将较长的痕迹分成多个较短的、不可链接的片段,以减少重新识别的风险。为了保证不可链接性,这些算法在多个轨迹收敛的区域中删除每个位置轨迹中的部分,因此难以预测该区域内任何一个目标的运动,也难以识别哪些后续轨迹段属于同一目标。在本文中,我们的问题是,将不可链接性的定义建立在运动预测模型的基础上是否足够,或者揭示的跟踪段本身是否包含数据主体的指纹,该指纹可用于链接段并最终恢复私有信息。为此,我们研究了通过下一代仿真程序收集的大量车辆位置轨迹。我们首先表明,使用车辆移动特征相关特征,可以从一般乘用车中识别出异常值,如卡车或摩托车。然后,我们表明,即使在只包含类似乘用车的数据集中,也可以使用离群驾驶行为来链接一小部分车辆行程。这些结果表明,对于非常精确的位置轨迹,不可链接性的定义可能必须扩展。
{"title":"Linking anonymous location traces through driving characteristics","authors":"Bin Zan, Zhanbo Sun, M. Gruteser, X. Ban","doi":"10.1145/2435349.2435391","DOIUrl":"https://doi.org/10.1145/2435349.2435391","url":null,"abstract":"Efforts to anonymize collections of location traces have often sought to reduce re-identification risks by dividing longer traces into multiple shorter, unlinkable segments. To ensure unlinkability, these algorithms delete parts from each location trace in areas where multiple traces converge, so that it is difficult to predict the movements of any one subject within this area and identify which follow-on trace segments belongs to the same subject. In this paper, we ask whether it is sufficient to base the definition of unlinkability on movement prediction models or whether the revealed trace segments themselves contain a fingerprint of the data subject that can be used to link segments and ultimately recover private information. To this end, we study a large set of vehicle locations traces collected through the Next Generation Simulation program. We first show that using vehicle moving characteristics related features, it is possible to identify outliers such as trucks or motorcycles from general passenger automobiles. We then show that even in a dataset containing similar passenger automobiles only, it is possible to use outlier driving behaviors to link a fraction of the vehicle trips. These results show that the definition of unlinkability may have to be extended for very precise location traces.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125842008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
Proceedings of the third ACM conference on Data and application security and privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1