首页 > 最新文献

2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)最新文献

英文 中文
Kernel Paxos
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00037
Emanuele Giuseppe Esposito, Paulo R. Coelho, F. Pedone
State machine replication is a well-known technique to build fault-tolerant replicated systems. The technique guarantees that replicas of a service execute the same sequence of deterministic commands in the same total order. At the core of state machine replication is consensus, a distributed problem in which replicas agree on the next command to be executed. Among the various consensus algorithms proposed, Paxos stands out for its optimized resilience and communication. Much effort has been placed on implementing Paxos efficiently. Existing solutions make use of special network topologies, rely on specialized hardware, or exploit application semantics. Instead of proposing yet another variation of the original Paxos algorithm, this paper proposes a new strategy to increase performance of Paxos-based state machine replication. We introduce Kernel Paxos, an implementation of Paxos that significantly reduces communication overhead by avoiding system calls and TCP/IP stack. To reduce the number of context switches related to system calls, we provide Paxos as a kernel module. We present a detailed performance analysis of Kernel Paxos and compare it to a user-space equivalent implementation.
状态机复制是一种众所周知的构建容错复制系统的技术。该技术保证服务的副本以相同的总顺序执行相同的确定性命令序列。状态机复制的核心是一致性,这是一个分布式问题,其中副本就下一个要执行的命令达成一致。在提出的各种共识算法中,Paxos以其优化的弹性和通信而脱颖而出。为了高效地实现Paxos,已经付出了很多努力。现有的解决方案利用特殊的网络拓扑,依赖专门的硬件,或者利用应用程序语义。本文没有提出原始Paxos算法的另一种变体,而是提出了一种新的策略来提高基于Paxos的状态机复制的性能。我们将介绍Paxos内核,它是Paxos的一种实现,通过避免系统调用和TCP/IP堆栈来显著降低通信开销。为了减少与系统调用相关的上下文切换的数量,我们将Paxos作为内核模块提供。我们对内核Paxos进行了详细的性能分析,并将其与用户空间等效实现进行了比较。
{"title":"Kernel Paxos","authors":"Emanuele Giuseppe Esposito, Paulo R. Coelho, F. Pedone","doi":"10.1109/SRDS.2018.00037","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00037","url":null,"abstract":"State machine replication is a well-known technique to build fault-tolerant replicated systems. The technique guarantees that replicas of a service execute the same sequence of deterministic commands in the same total order. At the core of state machine replication is consensus, a distributed problem in which replicas agree on the next command to be executed. Among the various consensus algorithms proposed, Paxos stands out for its optimized resilience and communication. Much effort has been placed on implementing Paxos efficiently. Existing solutions make use of special network topologies, rely on specialized hardware, or exploit application semantics. Instead of proposing yet another variation of the original Paxos algorithm, this paper proposes a new strategy to increase performance of Paxos-based state machine replication. We introduce Kernel Paxos, an implementation of Paxos that significantly reduces communication overhead by avoiding system calls and TCP/IP stack. To reduce the number of context switches related to system calls, we provide Paxos as a kernel module. We present a detailed performance analysis of Kernel Paxos and compare it to a user-space equivalent implementation.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116870413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adversarially-Resistant On-Demand Topic Channels for Wireless Sensor Networks 无线传感器网络中抗对抗的按需主题通道
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00019
H. Behrens, K. Candan
Wireless sensor networks and other power-efficient devices fill increasingly important roles in modern society. At the same time, they also face increasing internal and external threats, such as node capture or protocol disruption by adversarial agents. Providing reliable and secure service in the face of these challenges remains an ongoing problem, and one that is only exacerbated by the computational and power constraints imposed on these devices. In this paper, we first introduce the concept of on-demand topic channels in the context of ephemeral wireless sensor networks. Then, building on this concept, we introduce three novel messaging protocols to provide secure, authenticated communication between a sensor network and an authorized user while also providing resilience from accidental or adversarial disruption. These protocols leverage homomorphic hashing in innovative ways to trade secrecy against network and computational costs in on-demand topic channel authentication. Finally, we compare and contrast the costs of these protocols, and show that hash-based protocols provide significant implementation-independent improvements to network resilience.
无线传感器网络和其他节能设备在现代社会中扮演着越来越重要的角色。与此同时,它们也面临着越来越多的内部和外部威胁,例如敌对代理的节点捕获或协议中断。面对这些挑战,提供可靠和安全的服务仍然是一个持续存在的问题,而这些设备的计算和功率限制只会加剧这个问题。在本文中,我们首先在瞬态无线传感器网络中引入了按需主题通道的概念。然后,在此概念的基础上,我们引入了三种新的消息传递协议,以在传感器网络和授权用户之间提供安全的、经过身份验证的通信,同时还提供意外或对抗性中断的弹性。这些协议以创新的方式利用同态哈希,在按需主题通道身份验证中对网络和计算成本进行保密。最后,我们比较和对比了这些协议的成本,并表明基于哈希的协议为网络弹性提供了显着的独立于实现的改进。
{"title":"Adversarially-Resistant On-Demand Topic Channels for Wireless Sensor Networks","authors":"H. Behrens, K. Candan","doi":"10.1109/SRDS.2018.00019","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00019","url":null,"abstract":"Wireless sensor networks and other power-efficient devices fill increasingly important roles in modern society. At the same time, they also face increasing internal and external threats, such as node capture or protocol disruption by adversarial agents. Providing reliable and secure service in the face of these challenges remains an ongoing problem, and one that is only exacerbated by the computational and power constraints imposed on these devices. In this paper, we first introduce the concept of on-demand topic channels in the context of ephemeral wireless sensor networks. Then, building on this concept, we introduce three novel messaging protocols to provide secure, authenticated communication between a sensor network and an authorized user while also providing resilience from accidental or adversarial disruption. These protocols leverage homomorphic hashing in innovative ways to trade secrecy against network and computational costs in on-demand topic channel authentication. Finally, we compare and contrast the costs of these protocols, and show that hash-based protocols provide significant implementation-independent improvements to network resilience.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129727425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
[Title page i] [标题页i]
Pub Date : 2018-10-01 DOI: 10.1109/srds.2018.00001
{"title":"[Title page i]","authors":"","doi":"10.1109/srds.2018.00001","DOIUrl":"https://doi.org/10.1109/srds.2018.00001","url":null,"abstract":"","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125180206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Requirements-Driven Methodology for the Proper Selection and Configuration of Blockchains 正确选择和配置区块链的需求驱动方法
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00031
Mirko Staderini, Enrico Schiavone, A. Bondavalli
In recent years, the interest in blockchain has grown exponentially, and nowadays it is foreseen as a technology with the potential to revolutionize the way data is maintained and transferred around the globe. The reason of this excitement is ascribable to the ability of enabling new forms of transactions and interactions between mistrusting and decentralized entities. Indeed, it has attracted interests and huge investments from enterprises, and it is predictable that in a near future many industries will adopt it. However, it is not a panacea and in some cases may even become useless or not convenient. Moreover, even when it can really constitute an added value, selecting the proper blockchain and configuring it may not be trivial. Trying to go beyond the hype and to address this problem, this paper proposes a methodology addressing: i) whether, given a specific problem requirements, the blockchain is a proper solution for it ii) in such a case which is the blockchain category more suitable, and finally iii) guiding the designer throughout its configuration.
近年来,人们对区块链的兴趣呈指数级增长,如今它被认为是一种有可能彻底改变全球数据维护和传输方式的技术。这种兴奋的原因可归因于在不信任和分散的实体之间实现新形式的交易和互动的能力。事实上,它已经吸引了企业的兴趣和巨额投资,可以预见,在不久的将来,许多行业都会采用它。然而,它不是万灵药,在某些情况下甚至可能变得无用或不方便。此外,即使它确实可以构成一个附加价值,选择合适的区块链并对其进行配置也不是一件小事。试图超越炒作并解决这个问题,本文提出了一种方法来解决:i)给定特定的问题需求,区块链是否是合适的解决方案ii)在这种情况下区块链类别更合适,最后iii)指导设计人员进行整个配置。
{"title":"A Requirements-Driven Methodology for the Proper Selection and Configuration of Blockchains","authors":"Mirko Staderini, Enrico Schiavone, A. Bondavalli","doi":"10.1109/SRDS.2018.00031","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00031","url":null,"abstract":"In recent years, the interest in blockchain has grown exponentially, and nowadays it is foreseen as a technology with the potential to revolutionize the way data is maintained and transferred around the globe. The reason of this excitement is ascribable to the ability of enabling new forms of transactions and interactions between mistrusting and decentralized entities. Indeed, it has attracted interests and huge investments from enterprises, and it is predictable that in a near future many industries will adopt it. However, it is not a panacea and in some cases may even become useless or not convenient. Moreover, even when it can really constitute an added value, selecting the proper blockchain and configuring it may not be trivial. Trying to go beyond the hype and to address this problem, this paper proposes a methodology addressing: i) whether, given a specific problem requirements, the blockchain is a proper solution for it ii) in such a case which is the blockchain category more suitable, and finally iii) guiding the designer throughout its configuration.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127547363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
MaskAl: Privacy Preserving Masked Reads Alignment using Intel SGX MaskAl:隐私保护屏蔽读取对齐使用英特尔SGX
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00022
Christoph Lambert, Maria Fernandes, Jérémie Decouchant, P. Veríssimo
The recent introduction of new DNA sequencing techniques caused the amount of processed and stored biological data to skyrocket. In order to process these vast amounts of data, bio-centers have been tempted to use low-cost public clouds. However, genomes are privacy sensitive, since they store personal information about their donors, such as their identity, disease risks, heredity and ethnic origin. The first critical DNA processing step that can be executed in a cloud, i.e., read alignment, consists in finding the location of the DNA sequences produced by a sequencing machine in the human genome. While recent developments aim at increasing performance, only few approaches address the need for fast and privacy preserving read alignment methods. This paper introduces MaskAl, a novel approach for read alignment. MaskAl combines a fast preprocessing step on raw genomic data - filtering and masking - with established algorithms to align sanitized reads, from which sensitive parts have been masked out, and refines the alignment score using the masked out information with Intel's software guard extensions (SGX). MaskAl is a highly competitive privacy-preserving read alignment software that can be massively parallelized with public clouds and emerging enclave clouds. Finally, MaskAl is nearly as accurate as plain-text approaches (more than 96% of aligned reads with MaskAl compared to 98% with BWA) and can process alignment workloads 87% faster than current privacy-preserving approaches while using less memory and network bandwidth.
最近引入的新的DNA测序技术导致处理和存储的生物数据量激增。为了处理这些海量的数据,生物中心一直试图使用低成本的公共云。然而,基因组是隐私敏感的,因为它们存储了捐赠者的个人信息,例如他们的身份、疾病风险、遗传和种族血统。可以在云端执行的第一个关键的DNA处理步骤,即读取比对,包括找到由测序机产生的DNA序列在人类基因组中的位置。虽然最近的发展旨在提高性能,但只有少数方法满足快速和保护隐私的读对齐方法的需求。本文介绍了一种新的读对齐方法MaskAl。MaskAl将原始基因组数据的快速预处理步骤(过滤和屏蔽)与已建立的算法相结合,以对齐经过消毒的读取,其中敏感部分已被屏蔽,并使用英特尔的软件保护扩展(SGX)使用屏蔽信息来优化对齐分数。MaskAl是一款极具竞争力的保护隐私的读取对齐软件,可以与公共云和新兴的飞地云大规模并行。最后,MaskAl几乎与纯文本方法一样准确(使用MaskAl的对齐读取率超过96%,而使用BWA的对齐读取率为98%),并且在使用更少的内存和网络带宽的情况下,处理对齐工作负载的速度比当前的隐私保护方法快87%。
{"title":"MaskAl: Privacy Preserving Masked Reads Alignment using Intel SGX","authors":"Christoph Lambert, Maria Fernandes, Jérémie Decouchant, P. Veríssimo","doi":"10.1109/SRDS.2018.00022","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00022","url":null,"abstract":"The recent introduction of new DNA sequencing techniques caused the amount of processed and stored biological data to skyrocket. In order to process these vast amounts of data, bio-centers have been tempted to use low-cost public clouds. However, genomes are privacy sensitive, since they store personal information about their donors, such as their identity, disease risks, heredity and ethnic origin. The first critical DNA processing step that can be executed in a cloud, i.e., read alignment, consists in finding the location of the DNA sequences produced by a sequencing machine in the human genome. While recent developments aim at increasing performance, only few approaches address the need for fast and privacy preserving read alignment methods. This paper introduces MaskAl, a novel approach for read alignment. MaskAl combines a fast preprocessing step on raw genomic data - filtering and masking - with established algorithms to align sanitized reads, from which sensitive parts have been masked out, and refines the alignment score using the masked out information with Intel's software guard extensions (SGX). MaskAl is a highly competitive privacy-preserving read alignment software that can be massively parallelized with public clouds and emerging enclave clouds. Finally, MaskAl is nearly as accurate as plain-text approaches (more than 96% of aligned reads with MaskAl compared to 98% with BWA) and can process alignment workloads 87% faster than current privacy-preserving approaches while using less memory and network bandwidth.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"49 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133737282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Symposium Organization 研讨会的组织
Pub Date : 2018-10-01 DOI: 10.1109/srds.2018.00007
S. Bouchenak, Sonia Ben Mokhtar, Cécile Favre, Rania Talbi
{"title":"Symposium Organization","authors":"S. Bouchenak, Sonia Ben Mokhtar, Cécile Favre, Rania Talbi","doi":"10.1109/srds.2018.00007","DOIUrl":"https://doi.org/10.1109/srds.2018.00007","url":null,"abstract":"","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122691910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crash-Resilient Decentralized Synchronous Runtime Verification 抗崩溃的分散式同步运行时验证
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00032
Shokoufeh Kazemlou, Borzoo Bonakdarpour
In this paper, we consider runtime verification of synchronous distributed systems, where a decentralized set of monitors that only have a partial view of the system are subject to crash failures. In this context, it is unavoidable that monitors may have different views of the underlying system, and, therefore, have different opinions about the correctness property. We propose an automata-based synchronous monitoring algorithm that copes with t crash monitor failures. Moreover, local monitors do not communicate their explicit reading of the underlying system. Rather, they emit a symbolic verdict that efficiently encodes their partial views. This significantly reduces the communication overhead.
在本文中,我们考虑同步分布式系统的运行时验证,其中一组分散的监视器仅具有系统的部分视图,容易发生崩溃故障。在这种情况下,不可避免的是,监视器可能对底层系统有不同的看法,因此对正确性属性有不同的看法。我们提出了一种基于自动机的同步监控算法来处理崩溃监控的故障。此外,本地监视器不会传达它们对底层系统的显式读取。相反,他们发出一种象征性的判决,有效地编码了他们的部分观点。这大大减少了通信开销。
{"title":"Crash-Resilient Decentralized Synchronous Runtime Verification","authors":"Shokoufeh Kazemlou, Borzoo Bonakdarpour","doi":"10.1109/SRDS.2018.00032","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00032","url":null,"abstract":"In this paper, we consider runtime verification of synchronous distributed systems, where a decentralized set of monitors that only have a partial view of the system are subject to crash failures. In this context, it is unavoidable that monitors may have different views of the underlying system, and, therefore, have different opinions about the correctness property. We propose an automata-based synchronous monitoring algorithm that copes with t crash monitor failures. Moreover, local monitors do not communicate their explicit reading of the underlying system. Rather, they emit a symbolic verdict that efficiently encodes their partial views. This significantly reduces the communication overhead.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"48 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132395822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Security, Performance and Energy Implications of Hardware-Assisted Memory Protection Mechanisms on Event-Based Streaming Systems 基于事件的流系统中硬件辅助内存保护机制的安全性、性能和能源含义
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00042
Christian Göttel, Rafael Pires, Isabelly Rocha, Sébastien Vaucher, P. Felber, Marcelo Pasin, V. Schiavoni
Major cloud providers such as Amazon [1], Google [2] and Microsoft [3] provide nowadays some form of infrastructure as a service (IaaS) which allows deploying services in the form of virtual machines [4], containers [5] or bare-metal [6] instances. Although software-based solutions like homomorphic encryption exit, privacy concerns [7] greatly hinder the deployment of such services over public clouds. It is particularly difficult for homomorphic encryption to match performance requirements of modern workloads [8]. Evaluating simple operations on basic data types with HElib [9], a homomorphic encryption library, against their unencrypted counter part reveals, that homomorphic encryption is still impractical under realistic workloads.
亚马逊[1]、谷歌[2]和微软[3]等主要云提供商如今提供了某种形式的基础设施即服务(IaaS),允许以虚拟机[4]、容器[5]或裸机[6]实例的形式部署服务。尽管基于软件的解决方案,如同态加密退出,隐私问题[7]极大地阻碍了在公共云上部署此类服务。同态加密尤其难以满足现代工作负载的性能要求[8]。用同态加密库HElib[9]对基本数据类型的简单操作与其未加密的对应部分进行比较,可以发现同态加密在现实工作负载下仍然是不切实际的。
{"title":"Security, Performance and Energy Implications of Hardware-Assisted Memory Protection Mechanisms on Event-Based Streaming Systems","authors":"Christian Göttel, Rafael Pires, Isabelly Rocha, Sébastien Vaucher, P. Felber, Marcelo Pasin, V. Schiavoni","doi":"10.1109/SRDS.2018.00042","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00042","url":null,"abstract":"Major cloud providers such as Amazon [1], Google [2] and Microsoft [3] provide nowadays some form of infrastructure as a service (IaaS) which allows deploying services in the form of virtual machines [4], containers [5] or bare-metal [6] instances. Although software-based solutions like homomorphic encryption exit, privacy concerns [7] greatly hinder the deployment of such services over public clouds. It is particularly difficult for homomorphic encryption to match performance requirements of modern workloads [8]. Evaluating simple operations on basic data types with HElib [9], a homomorphic encryption library, against their unencrypted counter part reveals, that homomorphic encryption is still impractical under realistic workloads.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132780232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Information Forwarding through Fragmentation in Delay-Tolerant Networks 容延迟网络中分片转发安全
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00020
Shudip Datta, S. Madria, James R. Milligan, M. Linderman
In application environments like international military coalitions or multi-party relief work in a disaster zone, passing secure messages using Delay Tolerant Networks (DTNs) is challenging because existing public-private key cryptographic approaches may not be always accessible across different groups due to the unavailability of Public Key Infrastructure (PKI). In addition, connectivity may be intermittent so finding the reliable route is also difficult. Thus, instead of sending the complete message in a single packet, fragmenting the messages and sending them via multiple nodes can help achieve better security and reliability when multiple groups are involved. Therefore, encrypting messages before fragmentation and then sending both the data fragments and the key fragments (needed for decryption) provide much higher security. Keys are also fragmented as sending the key in a single packet can hamper security if it is forwarded to some corrupted nodes who may try to tamper or drop it. Hence, in this paper, we develop a scheme to provide improved security by generating multiple key-shares and data fragments and disseminating them via some intermediate nodes. In this fragmentation process, we also create a few redundant blocks to guarantee higher data arrival rate at the destination when message drop rate is higher like in the DTN environment. Our performance evaluation when compared to the most closely related scheme like Multiparty Encryption shows the improvement on minimizing the number of compromised messages as well as reduced bandwidth consumption in the network.
在诸如国际军事联盟或灾区多方救援工作的应用程序环境中,使用容忍延迟网络(dtn)传递安全消息是具有挑战性的,因为由于公钥基础设施(PKI)的不可用性,现有的公私钥加密方法可能并不总是跨不同组访问。此外,连接可能是间歇性的,因此找到可靠的路由也很困难。因此,与其在单个数据包中发送完整的消息,不如将消息分段并通过多个节点发送,这有助于在涉及多个组时实现更好的安全性和可靠性。因此,在分片之前对消息进行加密,然后同时发送数据片段和密钥片段(用于解密),可以提供更高的安全性。密钥也是碎片化的,因为在单个数据包中发送密钥可能会妨碍安全性,如果它被转发到一些可能试图篡改或丢弃它的损坏节点。因此,在本文中,我们开发了一种方案,通过生成多个密钥共享和数据片段并通过一些中间节点传播它们来提供改进的安全性。在此分片过程中,我们还创建了一些冗余块,以保证在DTN环境中消息丢包率较高的情况下,数据到达目的地的速率较高。与多方加密(Multiparty Encryption)等最密切相关的方案相比,我们的性能评估显示,在最小化受损消息数量以及减少网络带宽消耗方面有所改进。
{"title":"Secure Information Forwarding through Fragmentation in Delay-Tolerant Networks","authors":"Shudip Datta, S. Madria, James R. Milligan, M. Linderman","doi":"10.1109/SRDS.2018.00020","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00020","url":null,"abstract":"In application environments like international military coalitions or multi-party relief work in a disaster zone, passing secure messages using Delay Tolerant Networks (DTNs) is challenging because existing public-private key cryptographic approaches may not be always accessible across different groups due to the unavailability of Public Key Infrastructure (PKI). In addition, connectivity may be intermittent so finding the reliable route is also difficult. Thus, instead of sending the complete message in a single packet, fragmenting the messages and sending them via multiple nodes can help achieve better security and reliability when multiple groups are involved. Therefore, encrypting messages before fragmentation and then sending both the data fragments and the key fragments (needed for decryption) provide much higher security. Keys are also fragmented as sending the key in a single packet can hamper security if it is forwarded to some corrupted nodes who may try to tamper or drop it. Hence, in this paper, we develop a scheme to provide improved security by generating multiple key-shares and data fragments and disseminating them via some intermediate nodes. In this fragmentation process, we also create a few redundant blocks to guarantee higher data arrival rate at the destination when message drop rate is higher like in the DTN environment. Our performance evaluation when compared to the most closely related scheme like Multiparty Encryption shows the improvement on minimizing the number of compromised messages as well as reduced bandwidth consumption in the network.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133665398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation 滥用域名以获取乐趣和利益:域名来源验证中的安全问题
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00011
Run Guo, Jianjun Chen, Baojun Liu, Jia Zhang, Chao Zhang, Haixin Duan, Tao Wan, Jian Jiang, S. Hao, Yaoqi Jia
Content Delivery Networks (CDNs) are critical Internet infrastructure. Besides high availability and high performance, CDNs also provide security services such as anti-DoS and Web Application Firewalls to CDN-powered websites. However, the massive resources of CDNs may also be leveraged by attackers exploiting their architectural, implementation, or operational weaknesses. In this paper, we show that today's CDN operation is overly loose in customer-controlled forwarding policy and the lack of origin validation leads to a wide range of abuse cases such as DoS attack and stealthy port scan. We systematically study these abuse cases and demonstrate their feasibility in popular CDNs. Further, we evaluate the impact of these abuses by discovering that there are millions of CDN edge servers, and a substantial fraction of them can be abused. Lastly, we propose mitigation solutions against such abuses and discuss their feasibility.
内容分发网络(cdn)是关键的Internet基础设施。除了高可用性和高性能外,cdn还可以为cdn网站提供防dos、Web应用防火墙等安全服务。然而,攻击者也可能利用cdn的大量资源来利用其架构、实现或操作上的弱点。在本文中,我们表明,今天的CDN运营在客户控制的转发策略上过于宽松,缺乏来源验证导致了DoS攻击和隐形端口扫描等广泛的滥用案例。我们系统地研究了这些滥用案例,并证明了它们在流行的cdn中的可行性。此外,我们评估了这些滥用的影响,发现有数百万的CDN边缘服务器,其中很大一部分可以被滥用。最后,我们提出了针对此类滥用的缓解解决方案,并讨论了其可行性。
{"title":"Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation","authors":"Run Guo, Jianjun Chen, Baojun Liu, Jia Zhang, Chao Zhang, Haixin Duan, Tao Wan, Jian Jiang, S. Hao, Yaoqi Jia","doi":"10.1109/SRDS.2018.00011","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00011","url":null,"abstract":"Content Delivery Networks (CDNs) are critical Internet infrastructure. Besides high availability and high performance, CDNs also provide security services such as anti-DoS and Web Application Firewalls to CDN-powered websites. However, the massive resources of CDNs may also be leveraged by attackers exploiting their architectural, implementation, or operational weaknesses. In this paper, we show that today's CDN operation is overly loose in customer-controlled forwarding policy and the lack of origin validation leads to a wide range of abuse cases such as DoS attack and stealthy port scan. We systematically study these abuse cases and demonstrate their feasibility in popular CDNs. Further, we evaluate the impact of these abuses by discovering that there are millions of CDN edge servers, and a substantial fraction of them can be abused. Lastly, we propose mitigation solutions against such abuses and discuss their feasibility.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133897593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1