首页 > 最新文献

Cloud Computing Security Workshop最新文献

英文 中文
Unity: secure and durable personal cloud storage 统一:安全持久的个人云存储
Pub Date : 2012-10-19 DOI: 10.1145/2381913.2381920
Beom Heyn Kim, Wei Huang, D. Lie
Unity provides secure and durable storage for personal data that does not depend on the security or availability of a central service. Instead, Unity exploits the trend towards users having more personal computing devices and the increasing amounts of storage available on those devices. This motivates the design of Unity, which does not store data on the cloud provider at all, but instead leverages the availability of the cloud provider to mount a coordination service that enables a user's devices to provide durable storage for the user's data themselves.
Unity为个人数据提供安全和持久的存储,而不依赖于中央服务的安全性或可用性。相反,Unity利用了用户拥有更多个人计算设备以及这些设备上可用存储容量不断增加的趋势。这激发了Unity的设计,它根本不将数据存储在云提供商上,而是利用云提供商的可用性来安装协调服务,使用户的设备能够为用户的数据自己提供持久的存储。
{"title":"Unity: secure and durable personal cloud storage","authors":"Beom Heyn Kim, Wei Huang, D. Lie","doi":"10.1145/2381913.2381920","DOIUrl":"https://doi.org/10.1145/2381913.2381920","url":null,"abstract":"Unity provides secure and durable storage for personal data that does not depend on the security or availability of a central service. Instead, Unity exploits the trend towards users having more personal computing devices and the increasing amounts of storage available on those devices. This motivates the design of Unity, which does not store data on the cloud provider at all, but instead leverages the availability of the cloud provider to mount a coordination service that enables a user's devices to provide durable storage for the user's data themselves.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"85 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132019018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
LoSt: location based storage LoSt:基于位置的存储
Pub Date : 2012-10-19 DOI: 10.1145/2381913.2381926
Gaven J. Watson, R. Safavi-Naini, Mohsen Alimomeni, M. Locasto, S. Narayan
For certain types of sensitive data (such as health records) it is important to know the geographic location of the file, e.g. that it is stored on servers within the USA. This is particularly important for determining applicable laws and regulations. In this paper we discuss the problem of verifying the location of files within distributed file storage systems such as the cloud. We consider a general setup for a distributed storage system and show that verifying location when such a system is fully malicious, is impossible. We then make plausible assumptions about the behavior of the system and provide a formal definition for Proofs of Location (PoL) in our setting. We show secure and efficient PoL schemes can be constructed by using a geolocation scheme and a Proof of Retrievability (PoR) scheme with a new added property that we call re-coding, which is of independent interest.
对于某些类型的敏感数据(如健康记录),了解文件的地理位置非常重要,例如,它存储在美国境内的服务器上。这对于确定适用的法律和法规尤其重要。本文讨论了在分布式文件存储系统(如云)中验证文件位置的问题。我们考虑了分布式存储系统的一般设置,并表明当这样的系统完全恶意时,验证位置是不可能的。然后,我们对系统的行为做出合理的假设,并在我们的设置中为位置证明(PoL)提供正式的定义。我们展示了安全有效的PoL方案可以通过使用地理定位方案和可检索性证明(PoR)方案来构建,该方案添加了我们称为重编码的新特性,这是一个独立的兴趣。
{"title":"LoSt: location based storage","authors":"Gaven J. Watson, R. Safavi-Naini, Mohsen Alimomeni, M. Locasto, S. Narayan","doi":"10.1145/2381913.2381926","DOIUrl":"https://doi.org/10.1145/2381913.2381926","url":null,"abstract":"For certain types of sensitive data (such as health records) it is important to know the geographic location of the file, e.g. that it is stored on servers within the USA. This is particularly important for determining applicable laws and regulations. In this paper we discuss the problem of verifying the location of files within distributed file storage systems such as the cloud. We consider a general setup for a distributed storage system and show that verifying location when such a system is fully malicious, is impossible. We then make plausible assumptions about the behavior of the system and provide a formal definition for Proofs of Location (PoL) in our setting. We show secure and efficient PoL schemes can be constructed by using a geolocation scheme and a Proof of Retrievability (PoR) scheme with a new added property that we call re-coding, which is of independent interest.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124557805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Towards a richer model of cloud app markets 走向更丰富的云应用市场模式
Pub Date : 2012-10-19 DOI: 10.1145/2381913.2381918
Abhinav Srivastava, V. Ganapathy
Major cloud providers have recently been building cloud markets, which serve as a hosting platform for VMs pre-installed with a variety of software stacks. Clients of cloud computing leverage such markets by downloading and instantiating the VMs that best suit their computing needs, thereby saving the effort needed to configure and build VMs from scratch. This vision paper argues for a richer model of cloud markets. We envision a market of VM apps that can interact with client VMs in a rich set of ways to provide a number of services that are currently supported only by cloud providers. For example, clients can use VM apps to deploy virtual machine introspection-based security tools and various network middleboxes on their work VMs without requiring the cloud provider to deploy these services on their behalf. This paper presents a taxonomy of VM apps, analyzes the key requirements needed to realize such VM apps, and explores the design and trade-offs of various options to implement VM apps.
主要的云提供商最近一直在构建云市场,作为预安装了各种软件栈的虚拟机的托管平台。云计算的客户通过下载和实例化最适合其计算需求的vm来利用这些市场,从而节省了从头开始配置和构建vm所需的工作量。这份远景报告主张建立一个更丰富的云市场模型。我们设想了一个虚拟机应用市场,它可以以丰富的方式与客户端虚拟机交互,提供目前只有云提供商支持的许多服务。例如,客户可以使用VM应用程序在他们的工作VM上部署基于虚拟机自省的安全工具和各种网络中间件,而不需要云提供商代表他们部署这些服务。本文介绍了虚拟机应用程序的分类,分析了实现虚拟机应用程序所需的关键要求,并探讨了实现虚拟机应用程序的各种选项的设计和权衡。
{"title":"Towards a richer model of cloud app markets","authors":"Abhinav Srivastava, V. Ganapathy","doi":"10.1145/2381913.2381918","DOIUrl":"https://doi.org/10.1145/2381913.2381918","url":null,"abstract":"Major cloud providers have recently been building cloud markets, which serve as a hosting platform for VMs pre-installed with a variety of software stacks. Clients of cloud computing leverage such markets by downloading and instantiating the VMs that best suit their computing needs, thereby saving the effort needed to configure and build VMs from scratch.\u0000 This vision paper argues for a richer model of cloud markets. We envision a market of VM apps that can interact with client VMs in a rich set of ways to provide a number of services that are currently supported only by cloud providers. For example, clients can use VM apps to deploy virtual machine introspection-based security tools and various network middleboxes on their work VMs without requiring the cloud provider to deploy these services on their behalf. This paper presents a taxonomy of VM apps, analyzes the key requirements needed to realize such VM apps, and explores the design and trade-offs of various options to implement VM apps.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114577220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
CloudFilter: practical control of sensitive data propagation to the cloud CloudFilter:实际控制敏感数据向云的传播
Pub Date : 2012-10-19 DOI: 10.1145/2381913.2381931
I. Papagiannis, P. Pietzuch
A major obstacle for the adoption of cloud services in enterprises is the potential loss of control over sensitive data. Companies often have to safeguard a subset of their data because it is crucial to their business or they are required to do so by law. In contrast, cloud service providers handle enterprise data without providing guarantees and may put confidentiality at risk. In order to maintain control over their sensitive data, companies typically block all access to a wide range of cloud services at the network level. Such restrictions significantly reduce employee productivity while offering limited practical protection in the presence of malicious employees. In this paper, we suggest a practical mechanism to ensure that an enterprise maintains control of its sensitive data while employees are allowed to use cloud services. We observe that most cloud services use HTTP as a transport protocol. Since HTTP offers well-defined methods to transfer files, inspecting HTTP messages allows the propagation of data between the enterprise and cloud services to be monitored independently of the implementation of specific cloud services. Our system, CloudFilter, intercepts file transfers to cloud services, performs logging and enforces data propagation policies. CloudFilter controls where files propagate after they have been uploaded to the cloud and ensures that only authorised users may gain access. We show that CloudFilter can be applied to control data propagation to Dropbox and GSS, describing the realistic data propagation policies that it can enforce.
企业采用云服务的一个主要障碍是可能失去对敏感数据的控制。公司通常必须保护一部分数据,因为这对他们的业务至关重要,或者法律要求他们这样做。相比之下,云服务提供商在处理企业数据时不提供保证,可能会危及机密性。为了保持对敏感数据的控制,公司通常会在网络层面封锁对各种云服务的所有访问。这种限制大大降低了员工的生产力,同时在恶意员工存在时提供有限的实际保护。在本文中,我们提出了一种实用的机制,以确保企业在允许员工使用云服务的同时保持对其敏感数据的控制。我们观察到,大多数云服务使用HTTP作为传输协议。由于HTTP提供了定义良好的方法来传输文件,因此检查HTTP消息允许独立于特定云服务的实现来监视企业和云服务之间的数据传播。我们的系统,CloudFilter,拦截文件传输到云服务,执行日志记录和执行数据传播策略。CloudFilter控制文件上传到云端后的传播位置,并确保只有授权用户才能访问。我们展示了CloudFilter可以应用于控制数据传播到Dropbox和GSS,描述了它可以执行的实际数据传播策略。
{"title":"CloudFilter: practical control of sensitive data propagation to the cloud","authors":"I. Papagiannis, P. Pietzuch","doi":"10.1145/2381913.2381931","DOIUrl":"https://doi.org/10.1145/2381913.2381931","url":null,"abstract":"A major obstacle for the adoption of cloud services in enterprises is the potential loss of control over sensitive data. Companies often have to safeguard a subset of their data because it is crucial to their business or they are required to do so by law. In contrast, cloud service providers handle enterprise data without providing guarantees and may put confidentiality at risk. In order to maintain control over their sensitive data, companies typically block all access to a wide range of cloud services at the network level. Such restrictions significantly reduce employee productivity while offering limited practical protection in the presence of malicious employees.\u0000 In this paper, we suggest a practical mechanism to ensure that an enterprise maintains control of its sensitive data while employees are allowed to use cloud services. We observe that most cloud services use HTTP as a transport protocol. Since HTTP offers well-defined methods to transfer files, inspecting HTTP messages allows the propagation of data between the enterprise and cloud services to be monitored independently of the implementation of specific cloud services. Our system, CloudFilter, intercepts file transfers to cloud services, performs logging and enforces data propagation policies. CloudFilter controls where files propagate after they have been uploaded to the cloud and ensures that only authorised users may gain access. We show that CloudFilter can be applied to control data propagation to Dropbox and GSS, describing the realistic data propagation policies that it can enforce.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116161751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Detecting co-residency with active traffic analysis techniques 利用主动流量分析技术检测共居者
Pub Date : 2012-10-19 DOI: 10.1145/2381913.2381915
Adam Bates, Benjamin Mood, Joe Pletcher, H. Pruse, Masoud Valafar, Kevin R. B. Butler
Virtualization is the cornerstone of the developing third party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat -- unless perfect isolation is provided by the virtual hypervisor, there exists the possibility for unauthorized access to sensitive customer information through the exploitation of covert side channels. This paper presents co-resident watermarking, a traffic analysis attack that allows a malicious co-resident VM to inject a watermark signature into the network flow of a target instance. This watermark can be used to exfiltrate and broadcast co-residency data from the physical machine, compromising isolation without reliance on internal side channels. As a result, our approach is difficult to defend without costly underutilization of the physical machine. We evaluate co-resident watermarking under a large variety of conditions, system loads and hardware configurations, from a local lab environment to production cloud environments (Futuregrid and the University of Oregon's ACISS). We demonstrate the ability to initiate a covert channel of 4 bits per second, and we can confirm co-residency with a target VM instance in less than 10 seconds. We also show that passive load measurement of the target and subsequent behavior profiling is possible with this attack. Our investigation demonstrates the need for the careful design of hardware to be used in the cloud.
虚拟化是正在发展的第三方计算行业的基石,它允许云提供商在一组物理资源上实例化多个虚拟机(vm)。客户与未知和不受信任的各方一起使用云资源,从而造成共同驻留威胁——除非虚拟管理程序提供完美的隔离,否则存在通过利用隐蔽的侧通道对敏感客户信息进行未经授权访问的可能性。本文提出了一种允许恶意共同驻留虚拟机在目标实例的网络流中注入水印签名的流量分析攻击。该水印可用于从物理机器中渗出和广播共驻留数据,从而在不依赖内部侧信道的情况下折衷隔离。因此,我们的方法很难在不使用物理机器的情况下进行防御。我们在各种条件下评估共同驻地水印,系统负载和硬件配置,从本地实验室环境到生产云环境(Futuregrid和俄勒冈大学的ACISS)。我们演示了启动每秒4位的隐蔽通道的能力,并且我们可以在不到10秒的时间内确认与目标VM实例的共同驻留。我们还表明,这种攻击可以对目标进行被动负载测量和随后的行为分析。我们的调查表明,需要仔细设计用于云的硬件。
{"title":"Detecting co-residency with active traffic analysis techniques","authors":"Adam Bates, Benjamin Mood, Joe Pletcher, H. Pruse, Masoud Valafar, Kevin R. B. Butler","doi":"10.1145/2381913.2381915","DOIUrl":"https://doi.org/10.1145/2381913.2381915","url":null,"abstract":"Virtualization is the cornerstone of the developing third party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat -- unless perfect isolation is provided by the virtual hypervisor, there exists the possibility for unauthorized access to sensitive customer information through the exploitation of covert side channels.\u0000 This paper presents co-resident watermarking, a traffic analysis attack that allows a malicious co-resident VM to inject a watermark signature into the network flow of a target instance. This watermark can be used to exfiltrate and broadcast co-residency data from the physical machine, compromising isolation without reliance on internal side channels. As a result, our approach is difficult to defend without costly underutilization of the physical machine. We evaluate co-resident watermarking under a large variety of conditions, system loads and hardware configurations, from a local lab environment to production cloud environments (Futuregrid and the University of Oregon's ACISS). We demonstrate the ability to initiate a covert channel of 4 bits per second, and we can confirm co-residency with a target VM instance in less than 10 seconds. We also show that passive load measurement of the target and subsequent behavior profiling is possible with this attack. Our investigation demonstrates the need for the careful design of hardware to be used in the cloud.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122072360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Exploiting split browsers for efficiently protecting user data 利用分割浏览器有效地保护用户数据
Pub Date : 2012-10-19 DOI: 10.1145/2381913.2381921
Angeliki Zavou, E. Athanasopoulos, G. Portokalidis, A. Keromytis
Offloading complex tasks to a resource-abundant environment like the cloud, can extend the capabilities of resource constrained mobile devices, extend battery life, and improve user experience. Split browsing is a new paradigm that adopts this strategy to improve web browsing on devices like smartphones and tablets. Split browsers offload computation to the cloud by design; they are composed by two parts, one running on the thin client and one in the cloud. Rendering takes place primarily in the latter, while a bitmap or a simplified web page is communicated to the client. Despite its difference with traditional web browsing, split browsing still suffers from the same types of threats, such as cross-site scripting. In this paper, we propose exploiting the design of split browsers to also utilize cloud resources for protecting against various threats efficiently. We begin by systematically studying split browsing architectures, and then proceed to propose two solutions, in parallel and inline cloning, that exploit the inherent features of this new browsing paradigm to accurately and efficiently protect user data against common web exploits. Our preliminary results suggest that our framework can be efficiently applied to Amazon's Silk, the most widely deployed at the time of writing, split browser.
将复杂的任务卸载到资源丰富的环境(如云),可以扩展资源受限的移动设备的功能,延长电池寿命,并改善用户体验。分屏浏览是一种新的模式,它采用这种策略来改善智能手机和平板电脑等设备上的网页浏览。拆分浏览器通过设计将计算转移到云端;它们由两部分组成,一部分运行在瘦客户机上,另一部分运行在云中。渲染主要发生在后者,而位图或简化的网页则传递给客户端。尽管它与传统的网页浏览方式有所不同,但分割浏览仍然面临着相同类型的威胁,例如跨站点脚本。在本文中,我们建议利用拆分浏览器的设计,也利用云资源来有效地防范各种威胁。我们从系统地研究分裂浏览架构开始,然后提出并行和内联克隆两种解决方案,利用这种新浏览范式的固有特征,准确有效地保护用户数据免受常见web漏洞的攻击。我们的初步结果表明,我们的框架可以有效地应用于Amazon的Silk,这是在撰写本文时部署最广泛的拆分浏览器。
{"title":"Exploiting split browsers for efficiently protecting user data","authors":"Angeliki Zavou, E. Athanasopoulos, G. Portokalidis, A. Keromytis","doi":"10.1145/2381913.2381921","DOIUrl":"https://doi.org/10.1145/2381913.2381921","url":null,"abstract":"Offloading complex tasks to a resource-abundant environment like the cloud, can extend the capabilities of resource constrained mobile devices, extend battery life, and improve user experience. Split browsing is a new paradigm that adopts this strategy to improve web browsing on devices like smartphones and tablets. Split browsers offload computation to the cloud by design; they are composed by two parts, one running on the thin client and one in the cloud. Rendering takes place primarily in the latter, while a bitmap or a simplified web page is communicated to the client. Despite its difference with traditional web browsing, split browsing still suffers from the same types of threats, such as cross-site scripting. In this paper, we propose exploiting the design of split browsers to also utilize cloud resources for protecting against various threats efficiently. We begin by systematically studying split browsing architectures, and then proceed to propose two solutions, in parallel and inline cloning, that exploit the inherent features of this new browsing paradigm to accurately and efficiently protect user data against common web exploits. Our preliminary results suggest that our framework can be efficiently applied to Amazon's Silk, the most widely deployed at the time of writing, split browser.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129160628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Are AES x86 cache timing attacks still feasible? AES x86缓存定时攻击仍然可行吗?
Pub Date : 2012-10-19 DOI: 10.1145/2381913.2381917
K. Mowery, S. Keelveedhi, H. Shacham
We argue that five recent software and hardware developments - the AES-NI instructions, multicore processors with per-core caches, complex modern software, sophisticated prefetchers, and physically tagged caches - combine to make it substantially more difficult to mount data-cache side-channel attacks on AES than previously realized. We propose ways in which some of the challenges posed by these developments might be overcome. We also consider scenarios where side-channel attacks are attractive, and whether our proposed workarounds might be applicable to these scenarios.
我们认为,最近的五种软件和硬件发展——AES- ni指令、带每核缓存的多核处理器、复杂的现代软件、复杂的预取器和物理标记的缓存——结合在一起,使得对AES进行数据缓存侧信道攻击比以前认识到的要困难得多。我们提出了克服这些事态发展所带来的一些挑战的方法。我们还考虑了有吸引力的侧信道攻击的场景,以及我们提出的解决方案是否适用于这些场景。
{"title":"Are AES x86 cache timing attacks still feasible?","authors":"K. Mowery, S. Keelveedhi, H. Shacham","doi":"10.1145/2381913.2381917","DOIUrl":"https://doi.org/10.1145/2381913.2381917","url":null,"abstract":"We argue that five recent software and hardware developments - the AES-NI instructions, multicore processors with per-core caches, complex modern software, sophisticated prefetchers, and physically tagged caches - combine to make it substantially more difficult to mount data-cache side-channel attacks on AES than previously realized. We propose ways in which some of the challenges posed by these developments might be overcome. We also consider scenarios where side-channel attacks are attractive, and whether our proposed workarounds might be applicable to these scenarios.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114253322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Revisiting DNS and WHOIS in the cloud era 重新审视云时代的DNS和WHOIS
Pub Date : 2012-10-19 DOI: 10.1145/2381913.2381929
B. Kaliski
If the Internet is the original cloud, then ubiquitous Internet information services such as the Domain Name System (DNS) and WHOIS are among the classic cloud services. Although protocols from the 1980s running over ports 53 and 43 may appear to be a long way from today's cloud computing model, the services' profile - with points of presence around the world sharing a common data set and fulfilling billions of transactions per day - is much closer to "cloud" than one might expect. Indeed, all five essential characteristics of cloud computing appear, to varying extents, in the implementation of these early examples of the Software as a Service model. In this talk, I'll reintroduce these protocols from a cloud perspective, describe their security mechanisms, including the DNS Security Extensions (DNSSEC), and share some emerging work on next-generation WHOIS in a more contemporary style that should also make it more secure. I'll also explain the essential role that cloud services play in mitigating Distributed Denial of Service (DDoS) attacks.
如果说互联网是原始的云,那么无处不在的互联网信息服务,如域名系统(DNS)和WHOIS就是经典的云服务。尽管运行在53和43端口上的20世纪80年代的协议似乎与今天的云计算模式还有很长的路要走,但服务的轮廓——世界各地的存在点共享一个公共数据集,每天完成数十亿笔交易——比人们想象的更接近“云”。实际上,云计算的所有五个基本特征都在不同程度上出现在软件即服务模型的这些早期示例的实现中。在这次演讲中,我将从云的角度重新介绍这些协议,描述它们的安全机制,包括DNS安全扩展(DNSSEC),并分享一些以更现代风格的下一代WHOIS的新兴工作,这些工作也应该使其更安全。我还将解释云服务在减轻分布式拒绝服务(DDoS)攻击方面发挥的重要作用。
{"title":"Revisiting DNS and WHOIS in the cloud era","authors":"B. Kaliski","doi":"10.1145/2381913.2381929","DOIUrl":"https://doi.org/10.1145/2381913.2381929","url":null,"abstract":"If the Internet is the original cloud, then ubiquitous Internet information services such as the Domain Name System (DNS) and WHOIS are among the classic cloud services. Although protocols from the 1980s running over ports 53 and 43 may appear to be a long way from today's cloud computing model, the services' profile - with points of presence around the world sharing a common data set and fulfilling billions of transactions per day - is much closer to \"cloud\" than one might expect. Indeed, all five essential characteristics of cloud computing appear, to varying extents, in the implementation of these early examples of the Software as a Service model.\u0000 In this talk, I'll reintroduce these protocols from a cloud perspective, describe their security mechanisms, including the DNS Security Extensions (DNSSEC), and share some emerging work on next-generation WHOIS in a more contemporary style that should also make it more secure. I'll also explain the essential role that cloud services play in mitigating Distributed Denial of Service (DDoS) attacks.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122935387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Babel: a secure computer is a polyglot 巴别塔:一台安全的电脑是多语言的
Pub Date : 2012-10-19 DOI: 10.1145/2381913.2381922
John Aycock, Daniel Medeiros Nunes de Castro, M. Locasto, Chris Jarabek
Why should a user's computer be trusted at all? We propose a new model of the computer, Babel, that makes a user's computer appear as it normally would, but is actually untrusted to the point where it cannot run the code installed on it. Each computer, each process, speaks a different language, and a translator on the network, in the cloud, is needed to allow a user's computer to execute code. This has enormous implications. The user gets continuous protection, and multiple kinds of protection, with no need for security updates or patches. At the same time, the user effectively has an adjustable control that they can set based on their risk assessment and need for privacy. Babel can work perfectly well alongside existing systems, and opens new markets for security.
为什么要信任用户的计算机呢?我们提出了一种新的计算机模型Babel,它使用户的计算机看起来像往常一样,但实际上是不可信的,以至于它不能运行安装在它上面的代码。每台计算机、每个进程都使用不同的语言,因此需要网络上、云中的翻译器来允许用户的计算机执行代码。这有巨大的影响。用户获得持续保护,多种保护,无需安全更新或补丁。与此同时,用户可以根据自己的风险评估和隐私需求进行有效的可调节控制。Babel可以与现有系统一起完美地工作,并为安全打开了新的市场。
{"title":"Babel: a secure computer is a polyglot","authors":"John Aycock, Daniel Medeiros Nunes de Castro, M. Locasto, Chris Jarabek","doi":"10.1145/2381913.2381922","DOIUrl":"https://doi.org/10.1145/2381913.2381922","url":null,"abstract":"Why should a user's computer be trusted at all? We propose a new model of the computer, Babel, that makes a user's computer appear as it normally would, but is actually untrusted to the point where it cannot run the code installed on it. Each computer, each process, speaks a different language, and a translator on the network, in the cloud, is needed to allow a user's computer to execute code. This has enormous implications. The user gets continuous protection, and multiple kinds of protection, with no need for security updates or patches. At the same time, the user effectively has an adjustable control that they can set based on their risk assessment and need for privacy. Babel can work perfectly well alongside existing systems, and opens new markets for security.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122449866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards an interpreter for efficient encrypted computation 实现高效加密计算的解释器
Pub Date : 2012-10-19 DOI: 10.1145/2381913.2381928
Christopher W. Fletcher, Marten van Dijk, S. Devadas
Fully homomorphic encryption (FHE) techniques are capable of performing encrypted computation on Boolean circuits, i.e., the user specifies encrypted inputs to the program, and the server computes on the encrypted inputs. Applying these techniques to general programs with recursive procedures and data-dependent loops has not been a focus of attention. In this paper, we take a first step toward building an interpreter that, given programs with complex control flow, schedules efficient code suitable for the application of FHE schemes. We first describe how programs written in a small Turing-complete instruction set can be executed with encrypted data and point out inefficiencies in this methodology. We then provide examples of scheduling (a) the greatest common divisor (GCD) problem using Euclid's algorithm and (b) the 3-Satisfiability (3SAT) problem using a recursive backtracking algorithm into path-levelized FHE computations. We describe how path levelization reduces control flow ambiguity and improves encrypted computation efficiency. Using these techniques and data-dependent loops as a starting point, we then build support for hierarchical programs made up of phases, where each phase corresponds to a fixed point computation that can be used to further improve the efficiency of encrypted computation. In our setting, the adversary learns an estimate of the number of steps required to complete the computation, which we show is the least amount of leakage possible.
完全同态加密(FHE)技术能够在布尔电路上执行加密计算,即用户向程序指定加密输入,服务器在加密输入上进行计算。将这些技术应用于具有递归过程和数据依赖循环的一般程序还不是关注的焦点。在本文中,我们迈出了构建解释器的第一步,对于具有复杂控制流的程序,解释器可以调度适合FHE方案应用的高效代码。我们首先描述了如何用一个小的图灵完全指令集编写的程序可以用加密的数据执行,并指出了这种方法的低效率。然后,我们提供了调度(a)使用欧几里得算法的最大公约数(GCD)问题和(b)使用递归回溯算法的3-可满足性(3SAT)问题到路径级FHE计算的例子。我们描述了路径平准化如何降低控制流模糊性并提高加密计算效率。使用这些技术和数据依赖循环作为起点,然后我们构建了由阶段组成的分层程序的支持,其中每个阶段对应于一个固定点计算,可用于进一步提高加密计算的效率。在我们的设置中,攻击者学习完成计算所需的步数的估计值,我们显示这是可能的最小泄漏量。
{"title":"Towards an interpreter for efficient encrypted computation","authors":"Christopher W. Fletcher, Marten van Dijk, S. Devadas","doi":"10.1145/2381913.2381928","DOIUrl":"https://doi.org/10.1145/2381913.2381928","url":null,"abstract":"Fully homomorphic encryption (FHE) techniques are capable of performing encrypted computation on Boolean circuits, i.e., the user specifies encrypted inputs to the program, and the server computes on the encrypted inputs. Applying these techniques to general programs with recursive procedures and data-dependent loops has not been a focus of attention. In this paper, we take a first step toward building an interpreter that, given programs with complex control flow, schedules efficient code suitable for the application of FHE schemes.\u0000 We first describe how programs written in a small Turing-complete instruction set can be executed with encrypted data and point out inefficiencies in this methodology. We then provide examples of scheduling (a) the greatest common divisor (GCD) problem using Euclid's algorithm and (b) the 3-Satisfiability (3SAT) problem using a recursive backtracking algorithm into path-levelized FHE computations. We describe how path levelization reduces control flow ambiguity and improves encrypted computation efficiency. Using these techniques and data-dependent loops as a starting point, we then build support for hierarchical programs made up of phases, where each phase corresponds to a fixed point computation that can be used to further improve the efficiency of encrypted computation.\u0000 In our setting, the adversary learns an estimate of the number of steps required to complete the computation, which we show is the least amount of leakage possible.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114203843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Cloud Computing Security Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1