首页 > 最新文献

Proceedings of the 2016 ACM on Cloud Computing Security Workshop最新文献

英文 中文
Assured Deletion in the Cloud: Requirements, Challenges and Future Directions 云中的保证删除:需求、挑战和未来方向
Pub Date : 2016-10-28 DOI: 10.1145/2996429.2996434
K. Ramokapane, A. Rashid, J. Such
Inadvertent exposure of sensitive data is a major concern for potential cloud customers. Much focus has been on other data leakage vectors, such as side channel attacks, while issues of data disposal and assured deletion have not received enough attention to date. However, data that is not properly destroyed may lead to unintended disclosures, in turn, resulting in heavy financial penalties and reputational damage. In non-cloud contexts, issues of incomplete deletion are well understood. To the best of our knowledge, to date, there has been no systematic analysis of assured deletion challenges in public clouds. In this paper, we aim to address this gap by analysing assured deletion requirements for the cloud, identifying cloud features that pose a threat to assured deletion, and describing various assured deletion challenges. Based on this discussion, we identify future challenges for research in this area and propose an initial assured deletion architecture for cloud settings. Altogether, our work offers a systematization of requirements and challenges of assured deletion in the cloud, and a well-founded reference point for future research in developing new solutions to assured deletion.
对于潜在的云计算客户来说,敏感数据的意外暴露是一个主要问题。其他数据泄露媒介,如侧信道攻击,受到了很多关注,而数据处理和确保删除的问题迄今为止还没有得到足够的关注。然而,没有妥善销毁的数据可能会导致意外的披露,进而导致沉重的经济处罚和声誉损害。在非云环境中,不完全删除的问题很好理解。据我们所知,到目前为止,还没有对公共云中的保证删除挑战进行系统分析。在本文中,我们的目标是通过分析云的保证删除需求,识别对保证删除构成威胁的云特征,以及描述各种保证删除挑战来解决这一差距。在此讨论的基础上,我们确定了该领域研究的未来挑战,并提出了云设置的初始保证删除架构。总之,我们的工作提供了在云中保证删除的需求和挑战的系统化,并为开发保证删除的新解决方案的未来研究提供了一个有根据的参考点。
{"title":"Assured Deletion in the Cloud: Requirements, Challenges and Future Directions","authors":"K. Ramokapane, A. Rashid, J. Such","doi":"10.1145/2996429.2996434","DOIUrl":"https://doi.org/10.1145/2996429.2996434","url":null,"abstract":"Inadvertent exposure of sensitive data is a major concern for potential cloud customers. Much focus has been on other data leakage vectors, such as side channel attacks, while issues of data disposal and assured deletion have not received enough attention to date. However, data that is not properly destroyed may lead to unintended disclosures, in turn, resulting in heavy financial penalties and reputational damage. In non-cloud contexts, issues of incomplete deletion are well understood. To the best of our knowledge, to date, there has been no systematic analysis of assured deletion challenges in public clouds. In this paper, we aim to address this gap by analysing assured deletion requirements for the cloud, identifying cloud features that pose a threat to assured deletion, and describing various assured deletion challenges. Based on this discussion, we identify future challenges for research in this area and propose an initial assured deletion architecture for cloud settings. Altogether, our work offers a systematization of requirements and challenges of assured deletion in the cloud, and a well-founded reference point for future research in developing new solutions to assured deletion.","PeriodicalId":373063,"journal":{"name":"Proceedings of the 2016 ACM on Cloud Computing Security Workshop","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114571176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Co-location Resistant Strategy with Full Resources Optimization 具有充分资源优化的抗共址策略
Pub Date : 2016-10-28 DOI: 10.1145/2996429.2996435
Mouhebeddine Berrima, A. K. Nasr, N. B. Rajeb
In the public clouds, an adversary can co-locate his or her virtual machines (VMs) with others on the same physical servers to start an attack against the integrity, confidentiality or availability. The one important factor to decrease the likelihood of this co-location attack is the VMs placement strategy. However, a co-location resistant strategy will compromise the resources optimization of the cloud providers. The tradeoff between security and resources optimization introduces one of the most crucial challenges in the cloud security. In this work we propose a placement strategy allowing the decrease of co-location rate by compromising the VM startup time instead of the optimization of resources. We give a mathematical analysis to quantify the co-location resistance. The proposed strategy is evaluated against the abusing placement locality, where the attack and target VMs are launched simultaneously or within a short time window. Referring to EC2 placement strategy, the best co-location resistant strategy out of the existing public cloud providers strategies, our strategy decreases enormously the co-location attacks with a slight VM startup delay (relatively to the actual VM startup delay in the public cloud providers).
在公共云中,攻击者可以将他或她的虚拟机(vm)与其他人放在同一物理服务器上,以针对完整性、机密性或可用性发起攻击。减少这种同址攻击可能性的一个重要因素是vm放置策略。然而,抗共置策略将损害云提供商的资源优化。安全性和资源优化之间的权衡引入了云安全中最关键的挑战之一。在这项工作中,我们提出了一种放置策略,允许通过牺牲VM启动时间而不是优化资源来降低共定位率。我们给出了一个数学分析来量化共置电阻。针对攻击和目标虚拟机同时启动或在短时间内启动的滥用放置位置进行了评估。参考EC2放置策略,现有公共云提供商策略中最好的抗共置策略,我们的策略极大地减少了共置攻击,并且VM启动延迟轻微(相对于公共云提供商中实际的VM启动延迟)。
{"title":"Co-location Resistant Strategy with Full Resources Optimization","authors":"Mouhebeddine Berrima, A. K. Nasr, N. B. Rajeb","doi":"10.1145/2996429.2996435","DOIUrl":"https://doi.org/10.1145/2996429.2996435","url":null,"abstract":"In the public clouds, an adversary can co-locate his or her virtual machines (VMs) with others on the same physical servers to start an attack against the integrity, confidentiality or availability. The one important factor to decrease the likelihood of this co-location attack is the VMs placement strategy. However, a co-location resistant strategy will compromise the resources optimization of the cloud providers. The tradeoff between security and resources optimization introduces one of the most crucial challenges in the cloud security. In this work we propose a placement strategy allowing the decrease of co-location rate by compromising the VM startup time instead of the optimization of resources. We give a mathematical analysis to quantify the co-location resistance. The proposed strategy is evaluated against the abusing placement locality, where the attack and target VMs are launched simultaneously or within a short time window. Referring to EC2 placement strategy, the best co-location resistant strategy out of the existing public cloud providers strategies, our strategy decreases enormously the co-location attacks with a slight VM startup delay (relatively to the actual VM startup delay in the public cloud providers).","PeriodicalId":373063,"journal":{"name":"Proceedings of the 2016 ACM on Cloud Computing Security Workshop","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124275705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Proceedings of the 2016 ACM on Cloud Computing Security Workshop 2016年ACM云计算安全研讨会论文集
Pub Date : 2016-10-28 DOI: 10.1145/2996429
Mathias Payer, S. Mangard, E. Weippl, S. Katzenbeisser, Elli Androulaki, M. Reiter
It is our great pleasure to welcome you to the 8th ACM Cloud Computing Security Workshop (CCSW). Since its inception, CCSW has been a forum for bringing together researchers and practitioners to discuss technological advances bearing on the security of compute clouds, their tenants, and the larger Internet community. This year's workshop continues in this tradition. Submissions were evaluated by a program committee of 28 experts in the field, resulting in the selection of 8 full papers (from 23 submitted) and 2 short papers (from 4 submitted) after a roughly one-month review process and online discussion. In addition, the workshop hosted invited lectures by Dr. Michael Waidner from the Fraunhofer SIT and Technische Universitat Darmstadt, and Mr. Luciano Franceschina from Teralytics.
我们非常高兴地欢迎您参加第八届ACM云计算安全研讨会。自成立以来,CCSW一直是一个论坛,将研究人员和实践者聚集在一起,讨论与计算云、其租户和更大的互联网社区的安全性有关的技术进步。今年的研讨会延续了这一传统。由28位领域专家组成的项目委员会对提交的论文进行评估,经过大约一个月的评审过程和在线讨论,最终选出8篇全文论文(从23篇提交的论文中)和2篇短文(从4篇提交的论文中)。此外,研讨会还邀请了来自弗劳恩霍夫研究所和达姆施塔特工业大学的Michael Waidner博士和来自Teralytics的Luciano Franceschina先生进行演讲。
{"title":"Proceedings of the 2016 ACM on Cloud Computing Security Workshop","authors":"Mathias Payer, S. Mangard, E. Weippl, S. Katzenbeisser, Elli Androulaki, M. Reiter","doi":"10.1145/2996429","DOIUrl":"https://doi.org/10.1145/2996429","url":null,"abstract":"It is our great pleasure to welcome you to the 8th ACM Cloud Computing Security Workshop (CCSW). Since its inception, CCSW has been a forum for bringing together researchers and practitioners to discuss technological advances bearing on the security of compute clouds, their tenants, and the larger Internet community. This year's workshop continues in this tradition. \u0000 \u0000Submissions were evaluated by a program committee of 28 experts in the field, resulting in the selection of 8 full papers (from 23 submitted) and 2 short papers (from 4 submitted) after a roughly one-month review process and online discussion. In addition, the workshop hosted invited lectures by Dr. Michael Waidner from the Fraunhofer SIT and Technische Universitat Darmstadt, and Mr. Luciano Franceschina from Teralytics.","PeriodicalId":373063,"journal":{"name":"Proceedings of the 2016 ACM on Cloud Computing Security Workshop","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126200783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments 面向多租户云环境的高效策略评估流程
Pub Date : 2016-10-28 DOI: 10.1145/2996429.2996431
Meryeme Ayache, M. Erradi, Bernd Freisleben, A. Khoumsi
Cloud computing offers most of its services under multi-tenancy environments. To satisfy security requirements among collaborating tenants, each tenant may define a set of access control policies to secure access to shared data. Several cloud solutions make use of XACML to specify such policies. However, existing implementations of XACML perform a brute force search to compare a request to all existing rules in a given XACML policy. This decreases the decision process (i.e., policy evaluation) performance especially for policies with a large number of rules. In this paper, we propose an automata-based approach for an efficient XACML policy evaluation. We implemented our approach in a cloud policy engine called X2Automata. The engine first converts both XACML policies and access requests to automata. Second, it combines the two automata by a synchronous product. Third, it applies an evaluation procedure to the resulting automaton to decide whether an access request is granted or not. To highlight the efficiency of X2Automata, we compare its performance, based on the OpenStack cloud environment, with the XACML implementation named Balana.
云计算在多租户环境下提供大多数服务。为了满足协作租户之间的安全需求,每个租户可以定义一组访问控制策略来保护对共享数据的访问。一些云解决方案使用XACML来指定这些策略。但是,现有的XACML实现执行蛮力搜索,将请求与给定XACML策略中的所有现有规则进行比较。这降低了决策过程(即策略评估)的性能,特别是对于具有大量规则的策略。在本文中,我们提出了一种基于自动机的高效XACML策略评估方法。我们在名为X2Automata的云策略引擎中实现了我们的方法。该引擎首先将XACML策略和访问请求转换为自动机。其次,它通过一个同步产品将两个自动机结合起来。第三,它将评估过程应用于生成的自动化,以决定是否授予访问请求。为了突出X2Automata的效率,我们将其基于OpenStack云环境的性能与名为Balana的XACML实现进行了比较。
{"title":"Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments","authors":"Meryeme Ayache, M. Erradi, Bernd Freisleben, A. Khoumsi","doi":"10.1145/2996429.2996431","DOIUrl":"https://doi.org/10.1145/2996429.2996431","url":null,"abstract":"Cloud computing offers most of its services under multi-tenancy environments. To satisfy security requirements among collaborating tenants, each tenant may define a set of access control policies to secure access to shared data. Several cloud solutions make use of XACML to specify such policies. However, existing implementations of XACML perform a brute force search to compare a request to all existing rules in a given XACML policy. This decreases the decision process (i.e., policy evaluation) performance especially for policies with a large number of rules. In this paper, we propose an automata-based approach for an efficient XACML policy evaluation. We implemented our approach in a cloud policy engine called X2Automata. The engine first converts both XACML policies and access requests to automata. Second, it combines the two automata by a synchronous product. Third, it applies an evaluation procedure to the resulting automaton to decide whether an access request is granted or not. To highlight the efficiency of X2Automata, we compare its performance, based on the OpenStack cloud environment, with the XACML implementation named Balana.","PeriodicalId":373063,"journal":{"name":"Proceedings of the 2016 ACM on Cloud Computing Security Workshop","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125294291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Message-Locked Proofs of Retrievability with Secure Deduplication 使用安全重复数据删除的消息锁定可检索性证明
Pub Date : 2016-10-28 DOI: 10.1145/2996429.2996433
Dimitrios Vasilopoulos, Melek Önen, Kaoutar Elkhiyaoui, R. Molva
This paper addresses the problem of data retrievability in cloud computing systems performing deduplication to optimize their space savings: While there exist a number of proof of retrievability (PoR) solutions that guarantee storage correctness with cryptographic means, these solutions unfortunately come at odds with the deduplication technology. To reconcile proofs of retrievability with file-based cross-user deduplication, we propose the message-locked PoR approach whereby the PoR effect on duplicate data is identical and depends on the value of the data segment, only. As a proof of concept, we describe two instantiations of existing PoRs and show that the main extension is performed during the setup phase whereby both the keying material and the encoded version of the to-be-outsourced file is computed based on the file itself. We additionally propose a new server-aided message-locked key generation technique that compared with related work offers better security guarantees.
本文讨论了执行重复数据删除以优化其空间节省的云计算系统中的数据可检索性问题:虽然存在许多可检索性证明(PoR)解决方案,这些解决方案通过加密手段保证存储正确性,但不幸的是,这些解决方案与重复数据删除技术不一致。为了调和可检索性的证明与基于文件的跨用户重复数据删除,我们提出了消息锁定的PoR方法,其中PoR对重复数据的影响是相同的,仅取决于数据段的值。作为概念证明,我们描述了现有por的两个实例,并展示了主扩展是在设置阶段执行的,在此阶段,键控材料和待外包文件的编码版本都是基于文件本身计算的。此外,我们还提出了一种新的服务器辅助消息锁定密钥生成技术,与相关工作相比,该技术提供了更好的安全保证。
{"title":"Message-Locked Proofs of Retrievability with Secure Deduplication","authors":"Dimitrios Vasilopoulos, Melek Önen, Kaoutar Elkhiyaoui, R. Molva","doi":"10.1145/2996429.2996433","DOIUrl":"https://doi.org/10.1145/2996429.2996433","url":null,"abstract":"This paper addresses the problem of data retrievability in cloud computing systems performing deduplication to optimize their space savings: While there exist a number of proof of retrievability (PoR) solutions that guarantee storage correctness with cryptographic means, these solutions unfortunately come at odds with the deduplication technology. To reconcile proofs of retrievability with file-based cross-user deduplication, we propose the message-locked PoR approach whereby the PoR effect on duplicate data is identical and depends on the value of the data segment, only. As a proof of concept, we describe two instantiations of existing PoRs and show that the main extension is performed during the setup phase whereby both the keying material and the encoded version of the to-be-outsourced file is computed based on the file itself. We additionally propose a new server-aided message-locked key generation technique that compared with related work offers better security guarantees.","PeriodicalId":373063,"journal":{"name":"Proceedings of the 2016 ACM on Cloud Computing Security Workshop","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124305109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Oblivious RAM as a Substrate for Cloud Storage -- The Leakage Challenge Ahead 遗忘内存作为云存储的基板——未来的泄漏挑战
Pub Date : 2016-10-28 DOI: 10.1145/2996429.2996430
M. Sánchez-Artigas
Oblivious RAM (ORAM) is a well-established technology to hide data access patterns from an untrusted storage system. Although research in ORAM has been spurred in the last few years with the irruption of cloud computing, it is still unclear whether ORAM is ready for the cloud. As we demonstrate in this short paper, there are still some important hurdles to be overcome. One of those is the standard block-based ORAM interface, which can become a timing side-channel when used as a substrate to implement higher level abstractions such as filesystems, personal storage services, etc., typically found in the cloud. We analyze this form of leakage and discuss some possible solutions to this problem, concluding that thwarting it in an efficient manner calls for further research.
遗忘RAM (ORAM)是一种成熟的技术,用于向不受信任的存储系统隐藏数据访问模式。尽管在过去的几年里,随着云计算的出现,ORAM的研究得到了刺激,但目前还不清楚ORAM是否已经为云做好了准备。正如我们在这篇短文中所展示的,仍然有一些重要的障碍需要克服。其中之一是标准的基于块的ORAM接口,当用作底层来实现更高级别的抽象(如文件系统、个人存储服务等)时,它可以成为一个定时侧信道,这些抽象通常存在于云中。我们分析了这种形式的泄漏,并讨论了解决这一问题的一些可能的方法,结论是有效地阻止它需要进一步的研究。
{"title":"Oblivious RAM as a Substrate for Cloud Storage -- The Leakage Challenge Ahead","authors":"M. Sánchez-Artigas","doi":"10.1145/2996429.2996430","DOIUrl":"https://doi.org/10.1145/2996429.2996430","url":null,"abstract":"Oblivious RAM (ORAM) is a well-established technology to hide data access patterns from an untrusted storage system. Although research in ORAM has been spurred in the last few years with the irruption of cloud computing, it is still unclear whether ORAM is ready for the cloud. As we demonstrate in this short paper, there are still some important hurdles to be overcome. One of those is the standard block-based ORAM interface, which can become a timing side-channel when used as a substrate to implement higher level abstractions such as filesystems, personal storage services, etc., typically found in the cloud. We analyze this form of leakage and discuss some possible solutions to this problem, concluding that thwarting it in an efficient manner calls for further research.","PeriodicalId":373063,"journal":{"name":"Proceedings of the 2016 ACM on Cloud Computing Security Workshop","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114193949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Analytics: Understanding Human Behavior based on Mobile Network Data 数据分析:基于移动网络数据理解人类行为
Pub Date : 2016-10-28 DOI: 10.1145/2996429.2996441
Luciano Franceschina
Cellular networks are aware of the approximate geographical location of all connected devices 24/7 in order to route calls and network packets. Teralytics is a data analytics company specialized in analyzing this particular dataset: Mobile network data describing the mobility behavior of millions of people. The data's unique nature poses several challenges: First and foremost, due to the sensitivity of the data we must adhere to strict privacy rules and regulations and invest heavily into finding answers to legal and ethical questions about its use. Additionally, the data is generated by a complex system of which we have only incomplete visibility and thus shows anomalies and imprecisions, which must be corrected to produce valid analytical output. Finally, as a business we face the challenge of identifying the intersection between feasibility and commercial value of analytical applications. The talk will explore and showcase the challenges and solutions of a real-world data analytics use case.
蜂窝网络24/7全天候了解所有连接设备的大致地理位置,以便路由呼叫和网络数据包。Teralytics是一家数据分析公司,专门分析这个特定的数据集:描述数百万人移动行为的移动网络数据。这些数据的独特性质带来了几个挑战:首先,由于数据的敏感性,我们必须遵守严格的隐私规则和法规,并投入巨资寻找有关其使用的法律和道德问题的答案。此外,数据是由一个复杂的系统产生的,我们只有不完全的可见性,因此显示异常和不精确,必须加以纠正才能产生有效的分析输出。最后,作为一个企业,我们面临的挑战是确定分析应用程序的可行性和商业价值之间的交集。讲座将探讨和展示现实世界数据分析用例的挑战和解决方案。
{"title":"Data Analytics: Understanding Human Behavior based on Mobile Network Data","authors":"Luciano Franceschina","doi":"10.1145/2996429.2996441","DOIUrl":"https://doi.org/10.1145/2996429.2996441","url":null,"abstract":"Cellular networks are aware of the approximate geographical location of all connected devices 24/7 in order to route calls and network packets. Teralytics is a data analytics company specialized in analyzing this particular dataset: Mobile network data describing the mobility behavior of millions of people. The data's unique nature poses several challenges: First and foremost, due to the sensitivity of the data we must adhere to strict privacy rules and regulations and invest heavily into finding answers to legal and ethical questions about its use. Additionally, the data is generated by a complex system of which we have only incomplete visibility and thus shows anomalies and imprecisions, which must be corrected to produce valid analytical output. Finally, as a business we face the challenge of identifying the intersection between feasibility and commercial value of analytical applications. The talk will explore and showcase the challenges and solutions of a real-world data analytics use case.","PeriodicalId":373063,"journal":{"name":"Proceedings of the 2016 ACM on Cloud Computing Security Workshop","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114323657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Information Leakage in Deduplicated Storage Systems 重复数据删除存储系统中的信息泄漏问题
Pub Date : 2016-10-28 DOI: 10.1145/2996429.2996432
H. Ritzdorf, Ghassan O. Karame, Claudio Soriente, Srdjan Capkun
Most existing cloud storage providers rely on data deduplication in order to significantly save storage costs by storing duplicate data only once. While the literature has thoroughly analyzed client-side information leakage associated with the use of data deduplication techniques in the cloud, no previous work has analyzed the information leakage associated with access trace information information (e.g., object size and timing) that are available whenever a client uploads a file to a curious cloud provider. In this paper, we address this problem and analyze information leakage associated with data deduplication on a curious storage server. We show that even if the data is encrypted using a key not known by the storage server, the latter can still acquire considerable information about the stored files and even determine which files are stored. We validate our results both analytically and experimentally using a number of real storage datasets.
大多数现有的云存储提供商依赖于重复数据删除,以便通过只存储一次重复数据来显著节省存储成本。虽然文献已经彻底分析了与在云中使用重复数据删除技术相关的客户端信息泄漏,但以前没有工作分析过与访问跟踪信息(例如,对象大小和时间)相关的信息泄漏,这些信息在客户端将文件上传到好奇的云提供商时可用。在本文中,我们解决了这个问题,并分析了在一个奇怪的存储服务器上与重复数据删除相关的信息泄漏。我们表明,即使使用存储服务器不知道的密钥对数据进行加密,后者仍然可以获得关于存储文件的大量信息,甚至确定存储了哪些文件。我们使用一些真实的存储数据集对我们的结果进行了分析和实验验证。
{"title":"On Information Leakage in Deduplicated Storage Systems","authors":"H. Ritzdorf, Ghassan O. Karame, Claudio Soriente, Srdjan Capkun","doi":"10.1145/2996429.2996432","DOIUrl":"https://doi.org/10.1145/2996429.2996432","url":null,"abstract":"Most existing cloud storage providers rely on data deduplication in order to significantly save storage costs by storing duplicate data only once. While the literature has thoroughly analyzed client-side information leakage associated with the use of data deduplication techniques in the cloud, no previous work has analyzed the information leakage associated with access trace information information (e.g., object size and timing) that are available whenever a client uploads a file to a curious cloud provider. In this paper, we address this problem and analyze information leakage associated with data deduplication on a curious storage server. We show that even if the data is encrypted using a key not known by the storage server, the latter can still acquire considerable information about the stored files and even determine which files are stored. We validate our results both analytically and experimentally using a number of real storage datasets.","PeriodicalId":373063,"journal":{"name":"Proceedings of the 2016 ACM on Cloud Computing Security Workshop","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121447807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Stratum Filtering: Cloud-based Detection of Attack Sources 分层过滤:基于云的攻击源检测
Pub Date : 2016-10-28 DOI: 10.1145/2996429.2996440
A. Herzberg, Haya Schulmann, M. Waidner
Denial of Service (DoS) attacks pose a critical threat to the stability and availability of the Internet. In Distributed DoS (DDoS) attacks multiple attacking agents cooperate in an attempt to cause excessive load in order to disconnect a victim. The frequency and volume of DoS attacks continue to break records, reaching 400Gb/s. Although many defenses were proposed, very few are adopted, due to low effectiveness, high costs and the changes required to integrate them into the existing infrastructure. To improve resilience against DDoS attacks the service providers move their operations to cloud platforms. Unfortunately, even if the cloud applies filtering, rate limiting and deep packet inspection, the attacker can subvert those defenses by distributing the attack among multiple attacking IP addresses and aiming the flood at the victim. In this talk we focus on DDoS attacks which disrupt the availability of a service by depleting the bandwidth or the resources of an operating system or application on the server side. Such attackers typically employ a botnet to generate large traffic volumes. A botnet consists of bots (compromised computers) located in different parts of the Internet. The bots, depending on their privileges on the victim host, send multiple packets either from spoofed or using their real IP addresses. We utilize the cloud platform to implement Stratum Filtering, a novel mechanism aimed at protecting the availability and resilience of the web servers hosted on clouds. Our mechanism is easy to integrate into the cloud platform and does not require changes to the existing infrastructure nor the protected servers. Stratum Filtering facilitates the large IP address blocks allocated to the clouds, distributed availability zones and the support of service migration within the cloud platforms. These advantages offered by clouds enable us to restrict the attacker to a naive strategy where the best possible attack is to simply flood the entire IP address block allocated to the cloud. However, such an attack requires huge volume of traffic exposing malicious sources. In addition, controlling and coordinating a large number of bots that would suffice for disconnecting a cloud is not trivial to accomplish. Stratum Filtering is comprised of three layers, such that each successive layer applies filtering targeted at blocking a different type of attack traffic on network, transport or application layers. The filtering uses the difference in behavior of legitimate clients vs bots, to identify and filter traffic arriving from non-standard clients. To characterize …
拒绝服务(DoS)攻击对Internet的稳定性和可用性构成严重威胁。在分布式DoS (Distributed DoS, DDoS)攻击中,多个攻击代理合作,试图造成过载,从而断开受害者的连接。DoS攻击的频率和数量不断刷新记录,达到400Gb/s。尽管提出了许多防御措施,但由于效率低、成本高以及将它们集成到现有基础设施中所需的更改,采用的防御措施很少。为了提高抵御DDoS攻击的弹性,服务提供商将其业务转移到云平台。不幸的是,即使云应用了过滤、限速和深度包检测,攻击者也可以通过将攻击分散到多个攻击IP地址并将洪水瞄准受害者来破坏这些防御。在本次演讲中,我们将重点关注DDoS攻击,它通过耗尽服务器端操作系统或应用程序的带宽或资源来破坏服务的可用性。这种攻击者通常使用僵尸网络来产生大量流量。僵尸网络由位于互联网不同部分的机器人(受感染的计算机)组成。这些机器人,根据他们在受害主机上的特权,从欺骗或使用他们的真实IP地址发送多个数据包。我们利用云平台实现层过滤,这是一种新的机制,旨在保护托管在云上的web服务器的可用性和弹性。我们的机制很容易集成到云平台中,不需要更改现有的基础设施和受保护的服务器。分层过滤可以方便地为云分配大的IP地址块、分布式可用区以及支持云平台内的业务迁移。云提供的这些优势使我们能够将攻击者限制在一种简单的策略中,其中最好的攻击是简单地淹没分配给云的整个IP地址块。然而,这种攻击需要大量的流量暴露恶意源。此外,控制和协调足以断开云连接的大量机器人并非易事。分层过滤由三层组成,每一层都对网络、传输或应用层上不同类型的攻击流量进行过滤。过滤使用合法客户端与机器人的行为差异来识别和过滤来自非标准客户端的流量。描述……
{"title":"Stratum Filtering: Cloud-based Detection of Attack Sources","authors":"A. Herzberg, Haya Schulmann, M. Waidner","doi":"10.1145/2996429.2996440","DOIUrl":"https://doi.org/10.1145/2996429.2996440","url":null,"abstract":"Denial of Service (DoS) attacks pose a critical threat to the stability and availability of the Internet. In Distributed DoS (DDoS) attacks multiple attacking agents cooperate in an attempt to cause excessive load in order to disconnect a victim. The frequency and volume of DoS attacks continue to break records, reaching 400Gb/s. Although many defenses were proposed, very few are adopted, due to low effectiveness, high costs and the changes required to integrate them into the existing infrastructure. To improve resilience against DDoS attacks the service providers move their operations to cloud platforms. Unfortunately, even if the cloud applies filtering, rate limiting and deep packet inspection, the attacker can subvert those defenses by distributing the attack among multiple attacking IP addresses and aiming the flood at the victim. In this talk we focus on DDoS attacks which disrupt the availability of a service by depleting the bandwidth or the resources of an operating system or application on the server side. Such attackers typically employ a botnet to generate large traffic volumes. A botnet consists of bots (compromised computers) located in different parts of the Internet. The bots, depending on their privileges on the victim host, send multiple packets either from spoofed or using their real IP addresses. We utilize the cloud platform to implement Stratum Filtering, a novel mechanism aimed at protecting the availability and resilience of the web servers hosted on clouds. Our mechanism is easy to integrate into the cloud platform and does not require changes to the existing infrastructure nor the protected servers. Stratum Filtering facilitates the large IP address blocks allocated to the clouds, distributed availability zones and the support of service migration within the cloud platforms. These advantages offered by clouds enable us to restrict the attacker to a naive strategy where the best possible attack is to simply flood the entire IP address block allocated to the cloud. However, such an attack requires huge volume of traffic exposing malicious sources. In addition, controlling and coordinating a large number of bots that would suffice for disconnecting a cloud is not trivial to accomplish. Stratum Filtering is comprised of three layers, such that each successive layer applies filtering targeted at blocking a different type of attack traffic on network, transport or application layers. The filtering uses the difference in behavior of legitimate clients vs bots, to identify and filter traffic arriving from non-standard clients. To characterize …","PeriodicalId":373063,"journal":{"name":"Proceedings of the 2016 ACM on Cloud Computing Security Workshop","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122712302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage 小泄漏加密数据的多对数范围查询
Pub Date : 2016-10-28 DOI: 10.1145/2996429.2996437
Florian Hahn, F. Kerschbaum
Privacy-preserving range queries allow encrypting data while still enabling queries on ciphertexts if their corresponding plaintexts fall within a requested range. This provides a data owner the possibility to outsource data collections to a cloud service provider without sacrificing privacy nor losing functionality of filtering this data. However, existing methods for range queries either leak additional information (like the ordering of the complete data set) or slow down the search process tremendously by requiring to query each ciphertext in the data collection. We present a novel scheme that only leaks the access pattern while supporting amortized poly-logarithmic search time. Our construction is based on the novel idea of enabling the cloud service provider to compare requested range queries. By doing so, the cloud service provider can use the access pattern to speed-up search time for range queries in the future. On the one hand, values that have fallen within a queried range, are stored in an interactively built index for future requests. On the other hand, values that have not been queried do not leak any information to the cloud service provider and stay perfectly secure. In order to show its practicability we have implemented our scheme and give a detailed runtime evaluation.
隐私保护范围查询允许对数据进行加密,同时如果密文对应的明文在请求范围内,则仍然启用对密文的查询。这为数据所有者提供了将数据收集外包给云服务提供商的可能性,而不会牺牲隐私,也不会失去过滤该数据的功能。然而,范围查询的现有方法要么会泄露额外的信息(比如完整数据集的排序),要么会因为需要查询数据集合中的每个密文而极大地减慢搜索过程。我们提出了一种新的方案,在支持平摊多对数搜索时间的同时,只泄漏访问模式。我们的构造基于一种新颖的思想,即使云服务提供商能够比较请求的范围查询。通过这样做,云服务提供商可以使用访问模式来加快将来范围查询的搜索时间。一方面,在查询范围内的值存储在交互式构建的索引中,以供将来的请求使用。另一方面,未查询的值不会向云服务提供商泄露任何信息,并且保持完全安全。为了证明该方案的实用性,我们对该方案进行了实现,并给出了详细的运行时评价。
{"title":"Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage","authors":"Florian Hahn, F. Kerschbaum","doi":"10.1145/2996429.2996437","DOIUrl":"https://doi.org/10.1145/2996429.2996437","url":null,"abstract":"Privacy-preserving range queries allow encrypting data while still enabling queries on ciphertexts if their corresponding plaintexts fall within a requested range. This provides a data owner the possibility to outsource data collections to a cloud service provider without sacrificing privacy nor losing functionality of filtering this data. However, existing methods for range queries either leak additional information (like the ordering of the complete data set) or slow down the search process tremendously by requiring to query each ciphertext in the data collection. We present a novel scheme that only leaks the access pattern while supporting amortized poly-logarithmic search time. Our construction is based on the novel idea of enabling the cloud service provider to compare requested range queries. By doing so, the cloud service provider can use the access pattern to speed-up search time for range queries in the future. On the one hand, values that have fallen within a queried range, are stored in an interactively built index for future requests. On the other hand, values that have not been queried do not leak any information to the cloud service provider and stay perfectly secure. In order to show its practicability we have implemented our scheme and give a detailed runtime evaluation.","PeriodicalId":373063,"journal":{"name":"Proceedings of the 2016 ACM on Cloud Computing Security Workshop","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131404896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
Proceedings of the 2016 ACM on Cloud Computing Security Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1