首页 > 最新文献

2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW)最新文献

英文 中文
Thwarting Data Exfiltration by Repackaged Applications 通过重新打包的应用程序阻止数据泄露
Pub Date : 2016-09-01 DOI: 10.1109/SRDSW.2016.18
Daniel Andrade, T. Kristoffersen, I. Rummelhoff, Alex Gerdov, J. Silva
Android applications are subject to repackaging attacks, where popular applications are modified, often by inserting malicious logic, re-signed, and then uploaded to an online store to be later on downloaded and installed by unsuspicious users. This paper presents a set of protocols for increasing trust in special-purpose Android applications, termed secured trusted applications, during communication with a trustworthy external hardware device for storing sensitive end user data, termed secured personal device. The proposed approach requires neither operating system modification nor root privileges. The evaluation of our solution shows that the authenticity and integrity of applications, and the confidentiality and integrity of communication, is ensured as long as Android operates correctly.
Android应用程序容易受到重新打包攻击,即修改流行的应用程序,通常是插入恶意逻辑,重新签名,然后上传到在线商店,供不知情的用户下载和安装。本文提出了一套协议,用于在与可信任的外部硬件设备(用于存储敏感的最终用户数据,称为安全的个人设备)通信期间增加特殊用途Android应用程序(称为安全可信应用程序)的信任。所建议的方法既不需要修改操作系统,也不需要root权限。对我们的解决方案的评估表明,只要Android正常运行,应用程序的真实性和完整性以及通信的保密性和完整性都得到了保证。
{"title":"Thwarting Data Exfiltration by Repackaged Applications","authors":"Daniel Andrade, T. Kristoffersen, I. Rummelhoff, Alex Gerdov, J. Silva","doi":"10.1109/SRDSW.2016.18","DOIUrl":"https://doi.org/10.1109/SRDSW.2016.18","url":null,"abstract":"Android applications are subject to repackaging attacks, where popular applications are modified, often by inserting malicious logic, re-signed, and then uploaded to an online store to be later on downloaded and installed by unsuspicious users. This paper presents a set of protocols for increasing trust in special-purpose Android applications, termed secured trusted applications, during communication with a trustworthy external hardware device for storing sensitive end user data, termed secured personal device. The proposed approach requires neither operating system modification nor root privileges. The evaluation of our solution shows that the authenticity and integrity of applications, and the confidentiality and integrity of communication, is ensured as long as Android operates correctly.","PeriodicalId":401182,"journal":{"name":"2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134124811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Have a Seat on the ErasureBench: Easy Evaluation of Erasure Coding Libraries for Distributed Storage Systems 在ErasureBench上占有一席之地:分布式存储系统Erasure编码库的简单评估
Pub Date : 2016-09-01 DOI: 10.1109/SRDSW.2016.20
Sébastien Vaucher, H. Mercier, V. Schiavoni
We present ErasureBench, an open-source framework to test and benchmark erasure coding implementations for distributed storage systems under realistic conditions. ErasureBench automatically instantiates and scales a cluster of storage nodes, and can seamlessly leverage existing failure traces. As a first example, we use ErasureBench to compare three coding implementations: a (10,4) Reed-Solomon (RS) code, a (10,6,5) locally repairable code (LRC), and a partition of the data source in ten pieces without error-correction. Our experiments show that LRC and RS codes require the same repair throughput when used with small storage nodes, since cluster and network management traffic dominate at this regime. With large storage nodes, read and write traffic increases and our experiments confirm the theoretical and practical tradeoffs between the storage overhead and repair bandwidth of RS and LRC codes.
我们提出了ErasureBench,这是一个开源框架,用于在现实条件下测试和基准测试分布式存储系统的擦除编码实现。ErasureBench自动实例化和扩展存储节点集群,并可以无缝地利用现有的故障痕迹。作为第一个例子,我们使用ErasureBench来比较三种编码实现:(10,4)Reed-Solomon (RS)代码,(10,6,5)局部可修复代码(LRC),以及将数据源划分为10块且没有纠错。我们的实验表明,当使用小存储节点时,LRC和RS代码需要相同的修复吞吐量,因为集群和网络管理流量在该状态下占主导地位。随着大存储节点的增加,读写流量增加,我们的实验证实了RS和LRC代码的存储开销和修复带宽之间的理论和实践权衡。
{"title":"Have a Seat on the ErasureBench: Easy Evaluation of Erasure Coding Libraries for Distributed Storage Systems","authors":"Sébastien Vaucher, H. Mercier, V. Schiavoni","doi":"10.1109/SRDSW.2016.20","DOIUrl":"https://doi.org/10.1109/SRDSW.2016.20","url":null,"abstract":"We present ErasureBench, an open-source framework to test and benchmark erasure coding implementations for distributed storage systems under realistic conditions. ErasureBench automatically instantiates and scales a cluster of storage nodes, and can seamlessly leverage existing failure traces. As a first example, we use ErasureBench to compare three coding implementations: a (10,4) Reed-Solomon (RS) code, a (10,6,5) locally repairable code (LRC), and a partition of the data source in ten pieces without error-correction. Our experiments show that LRC and RS codes require the same repair throughput when used with small storage nodes, since cluster and network management traffic dominate at this regime. With large storage nodes, read and write traffic increases and our experiments confirm the theoretical and practical tradeoffs between the storage overhead and repair bandwidth of RS and LRC codes.","PeriodicalId":401182,"journal":{"name":"2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127733117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Configurable Multibiometric System for Authentication at Different Security Levels Using Mobile Devices 一种可配置的多生物识别系统,用于移动设备上不同安全级别的身份验证
Pub Date : 2016-09-01 DOI: 10.1109/SRDSW.2016.14
Belén Ríos-Sánchez, Miguel Viana-Matesanz, C. S. Ávila, Maria Jose Melcon De Giles
This work presents a configurable multibiometricsystem oriented to mobile devices which combines face, handand in-air signature biometrics to provide three different levelsof security. The number of traits involved in the authenticationincreases with the security strength, allowing the balance betweencomfort and accuracy according to the security requirements ofthe final application. In addition, the security of the system isenhanced by incorporating anti-coercion and aliveness detectionmechanisms. To decide which biometric mode should be requestedat each security level, an evaluation of the biometrics has beenperformed in terms of performance and users acceptability.
这项工作提出了一个面向移动设备的可配置多生物识别系统,该系统结合了面部、手部和空气中的特征生物识别技术,提供了三个不同级别的安全性。认证中涉及的特征数量随着安全强度的增加而增加,允许根据最终应用的安全要求在舒适性和准确性之间取得平衡。此外,通过整合反强制和活动性检测机制,增强了系统的安全性。为了决定每个安全级别应该请求哪种生物识别模式,从性能和用户可接受性方面对生物识别进行了评估。
{"title":"A Configurable Multibiometric System for Authentication at Different Security Levels Using Mobile Devices","authors":"Belén Ríos-Sánchez, Miguel Viana-Matesanz, C. S. Ávila, Maria Jose Melcon De Giles","doi":"10.1109/SRDSW.2016.14","DOIUrl":"https://doi.org/10.1109/SRDSW.2016.14","url":null,"abstract":"This work presents a configurable multibiometricsystem oriented to mobile devices which combines face, handand in-air signature biometrics to provide three different levelsof security. The number of traits involved in the authenticationincreases with the security strength, allowing the balance betweencomfort and accuracy according to the security requirements ofthe final application. In addition, the security of the system isenhanced by incorporating anti-coercion and aliveness detectionmechanisms. To decide which biometric mode should be requestedat each security level, an evaluation of the biometrics has beenperformed in terms of performance and users acceptability.","PeriodicalId":401182,"journal":{"name":"2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114831084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ARM TrustZone for Secure Image Processing on the Cloud 用于云上安全图像处理的ARM TrustZone
Pub Date : 2016-09-01 DOI: 10.1109/SRDSW.2016.17
Tiago Brito, N. Duarte, Nuno Santos
Nowadays, offloading storage and processing capacity to cloud servers is a growing trend. This happens because high storage capacity and powerful processors are expensive, whilst cloud services provide a cheaper, ongoing, and reliable solution. The problem with cloud-based solutions is that servers are highly accessible through the Internet and therefore considerably exposed to hackers and malware. In this paper, we design and implement Darkroom, a secure image processing service for the cloud leveraging ARM TrustZone technology. Our system enables users to securely process image data in a secure environment that prevents exposure of sensitive data to the operating system. We evaluate our system and observe that our solution adds a small overhead to image processing when compared to computer platforms that require the entire operating system to be trusted.
如今,将存储和处理能力转移到云服务器上是一个日益增长的趋势。这是因为高存储容量和强大的处理器是昂贵的,而云服务提供了更便宜、持续和可靠的解决方案。基于云的解决方案的问题是,服务器可以通过互联网高度访问,因此很容易受到黑客和恶意软件的攻击。在本文中,我们设计并实现了Darkroom,一个利用ARM TrustZone技术的云安全图像处理服务。我们的系统使用户能够在安全的环境中安全地处理图像数据,防止敏感数据暴露给操作系统。我们对系统进行了评估,发现与需要信任整个操作系统的计算机平台相比,我们的解决方案在图像处理方面增加了很小的开销。
{"title":"ARM TrustZone for Secure Image Processing on the Cloud","authors":"Tiago Brito, N. Duarte, Nuno Santos","doi":"10.1109/SRDSW.2016.17","DOIUrl":"https://doi.org/10.1109/SRDSW.2016.17","url":null,"abstract":"Nowadays, offloading storage and processing capacity to cloud servers is a growing trend. This happens because high storage capacity and powerful processors are expensive, whilst cloud services provide a cheaper, ongoing, and reliable solution. The problem with cloud-based solutions is that servers are highly accessible through the Internet and therefore considerably exposed to hackers and malware. In this paper, we design and implement Darkroom, a secure image processing service for the cloud leveraging ARM TrustZone technology. Our system enables users to securely process image data in a secure environment that prevents exposure of sensitive data to the operating system. We evaluate our system and observe that our solution adds a small overhead to image processing when compared to computer platforms that require the entire operating system to be trusted.","PeriodicalId":401182,"journal":{"name":"2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134443930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Adaptive IP Mutation: A Proactive Approach for Defending against Worm Propagation 自适应IP突变:一种防御蠕虫传播的主动方法
Pub Date : 2016-09-01 DOI: 10.1109/SRDSW.2016.21
Chang-Ting Lin, Chunming Wu, Min Huang, Z. Wen, Qiumei Cheng
IP address mutation is a proactive defense method that is used to reduce the risk of network attacks, especially to deal with the worm propagation attacks. However, previous work did not give much consideration to the negative effects that IP address mutation could bring to network performance. To be specific, there is a trade-off between network performance and security, which implies that when a security mechanism is reinforced, network performance would be impaired and vice versa. Therefore, in order to achieve the optimal balance between performance and security, an optimal solution should be provided. In this paper, we propose an adaptive IP mutation defense method which is based on temporal-dimension, to dynamically control the mutation interval according to real-time measurable metrics, assurance and avoidance. This method leverages a genetic algorithm to achieve the optimization of performance-security trade-off. We then evaluate our method in a simulated computer cluster environment, including 1024 hosts, and demonstrate that our method can successfully find the optimal solution according to the experimental results. For example, it can reduce the worm propagation significantly, while maintaining the network performance in a predefined level.
IP地址变异是一种主动防御方式,主要用于降低网络攻击的风险,特别是应对蠕虫传播攻击。然而,以往的工作并没有考虑到IP地址突变对网络性能的负面影响。具体来说,在网络性能和安全性之间存在权衡,这意味着当安全机制得到加强时,网络性能将受到损害,反之亦然。因此,为了在性能和安全性之间达到最佳平衡,应该提供最优解决方案。本文提出了一种基于时间维的自适应IP突变防御方法,根据实时可测指标、保证和避免等特点,对突变区间进行动态控制。该方法利用遗传算法实现性能安全权衡的优化。然后,我们在一个包括1024台主机的模拟计算机集群环境中对我们的方法进行了评估,并根据实验结果证明我们的方法可以成功地找到最优解。例如,它可以显著减少蠕虫的传播,同时将网络性能保持在预定义的水平。
{"title":"Adaptive IP Mutation: A Proactive Approach for Defending against Worm Propagation","authors":"Chang-Ting Lin, Chunming Wu, Min Huang, Z. Wen, Qiumei Cheng","doi":"10.1109/SRDSW.2016.21","DOIUrl":"https://doi.org/10.1109/SRDSW.2016.21","url":null,"abstract":"IP address mutation is a proactive defense method that is used to reduce the risk of network attacks, especially to deal with the worm propagation attacks. However, previous work did not give much consideration to the negative effects that IP address mutation could bring to network performance. To be specific, there is a trade-off between network performance and security, which implies that when a security mechanism is reinforced, network performance would be impaired and vice versa. Therefore, in order to achieve the optimal balance between performance and security, an optimal solution should be provided. In this paper, we propose an adaptive IP mutation defense method which is based on temporal-dimension, to dynamically control the mutation interval according to real-time measurable metrics, assurance and avoidance. This method leverages a genetic algorithm to achieve the optimization of performance-security trade-off. We then evaluate our method in a simulated computer cluster environment, including 1024 hosts, and demonstrate that our method can successfully find the optimal solution according to the experimental results. For example, it can reduce the worm propagation significantly, while maintaining the network performance in a predefined level.","PeriodicalId":401182,"journal":{"name":"2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW)","volume":"464 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116582483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comfort and Security Perception of Biometrics in Mobile Phones with Widespread Sensors 生物识别技术在具有广泛传感器的移动电话中的舒适性和安全性感知
Pub Date : 2016-09-01 DOI: 10.1109/SRDSW.2016.13
J. Casanova, Belén Ríos-Sánchez, Miguel Viana-Matesanz, G. Bailador, C. S. Ávila, Maria Jose Melcon De Giles
Comfort and security perception are two key factorsto provide an adequate biometric solution. This article presentsthe results of an online survey about these characteristics in fourdifferent biometric modes implemented in mobile phones withwidespread sensors. Additionally, it presents the main concernsthat the use of these biometric modes generates in people, whichprovides a roadmap of additional issues that should be improvedto create satisfactory biometric techniques.
舒适性和安全感是提供适当的生物识别解决方案的两个关键因素。本文介绍了一项关于四种不同的生物识别模式在具有广泛传感器的移动电话中实现的这些特征的在线调查结果。此外,它还提出了使用这些生物识别模式在人体中产生的主要问题,这提供了一个应该改进的其他问题的路线图,以创建令人满意的生物识别技术。
{"title":"Comfort and Security Perception of Biometrics in Mobile Phones with Widespread Sensors","authors":"J. Casanova, Belén Ríos-Sánchez, Miguel Viana-Matesanz, G. Bailador, C. S. Ávila, Maria Jose Melcon De Giles","doi":"10.1109/SRDSW.2016.13","DOIUrl":"https://doi.org/10.1109/SRDSW.2016.13","url":null,"abstract":"Comfort and security perception are two key factorsto provide an adequate biometric solution. This article presentsthe results of an online survey about these characteristics in fourdifferent biometric modes implemented in mobile phones withwidespread sensors. Additionally, it presents the main concernsthat the use of these biometric modes generates in people, whichprovides a roadmap of additional issues that should be improvedto create satisfactory biometric techniques.","PeriodicalId":401182,"journal":{"name":"2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123847593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
SafeRegions: Performance Evaluation of Multi-party Protocols on HBase safereregions: HBase上多方协议的性能评估
Pub Date : 2016-09-01 DOI: 10.1109/SRDSW.2016.16
Rogério Pontes, Francisco Maia, J. Paulo, R. Vilaça
On-line applications and services are now a critical part of our everyday life. Using these services typically requires us to trust our personal or company's information to a large number of third-party entities. These entities enforce several security measures to avoid unauthorized accesses but data is still stored on common database systems that are designed without data privacy concerns in mind. As a result, data is vulnerable against anyone with direct access to the database, which may be external attackers, malicious insiders, spies or even subpoenas. Building strong data privacy mechanisms on top of common database systems is possible but has a significant impact on the system's resources, computational capabilities and performance. Notably, the amount of useful computation that may be done over strongly encrypted data is close to none, which defeats the purpose of offloading computation to third-party services. In this paper, we propose to shift the need to trust in the honesty and security of service providers to simply trust that they will not collude. This is reasonable as cloud providers, being competitors, do not share data among themselves. We focus on NoSQL databases and present SafeRegions, a novel prototype of a distributed and secure NoSQL database that is built on top of HBase and that guarantees strong data privacy while still providing most of HBase's query capabilities. Safe Regions relies on secret sharing and multi-party computation techniques to provide a NoSQL database built on top of multiple, non-colluding service providers that appear as a single one to the user. Strikingly, service providers, individually, cannot disclose any of the user's data but, together, are able to offer data storage and processing capabilities. Additionally, we evaluate SafeRegions exposing performance trade-offs imposed by security mechanisms and provide useful insights for future research on performance optimization.
在线申请和服务现在是我们日常生活的重要组成部分。使用这些服务通常要求我们将我们的个人或公司信息委托给大量第三方实体。这些实体实施了几种安全措施以避免未经授权的访问,但数据仍然存储在设计时没有考虑数据隐私问题的公共数据库系统中。因此,数据很容易受到任何直接访问数据库的人的攻击,这些人可能是外部攻击者、恶意的内部人员、间谍,甚至是传票。在公共数据库系统之上构建强大的数据隐私机制是可能的,但会对系统的资源、计算能力和性能产生重大影响。值得注意的是,在强加密数据上可能完成的有用计算量接近于零,这违背了将计算卸载给第三方服务的目的。在本文中,我们建议将信任服务提供商的诚实和安全的需求转变为简单地信任他们不会串通。这是合理的,因为作为竞争对手的云提供商之间不会共享数据。我们专注于NoSQL数据库,并提出safereregions,这是一种新型的分布式安全NoSQL数据库原型,它建立在HBase之上,在提供大部分HBase查询功能的同时保证了强大的数据隐私。安全区域依赖于秘密共享和多方计算技术来提供一个NoSQL数据库,该数据库建立在多个非串通的服务提供商之上,这些服务提供商对用户来说是一个单一的。引人注目的是,服务提供商不能单独披露任何用户的数据,但联合起来却能够提供数据存储和处理能力。此外,我们还评估了安全区域,揭示了安全机制所带来的性能权衡,并为未来的性能优化研究提供了有用的见解。
{"title":"SafeRegions: Performance Evaluation of Multi-party Protocols on HBase","authors":"Rogério Pontes, Francisco Maia, J. Paulo, R. Vilaça","doi":"10.1109/SRDSW.2016.16","DOIUrl":"https://doi.org/10.1109/SRDSW.2016.16","url":null,"abstract":"On-line applications and services are now a critical part of our everyday life. Using these services typically requires us to trust our personal or company's information to a large number of third-party entities. These entities enforce several security measures to avoid unauthorized accesses but data is still stored on common database systems that are designed without data privacy concerns in mind. As a result, data is vulnerable against anyone with direct access to the database, which may be external attackers, malicious insiders, spies or even subpoenas. Building strong data privacy mechanisms on top of common database systems is possible but has a significant impact on the system's resources, computational capabilities and performance. Notably, the amount of useful computation that may be done over strongly encrypted data is close to none, which defeats the purpose of offloading computation to third-party services. In this paper, we propose to shift the need to trust in the honesty and security of service providers to simply trust that they will not collude. This is reasonable as cloud providers, being competitors, do not share data among themselves. We focus on NoSQL databases and present SafeRegions, a novel prototype of a distributed and secure NoSQL database that is built on top of HBase and that guarantees strong data privacy while still providing most of HBase's query capabilities. Safe Regions relies on secret sharing and multi-party computation techniques to provide a NoSQL database built on top of multiple, non-colluding service providers that appear as a single one to the user. Strikingly, service providers, individually, cannot disclose any of the user's data but, together, are able to offer data storage and processing capabilities. Additionally, we evaluate SafeRegions exposing performance trade-offs imposed by security mechanisms and provide useful insights for future research on performance optimization.","PeriodicalId":401182,"journal":{"name":"2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127775736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
BioALeg - Enabling Biometric Authentication in Legacy Web Sites 在遗留网站中启用生物识别身份验证
Pub Date : 2016-09-01 DOI: 10.1109/SRDSW.2016.15
S. Monfared, Daniel Andrade, L. Rodrigues, J. Silva
The authentication of users in legacy web sites via mobile devices is still a challenging problem. Users are required to provide passwords, introducing several vulnerabilities: since strong passwords are hard to memorize, users often use weak passwords that are easy to break, and passwords can be intercepted by malware and stolen. In this paper we propose a novel architecture, named BioALeg, to support secure biometric authentication on legacy websites. Our approach leverages the potential of a Secured Personal Device (SPD), a hardware add-on for mobile phones that is being developed in the context of the PCAS European project. The device offers biometric authentication and secure storage services. BioALeg uses this infrastructure, and a companion web site plugin, to support biometric authentication in legacy web sites that currently use username/password authentication. In order to perform authentication, the smartphone requests a One Time Password (OTP) to the service provider when the user tries to access the service using the SPD. Due to the architecture and implementation of the SPD, the OTP transfer only occurs after the owner of the phone and SPD is correctly authenticated using biometrics. The PCAS infrastructure guarantees that, after the biometric authentication, the user identity is valid and accepted by all components. BioALeg has been implemented as an Android service and integrated with legacy web sites.
通过移动设备对遗留网站中的用户进行身份验证仍然是一个具有挑战性的问题。用户需要提供密码,这带来了几个漏洞:由于强密码难以记忆,用户通常使用容易被破解的弱密码,密码可能被恶意软件截获和窃取。在本文中,我们提出了一种新的体系结构,称为BioALeg,以支持对遗留网站的安全生物识别认证。我们的方法利用了安全个人设备(SPD)的潜力,这是一种在PCAS欧洲项目背景下正在开发的移动电话硬件附加组件。该设备提供生物识别认证和安全存储服务。BioALeg使用这个基础设施和一个配套的网站插件,在当前使用用户名/密码身份验证的遗留网站中支持生物识别身份验证。当用户尝试使用SPD访问服务时,智能手机会向服务提供商请求OTP (One Time Password),以便进行身份验证。由于SPD的体系结构和实现,只有在使用生物识别技术对手机和SPD的所有者进行正确的身份验证后,才会进行OTP传输。PCAS基础结构保证,在生物识别身份验证之后,用户身份是有效的,并被所有组件接受。BioALeg已作为Android服务实现,并与传统网站集成。
{"title":"BioALeg - Enabling Biometric Authentication in Legacy Web Sites","authors":"S. Monfared, Daniel Andrade, L. Rodrigues, J. Silva","doi":"10.1109/SRDSW.2016.15","DOIUrl":"https://doi.org/10.1109/SRDSW.2016.15","url":null,"abstract":"The authentication of users in legacy web sites via mobile devices is still a challenging problem. Users are required to provide passwords, introducing several vulnerabilities: since strong passwords are hard to memorize, users often use weak passwords that are easy to break, and passwords can be intercepted by malware and stolen. In this paper we propose a novel architecture, named BioALeg, to support secure biometric authentication on legacy websites. Our approach leverages the potential of a Secured Personal Device (SPD), a hardware add-on for mobile phones that is being developed in the context of the PCAS European project. The device offers biometric authentication and secure storage services. BioALeg uses this infrastructure, and a companion web site plugin, to support biometric authentication in legacy web sites that currently use username/password authentication. In order to perform authentication, the smartphone requests a One Time Password (OTP) to the service provider when the user tries to access the service using the SPD. Due to the architecture and implementation of the SPD, the OTP transfer only occurs after the owner of the phone and SPD is correctly authenticated using biometrics. The PCAS infrastructure guarantees that, after the biometric authentication, the user identity is valid and accepted by all components. BioALeg has been implemented as an Android service and integrated with legacy web sites.","PeriodicalId":401182,"journal":{"name":"2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124003666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Emusphere: Evaluating Planetary-Scale Distributed Systems in Automated Emulation Environments emussphere:在自动化仿真环境中评估行星尺度的分布式系统
Pub Date : 2016-09-01 DOI: 10.1109/SRDSW.2016.19
Johannes Köstler, J. Seidemann, Hans P. Reiser
This paper presents Emusphere, an integrated emulation platform for the efficient evaluation of planetary-scale distributed systems. It allows system developers and architects to assess their systems in an environment that is able to provision any desired computation infrastructure, mimic realistic environmental conditions, and carry out arbitrary usage scenarios. Unlike existing testbeds which suffer from technical complexity and high bootstrapping efforts, Emusphere is an easy-to-use and fully automated environment. This is achieved by reducing the complete configuration and execution efforts down to the definition of a single configuration file that defines the structure and course of the experiments. Those Experiment Descriptors are executed using Emusphere Executors which utilize resource providers to provision any specified virtual infrastructure, run the defined experiment steps, collect the results and finally tear down the whole environment. In this way experiments can be easily modified, reproduced, transferred and verified. We also provide an evaluation which shows that our approach surpasses existing solutions in terms of flexibility and usability while offering a high degree of scalability.
Emusphere是一个集成仿真平台,用于行星规模分布式系统的高效评估。它允许系统开发人员和架构师在能够提供任何所需计算基础设施、模拟实际环境条件和执行任意使用场景的环境中评估他们的系统。与现有的测试平台不同,Emusphere是一个易于使用和完全自动化的环境。这是通过将完整的配置和执行工作减少到定义单个配置文件来实现的,该文件定义了实验的结构和过程。这些实验描述符使用Emusphere executor执行,后者利用资源提供程序提供任何指定的虚拟基础设施,运行定义的实验步骤,收集结果并最终拆除整个环境。这样,实验可以很容易地修改、复制、转移和验证。我们还提供了一个评估,表明我们的方法在灵活性和可用性方面超越了现有的解决方案,同时提供了高度的可扩展性。
{"title":"Emusphere: Evaluating Planetary-Scale Distributed Systems in Automated Emulation Environments","authors":"Johannes Köstler, J. Seidemann, Hans P. Reiser","doi":"10.1109/SRDSW.2016.19","DOIUrl":"https://doi.org/10.1109/SRDSW.2016.19","url":null,"abstract":"This paper presents Emusphere, an integrated emulation platform for the efficient evaluation of planetary-scale distributed systems. It allows system developers and architects to assess their systems in an environment that is able to provision any desired computation infrastructure, mimic realistic environmental conditions, and carry out arbitrary usage scenarios. Unlike existing testbeds which suffer from technical complexity and high bootstrapping efforts, Emusphere is an easy-to-use and fully automated environment. This is achieved by reducing the complete configuration and execution efforts down to the definition of a single configuration file that defines the structure and course of the experiments. Those Experiment Descriptors are executed using Emusphere Executors which utilize resource providers to provision any specified virtual infrastructure, run the defined experiment steps, collect the results and finally tear down the whole environment. In this way experiments can be easily modified, reproduced, transferred and verified. We also provide an evaluation which shows that our approach surpasses existing solutions in terms of flexibility and usability while offering a high degree of scalability.","PeriodicalId":401182,"journal":{"name":"2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117215858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Convoy Effect in Atomic Multicast 原子组播中的护航效应
Pub Date : 2016-09-01 DOI: 10.1109/SRDSW.2016.22
Tarek Ahmed-Nacer, P. Sutra, D. Conan
Atomic multicast is a group communication primitive that allows disseminating messages to multiple distributed processes with strong ordering properties. As such, atomic multicast is a widely-employed tool to build large-scale systems, in particular when data is geo-distributed and/or replicated across multiple locations. However, all the most efficient atomic multicast algorithms suffer from a convoy effect that slows down the delivery of messages. In this paper, we study the impact of this phenomenon in detail. To this end, we first capture the convoy effect in the critical section problem with a timed automaton. We then extend this approach to the seminal atomic multicast solution of Skeen. Our analytical model shows that the convoy effect quickly degrades the latency of messages. We confirm this claim by fitting our model with empirical data from literature. To sidestep this performance degradation, we advocate the use of message semantics in atomic multicast. In particular, we present a simple protocol that reduces the convoy effect by a factor p, where p is the probability that two messages commute.
原子多播是一种组通信原语,允许将消息传播到具有强排序属性的多个分布式进程。因此,原子多播是一种广泛用于构建大规模系统的工具,特别是当数据是地理分布的和/或跨多个位置复制时。然而,所有最有效的原子多播算法都存在减缓消息传递速度的护航效应。在本文中,我们详细研究了这一现象的影响。为此,我们首先用定时自动机捕捉临界截面问题中的车队效应。然后,我们将这种方法扩展到Skeen的开创性原子多播解决方案。我们的分析模型表明护航效应可以快速降低消息的延迟。我们通过用文献中的经验数据拟合我们的模型来证实这一说法。为了避免这种性能下降,我们提倡在原子组播中使用消息语义。特别地,我们提出了一个简单的协议,它将护送效应降低了一个因子p,其中p是两个消息交换的概率。
{"title":"The Convoy Effect in Atomic Multicast","authors":"Tarek Ahmed-Nacer, P. Sutra, D. Conan","doi":"10.1109/SRDSW.2016.22","DOIUrl":"https://doi.org/10.1109/SRDSW.2016.22","url":null,"abstract":"Atomic multicast is a group communication primitive that allows disseminating messages to multiple distributed processes with strong ordering properties. As such, atomic multicast is a widely-employed tool to build large-scale systems, in particular when data is geo-distributed and/or replicated across multiple locations. However, all the most efficient atomic multicast algorithms suffer from a convoy effect that slows down the delivery of messages. In this paper, we study the impact of this phenomenon in detail. To this end, we first capture the convoy effect in the critical section problem with a timed automaton. We then extend this approach to the seminal atomic multicast solution of Skeen. Our analytical model shows that the convoy effect quickly degrades the latency of messages. We confirm this claim by fitting our model with empirical data from literature. To sidestep this performance degradation, we advocate the use of message semantics in atomic multicast. In particular, we present a simple protocol that reduces the convoy effect by a factor p, where p is the probability that two messages commute.","PeriodicalId":401182,"journal":{"name":"2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134123049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1