首页 > 最新文献

ACM International Workshop on Storage Security And Survivability最新文献

英文 中文
Design, implementation and evaluation of security in iSCSI-based network storage systems 基于iscsi的网络存储系统的安全性设计、实现与评估
Pub Date : 2006-10-30 DOI: 10.1145/1179559.1179564
S. Chaitanya, Kevin R. B. Butler, A. Sivasubramaniam, P. Mcdaniel, M. Vilayannur
This paper studies the performance and security aspects of the iSCSI protocol in a network storage based system. Ethernet speeds have been improving rapidly and network throughput is no longer considered a bottleneck when compared to Fibre-channel based storage area networks. However, when security of the data traffic is taken into consideration, existing protocols like IPSec prove to be a major hindrance to the overall throughput. In this paper, we evaluate the performance of iSCSI when deployed over standard security protocols and suggest lazy crypto approaches to alleviate the processing needs at the server. The testbed consists of a cluster of Linux machines directly connected to the server through a Gigabit Ethernet network. Micro and application benchmarks like BTIO and dbench were used to analyze the performance and scalability of the different approaches. Our proposed lazy approaches improved through-put by as much as 46% for microbenchmarks and 30% for application benchmarks in comparison to the IPSec based approaches.
本文研究了基于网络存储的系统中iSCSI协议的性能和安全问题。与基于光纤通道的存储区域网络相比,以太网的速度一直在迅速提高,网络吞吐量不再被视为瓶颈。然而,当考虑到数据流量的安全性时,现有的协议(如IPSec)被证明是总体吞吐量的主要障碍。在本文中,我们评估了iSCSI在标准安全协议上部署时的性能,并建议采用惰性加密方法来减轻服务器的处理需求。测试平台由一组Linux机器组成,这些机器通过千兆以太网直接连接到服务器。使用微基准和应用程序基准(如BTIO和dbench)来分析不同方法的性能和可伸缩性。与基于IPSec的方法相比,我们提出的惰性方法将微基准测试的吞吐量提高了46%,将应用程序基准测试的吞吐量提高了30%。
{"title":"Design, implementation and evaluation of security in iSCSI-based network storage systems","authors":"S. Chaitanya, Kevin R. B. Butler, A. Sivasubramaniam, P. Mcdaniel, M. Vilayannur","doi":"10.1145/1179559.1179564","DOIUrl":"https://doi.org/10.1145/1179559.1179564","url":null,"abstract":"This paper studies the performance and security aspects of the iSCSI protocol in a network storage based system. Ethernet speeds have been improving rapidly and network throughput is no longer considered a bottleneck when compared to Fibre-channel based storage area networks. However, when security of the data traffic is taken into consideration, existing protocols like IPSec prove to be a major hindrance to the overall throughput. In this paper, we evaluate the performance of iSCSI when deployed over standard security protocols and suggest lazy crypto approaches to alleviate the processing needs at the server. The testbed consists of a cluster of Linux machines directly connected to the server through a Gigabit Ethernet network. Micro and application benchmarks like BTIO and dbench were used to analyze the performance and scalability of the different approaches. Our proposed lazy approaches improved through-put by as much as 46% for microbenchmarks and 30% for application benchmarks in comparison to the IPSec based approaches.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123839360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A statistical analysis of disclosed storage security breaches 已披露的存储安全漏洞的统计分析
Pub Date : 2006-10-30 DOI: 10.1145/1179559.1179561
Ragib Hasan, W. Yurcik
Many storage security breaches have recently been reported in the mass media as the direct result of new breach disclosure state laws across the United States (unfortunately, not internationally). In this paper, we provide an empirical analysis of disclosed storage security breaches for the period of 2005-2006. By processing raw data from the best available sources, we seek to understand the what, who, how, where, and when questions about storage security breaches so that others can build upon this evidence when developing best practices for preventing and mitigating storage breaches. While some policy formulation has already started in reaction to media reports (many without empirical analysis), this work provides initial empirical analysis upon which future empirical analysis and future policy decisions can be based.
最近在大众媒体上报道了许多存储安全漏洞,这是美国各地(不幸的是,不是国际上)新的漏洞披露州法律的直接结果。在本文中,我们对2005-2006年期间披露的存储安全漏洞进行了实证分析。通过处理来自最佳可用源的原始数据,我们试图了解有关存储安全漏洞的内容、人员、方式、地点和时间问题,以便其他人可以在开发预防和减轻存储漏洞的最佳实践时以此为基础。虽然一些政策制定已经开始对媒体报道作出反应(许多没有实证分析),但这项工作提供了初步的实证分析,未来的实证分析和未来的政策决定可以基于此。
{"title":"A statistical analysis of disclosed storage security breaches","authors":"Ragib Hasan, W. Yurcik","doi":"10.1145/1179559.1179561","DOIUrl":"https://doi.org/10.1145/1179559.1179561","url":null,"abstract":"Many storage security breaches have recently been reported in the mass media as the direct result of new breach disclosure state laws across the United States (unfortunately, not internationally). In this paper, we provide an empirical analysis of disclosed storage security breaches for the period of 2005-2006. By processing raw data from the best available sources, we seek to understand the what, who, how, where, and when questions about storage security breaches so that others can build upon this evidence when developing best practices for preventing and mitigating storage breaches. While some policy formulation has already started in reaction to media reports (many without empirical analysis), this work provides initial empirical analysis upon which future empirical analysis and future policy decisions can be based.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125168821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Limiting trust in the storage stack 限制存储堆栈中的信任
Pub Date : 2006-10-30 DOI: 10.1145/1179559.1179569
Lakshmi N. Bairavasundaram, Meenali Rungta, A. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
We propose a framework for examining trust in the storage stack based on different levels of trustworthiness present across different channels of information flow. We focus on corruption in one of the channels, the data channel and as a case study, we apply type-aware corruption techniques to examine Windows NTFS behavior when on-disk pointers are corrupted. We find that NTFS does not verify on-disk pointers thoroughly before using them and that even established error handling techniques like replication are often used ineffectively. Our study indicates the need to more carefully examine how trust is managed within modern file systems.
我们提出了一个框架,用于基于不同信息流通道中存在的不同级别的可信度来检查存储堆栈中的信任。我们关注其中一个通道的损坏,即数据通道,作为一个案例研究,我们应用类型感知损坏技术来检查磁盘指针损坏时Windows NTFS的行为。我们发现NTFS在使用磁盘指针之前并没有彻底地验证它们,甚至像复制这样的错误处理技术也经常被低效地使用。我们的研究表明,需要更仔细地研究如何在现代文件系统中管理信任。
{"title":"Limiting trust in the storage stack","authors":"Lakshmi N. Bairavasundaram, Meenali Rungta, A. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau","doi":"10.1145/1179559.1179569","DOIUrl":"https://doi.org/10.1145/1179559.1179569","url":null,"abstract":"We propose a framework for examining trust in the storage stack based on different levels of trustworthiness present across different channels of information flow. We focus on corruption in one of the channels, the data channel and as a case study, we apply type-aware corruption techniques to examine Windows NTFS behavior when on-disk pointers are corrupted. We find that NTFS does not verify on-disk pointers thoroughly before using them and that even established error handling techniques like replication are often used ineffectively. Our study indicates the need to more carefully examine how trust is managed within modern file systems.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132799346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure deletion from inverted indexes on compliance storage 从合规存储上的倒排索引中安全删除
Pub Date : 2006-10-30 DOI: 10.1145/1179559.1179572
Soumyadeb Mitra, M. Winslett
Recent litigation and intense regulatory focus on secure retention of electronic records have spurred a rush to introduce Write-Once-Read-Many (WORM) storage devices for retaining business records such as electronic mail. A file committed to a WORM device cannot be deleted even by a super-user and hence is secure from attacks originating from company insiders. Secure retention, however, is only a part of a document's lifecycle: It is often crucial to delete documents after its mandatory retention period is over. Since most of the modern WORM devices are built on top of magnetic media, they also support a secure deletion operation by associating expiration time with files. However, for the deleted document to be truly unrecoverable, it must also be deleted from any index structure built over it.This paper studies the problem of securely deleting entries from an inverted index. We first formalize the concept of secure deletion by defining two deletion semantics: strongly and weakly secure deletions. We then analyze some of the deletion schemes that have been proposed in literature and show that they only achieve weakly secure deletion. Furthermore, such schemes have poor space efficiency and/or are inflexibe. We then propose a novel technique for hiding index entries for deleted documents, based on the concept of ambiguating deleted entries. The proposed technique also achieves weakly secure deletion, but is more space efficient and flexible.
最近的诉讼和对电子记录安全保存的严格监管,促使人们纷纷引进用于保存电子邮件等商业记录的“写一次读多”(WORM)存储设备。提交给WORM设备的文件即使是超级用户也不能删除,因此可以防止来自公司内部人员的攻击。然而,安全保留只是文档生命周期的一部分:在强制保留期限结束后删除文档通常是至关重要的。由于大多数现代WORM设备都建立在磁性介质之上,因此它们还通过将过期时间与文件关联来支持安全删除操作。但是,要使被删除的文档真正不可恢复,还必须将其从构建在其上的任何索引结构中删除。研究了倒排索引中安全删除条目的问题。我们首先通过定义两种删除语义来形式化安全删除的概念:强安全删除和弱安全删除。然后,我们分析了文献中提出的一些删除方案,并表明它们只能实现弱安全删除。此外,这种方案的空间效率很差和/或缺乏灵活性。然后,我们提出了一种隐藏已删除文档索引项的新技术,该技术基于已删除项的歧义概念。该技术也实现了弱安全删除,但具有更高的空间效率和灵活性。
{"title":"Secure deletion from inverted indexes on compliance storage","authors":"Soumyadeb Mitra, M. Winslett","doi":"10.1145/1179559.1179572","DOIUrl":"https://doi.org/10.1145/1179559.1179572","url":null,"abstract":"Recent litigation and intense regulatory focus on secure retention of electronic records have spurred a rush to introduce Write-Once-Read-Many (WORM) storage devices for retaining business records such as electronic mail. A file committed to a WORM device cannot be deleted even by a super-user and hence is secure from attacks originating from company insiders. Secure retention, however, is only a part of a document's lifecycle: It is often crucial to delete documents after its mandatory retention period is over. Since most of the modern WORM devices are built on top of magnetic media, they also support a secure deletion operation by associating expiration time with files. However, for the deleted document to be truly unrecoverable, it must also be deleted from any index structure built over it.This paper studies the problem of securely deleting entries from an inverted index. We first formalize the concept of secure deletion by defining two deletion semantics: strongly and weakly secure deletions. We then analyze some of the deletion schemes that have been proposed in literature and show that they only achieve weakly secure deletion. Furthermore, such schemes have poor space efficiency and/or are inflexibe. We then propose a novel technique for hiding index entries for deleted documents, based on the concept of ambiguating deleted entries. The proposed technique also achieves weakly secure deletion, but is more space efficient and flexible.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133437206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Scalable security for large, high performance storage systems 针对大型高性能存储系统的可扩展安全性
Pub Date : 2006-10-30 DOI: 10.1145/1179559.1179565
A. Leung, E. L. Miller
New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and efficient protocol for security in high performance, object-based storage systems that reduces protocol overhead and eliminates bottlenecks, thus increasing performance without sacrificing security primitives. Our protocol enforces security using cryptographically secure capabilities, with three novel features that make them ideal for high performance workloads: a scheme for managing coarse grained capabilities, methods for describing client and file groups, and strict security control through capability lifetime extensions. By reducing the number of unique capabilities that must be generated, metadata server load is reduced. Combining and caching client verifications reduces client latencies and workload because metadata and data requests are more frequently serviced by cached capabilities. Strict access control is handled quickly and efficiently through short-lived capabilities and lifetime extensions.We have implemented a prototype of our security protocol and evaluated its performance and scalability using a high performance file system workload. Our numbers demonstrate the ability of our protocol to drastically reduce client security latency to nearly zero. Additionally, our approach improves MDS performance considerably, serving over 99% of all file access requests with cached capabilities. OSD scalability is greatly improved; our solution requires 95 times fewer capability verifications than previous solutions.
新设计的pb级存储系统现在能够每秒传输数百千兆字节的数据,但缺乏强大的安全性。我们为高性能、基于对象的存储系统提出了一种可扩展的、高效的安全协议,它可以减少协议开销,消除瓶颈,从而在不牺牲安全原语的情况下提高性能。我们的协议使用加密安全功能来加强安全性,其中有三个新特性使其成为高性能工作负载的理想选择:管理粗粒度功能的方案、描述客户端和文件组的方法,以及通过功能生命周期扩展进行严格的安全控制。通过减少必须生成的唯一功能的数量,可以减少元数据服务器的负载。合并和缓存客户端验证可以减少客户端延迟和工作负载,因为元数据和数据请求更频繁地由缓存功能提供服务。通过短期功能和生命周期扩展,可以快速有效地处理严格的访问控制。我们已经实现了安全协议的原型,并使用高性能文件系统工作负载评估了其性能和可伸缩性。我们的数据表明,我们的协议能够将客户端安全延迟大幅降低到接近于零。此外,我们的方法大大提高了MDS的性能,使用缓存功能为99%以上的文件访问请求提供服务。大大提高了OSD的可扩展性;我们的解决方案需要的能力验证比以前的解决方案少95倍。
{"title":"Scalable security for large, high performance storage systems","authors":"A. Leung, E. L. Miller","doi":"10.1145/1179559.1179565","DOIUrl":"https://doi.org/10.1145/1179559.1179565","url":null,"abstract":"New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and efficient protocol for security in high performance, object-based storage systems that reduces protocol overhead and eliminates bottlenecks, thus increasing performance without sacrificing security primitives. Our protocol enforces security using cryptographically secure capabilities, with three novel features that make them ideal for high performance workloads: a scheme for managing coarse grained capabilities, methods for describing client and file groups, and strict security control through capability lifetime extensions. By reducing the number of unique capabilities that must be generated, metadata server load is reduced. Combining and caching client verifications reduces client latencies and workload because metadata and data requests are more frequently serviced by cached capabilities. Strict access control is handled quickly and efficiently through short-lived capabilities and lifetime extensions.We have implemented a prototype of our security protocol and evaluated its performance and scalability using a high performance file system workload. Our numbers demonstrate the ability of our protocol to drastically reduce client security latency to nearly zero. Additionally, our approach improves MDS performance considerably, serving over 99% of all file access requests with cached capabilities. OSD scalability is greatly improved; our solution requires 95 times fewer capability verifications than previous solutions.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"256 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132091079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Hydra: a platform for survivable and secure data storage systems 九头蛇:一个可生存和安全的数据存储系统平台
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103797
Lihao Xu
This paper introduces Hydra, a platform that we are developing for highly survivable and secure data storage systems that distribute information over networks and adapt timely to environment changes, enabling users to store and access critical data in a continuously available and highly trustable fashion. The Hydra platform uses MDS array codes that can be encoded and decoded efficiently for distributing and recovering user data. Novel uses of MDS array codes in Hydra are discussed, as well as Hydra's design goals, general structures and a set of basic operations on user data. We also explore Hydra's applications in survivable and secure data storage systems.
本文介绍了Hydra,我们正在开发的一个平台,用于高生存能力和安全的数据存储系统,该系统通过网络分发信息,并及时适应环境变化,使用户能够以持续可用和高度可信的方式存储和访问关键数据。Hydra平台使用MDS阵列代码,可以有效地进行编码和解码,以分发和恢复用户数据。讨论了MDS阵列代码在Hydra中的新用途,以及Hydra的设计目标、总体结构和对用户数据的一套基本操作。我们还探讨了Hydra在可生存和安全数据存储系统中的应用。
{"title":"Hydra: a platform for survivable and secure data storage systems","authors":"Lihao Xu","doi":"10.1145/1103780.1103797","DOIUrl":"https://doi.org/10.1145/1103780.1103797","url":null,"abstract":"This paper introduces Hydra, a platform that we are developing for highly survivable and secure data storage systems that distribute information over networks and adapt timely to environment changes, enabling users to store and access critical data in a continuously available and highly trustable fashion. The Hydra platform uses MDS array codes that can be encoded and decoded efficiently for distributing and recovering user data. Novel uses of MDS array codes in Hydra are discussed, as well as Hydra's design goals, general structures and a set of basic operations on user data. We also explore Hydra's applications in survivable and secure data storage systems.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":" 90","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113948033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Secured storage using secureParser™ 安全存储使用secureParser™
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103801
Sabre A. Schnitzer, Robert A. Johnson, Henry Hoyt
Securing storage data is a manifold problem with requirements in three dimensions: data security, data integrity, and the safety of data. Meeting the requirements for one dimension often means compromising another. SecureParser™ is a software technology which addresses all three dimensions of secure storage without compromising any. In this paper, we describe the SecureParser™ technology and discuss how it addresses the three dimensions of secured storage: security, integrity, and safety.
保护存储数据是一个多方面的问题,涉及三个方面的需求:数据安全性、数据完整性和数据安全性。满足一个维度的需求往往意味着对另一个维度的妥协。SecureParser™是一种软件技术,它解决了安全存储的所有三个维度,而不会损害任何。在本文中,我们将描述SecureParser™技术,并讨论它如何解决安全存储的三个维度:安全性、完整性和安全性。
{"title":"Secured storage using secureParser™","authors":"Sabre A. Schnitzer, Robert A. Johnson, Henry Hoyt","doi":"10.1145/1103780.1103801","DOIUrl":"https://doi.org/10.1145/1103780.1103801","url":null,"abstract":"Securing storage data is a manifold problem with requirements in three dimensions: data security, data integrity, and the safety of data. Meeting the requirements for one dimension often means compromising another. SecureParser™ is a software technology which addresses all three dimensions of secure storage without compromising any. In this paper, we describe the SecureParser™ technology and discuss how it addresses the three dimensions of secured storage: security, integrity, and safety.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126584828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An electric fence for kernel buffers 内核缓冲区的电栅栏
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103786
N. Joukov, A. Kashyap, Gopalan Sivathanu, E. Zadok
Improper access of data buffers is one of the most common errors in programs written in assembler, C, C++, and several other languages. Existing programs and OSs frequently access the data beyond the allocated buffers or access buffers that were already freed. Such programs and OSs may run for years before their problems can be detected because improper memory accesses frequently result in a silent data corruption. Not surprisingly, most computer worms exploit buffer overflow errors to gain complete control over computer systems. Only after recent worm epidemics, did code developers begin to realize the scale of the problem and the number of potential memory-access violations in existing code.Due to the syntax and flexibility of many programming languages, memory access violation problems cannot be detected at compile time. Tools that verify correctness before every memory access impose unacceptably high overheads. As a result, most of the developed techniques focus on preventing the hijacking of control by hackers and worms due to stack overflows. Consequently, hidden data corruption is given less attention.Memory access violations can be efficiently detected using the hardware support of the paging and virtual memory.Kefence is the general run-time solution we developed that allows to detect and avoid in-kernel overflow, underflow, and stale access problems for internal kernel buffers. Kefence is especially applicable to file system code because file systems operate at a high level of abstraction and require no direct access to the physical memory. At the same time, file systems use a large number of kernel buffers and file system errors are most harmful for users because users' persistent data can be corrupted.
对数据缓冲区的不正确访问是用汇编、C、c++和其他几种语言编写的程序中最常见的错误之一。现有的程序和操作系统经常访问超出已分配缓冲区或已经释放的访问缓冲区的数据。这样的程序和操作系统可能会运行数年才会发现问题,因为不适当的内存访问经常会导致无声的数据损坏。毫不奇怪,大多数计算机蠕虫利用缓冲区溢出错误来获得对计算机系统的完全控制。只是在最近的蠕虫流行之后,代码开发人员才开始意识到问题的规模和现有代码中潜在的内存访问违规的数量。由于许多编程语言的语法和灵活性,在编译时无法检测到内存访问冲突问题。在每次内存访问之前验证正确性的工具会带来不可接受的高开销。因此,大多数开发的技术都集中在防止由于堆栈溢出而被黑客和蠕虫劫持控制上。因此,隐藏的数据损坏被给予较少的关注。使用分页和虚拟内存的硬件支持,可以有效地检测内存访问违规。Kefence是我们开发的通用运行时解决方案,它允许检测和避免内核内溢出、下溢和内部内核缓冲区的过时访问问题。Kefence特别适用于文件系统代码,因为文件系统在高抽象级别上操作,不需要直接访问物理内存。同时,文件系统使用了大量的内核缓冲区,文件系统错误对用户的危害最大,因为用户的持久数据可能会被破坏。
{"title":"An electric fence for kernel buffers","authors":"N. Joukov, A. Kashyap, Gopalan Sivathanu, E. Zadok","doi":"10.1145/1103780.1103786","DOIUrl":"https://doi.org/10.1145/1103780.1103786","url":null,"abstract":"Improper access of data buffers is one of the most common errors in programs written in assembler, C, C++, and several other languages. Existing programs and OSs frequently access the data beyond the allocated buffers or access buffers that were already freed. Such programs and OSs may run for years before their problems can be detected because improper memory accesses frequently result in a silent data corruption. Not surprisingly, most computer worms exploit buffer overflow errors to gain complete control over computer systems. Only after recent worm epidemics, did code developers begin to realize the scale of the problem and the number of potential memory-access violations in existing code.Due to the syntax and flexibility of many programming languages, memory access violation problems cannot be detected at compile time. Tools that verify correctness before every memory access impose unacceptably high overheads. As a result, most of the developed techniques focus on preventing the hijacking of control by hackers and worms due to stack overflows. Consequently, hidden data corruption is given less attention.Memory access violations can be efficiently detected using the hardware support of the paging and virtual memory.Kefence is the general run-time solution we developed that allows to detect and avoid in-kernel overflow, underflow, and stale access problems for internal kernel buffers. Kefence is especially applicable to file system code because file systems operate at a high level of abstraction and require no direct access to the physical memory. At the same time, file systems use a large number of kernel buffers and file system errors are most harmful for users because users' persistent data can be corrupted.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125132262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient and provably secure ciphers for storage device block level encryption 用于存储设备块级加密的有效且可证明安全的密码
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103796
Yuliang Zheng, Yongge Wang
Block ciphers generally have fixed and relatively small input length. Thus they are often used in some mode of operations (e.g., ECB, CBC, CFB, and CTR) that enables the encryption of longer messages. Unfortunately, all these modes of operation reveal some information on their inputs or on relationships between different inputs. As an example, in the CBC mode, encrypting two messages with an identical prefix will result in identical initial blocks in the ciphertexts. Due to the well-known birthday attack and the small input length, the CBC mode becomes less secure as the number of data blocks to be encrypted increases. This leads to a challenging task, namely to design schemes for storage device block or sector level data encryption that are efficient and do not have the disadvantages mentioned above. In this paper, we propose an efficient cipher whose data/cipher blocks can be specified flexibly to match the length of a block unit for current and foreseeable future storage devices. We show that our encryption scheme is provably secure under the assumption that the underlying one-way hash function is a random function.
分组密码通常具有固定且相对较小的输入长度。因此,它们通常用于某些操作模式(例如ECB、CBC、CFB和CTR),这些操作模式支持对较长的消息进行加密。不幸的是,所有这些操作模式都揭示了它们的输入或不同输入之间关系的一些信息。例如,在CBC模式下,对具有相同前缀的两条消息进行加密将导致密文中的初始块相同。由于众所周知的生日攻击和较小的输入长度,随着需要加密的数据块数量的增加,CBC模式的安全性会降低。这导致了一项具有挑战性的任务,即设计高效且不存在上述缺点的存储设备块或扇区级数据加密方案。在本文中,我们提出了一种高效的密码,它的数据/密码块可以灵活地指定,以匹配当前和可预见的未来存储设备的块单元长度。在假设底层单向哈希函数是随机函数的情况下,我们证明了我们的加密方案是可证明的安全的。
{"title":"Efficient and provably secure ciphers for storage device block level encryption","authors":"Yuliang Zheng, Yongge Wang","doi":"10.1145/1103780.1103796","DOIUrl":"https://doi.org/10.1145/1103780.1103796","url":null,"abstract":"Block ciphers generally have fixed and relatively small input length. Thus they are often used in some mode of operations (e.g., ECB, CBC, CFB, and CTR) that enables the encryption of longer messages. Unfortunately, all these modes of operation reveal some information on their inputs or on relationships between different inputs. As an example, in the CBC mode, encrypting two messages with an identical prefix will result in identical initial blocks in the ciphertexts. Due to the well-known birthday attack and the small input length, the CBC mode becomes less secure as the number of data blocks to be encrypted increases. This leads to a challenging task, namely to design schemes for storage device block or sector level data encryption that are efficient and do not have the disadvantages mentioned above. In this paper, we propose an efficient cipher whose data/cipher blocks can be specified flexibly to match the length of a block unit for current and foreseeable future storage devices. We show that our encryption scheme is provably secure under the assumption that the underlying one-way hash function is a random function.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134265368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach for fault tolerant and secure data storage in collaborative work environments 协同工作环境中容错和安全数据存储方法
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103793
A. Subbiah, D. Blough
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store data. Perfect secret sharing schemes have found little use in managing generic data because of the high computation overheads incurred by such schemes. Our proposed approach uses a novel combination of XOR secret sharing and replication mechanisms, which drastically reduce the computation overheads and achieve speeds comparable to standard encryption schemes. The combination of secret sharing and replication manifests itself as an architectural framework, which has the attractive property that its dimension can be varied to exploit tradeoffs amongst different performance metrics. We evaluate the properties and performance of the proposed framework and show that the combination of perfect secret sharing and replication can be used to build efficient fault-tolerant and secure distributed data storage systems.
本文描述了一种在协同工作环境中构建安全、容错数据存储服务的新方法,该方法使用完美的秘密共享方案来存储数据。完美的秘密共享方案在管理通用数据方面用处不大,因为这种方案产生了很高的计算开销。我们提出的方法使用了异或秘密共享和复制机制的新组合,这大大降低了计算开销,并实现了与标准加密方案相当的速度。秘密共享和复制的组合表现为一个体系结构框架,它具有一个吸引人的特性,即它的维度可以改变,以利用不同性能指标之间的权衡。我们评估了所提出的框架的特性和性能,并表明完美的秘密共享和复制的结合可以用来构建高效的容错和安全的分布式数据存储系统。
{"title":"An approach for fault tolerant and secure data storage in collaborative work environments","authors":"A. Subbiah, D. Blough","doi":"10.1145/1103780.1103793","DOIUrl":"https://doi.org/10.1145/1103780.1103793","url":null,"abstract":"We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store data. Perfect secret sharing schemes have found little use in managing generic data because of the high computation overheads incurred by such schemes. Our proposed approach uses a novel combination of XOR secret sharing and replication mechanisms, which drastically reduce the computation overheads and achieve speeds comparable to standard encryption schemes. The combination of secret sharing and replication manifests itself as an architectural framework, which has the attractive property that its dimension can be varied to exploit tradeoffs amongst different performance metrics. We evaluate the properties and performance of the proposed framework and show that the combination of perfect secret sharing and replication can be used to build efficient fault-tolerant and secure distributed data storage systems.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133256078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
期刊
ACM International Workshop on Storage Security And Survivability
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1