StopWatch : Toward “Differentially Private” Timing for Cloud Executions
نویسندگان
چکیده
This paper describes StopWatch , a system that defends against timing-based side-channel attacks that arise from coresidency of victims and attackers in infrastructureas-a-service cloud environments. StopWatch triplicates each cloud-resident guest virtual machine (VM) and places replicas so that the three replicas of a guest VM are coresident with nonoverlapping sets of (replicas of) other VMs. Then, StopWatch uses the timing behaviors of a VM’s replicas collectively to determine the timing of events observed by each one or by an external observer, so that observable timing behaviors could have been observed in the absence of any other individual, coresident VM. In this respect, StopWatch implements a form of “differentially private” timing behavior in a cloud. We detail the design and implementation of StopWatch in Xen, evaluate the factors that influence its performance, and address the problem of placing VM replicas in a cloud under the constraints of StopWatch so as to still enable adequate cloud utilization. Keywords-timing attacks; side channels; replication; clouds
منابع مشابه
Mitigating Timing Channels in Clouds using StopWatch∗
This paper presents StopWatch , a system that defends against timing-based side-channel attacks that arise from coresidency of victims and attackers in infrastructureas-a-service clouds. StopWatch triplicates each cloudresident guest virtual machine (VM) and places replicas so that the three replicas of a guest VM are coresident with nonoverlapping sets of (replicas of) other VMs. StopWatch use...
متن کاملSLA-Driven Dynamic Resource Management System for Private Clouds
Resource management in private clouds is a more challenging task than in public clouds. Because there are only finite resources in private cloud compare to public cloud with vast resources. Often, marginal resources are assigned to the application in the private cloud, which causes to the changes of service level of application executions. A resource management system is responsible for fulfill...
متن کاملDifferentially Private Local Electricity Markets
Privacy-preserving electricity markets have a key role in steering customers towards participation in local electricity markets by guarantying to protect their sensitive information. Moreover, these markets make it possible to statically release and share the market outputs for social good. This paper aims to design a market for local energy communities by implementing Differential Privacy (DP)...
متن کاملDifferentially private client-side data deduplication protocol for cloud storage services
Cloud storage service providers apply data client-side deduplication across multiple users to achieve cost savings of network bandwidth and disk storage. However, deduplication can be used as a side channel by attackers who try to obtain sensitive information of other users’ data. We propose a differentially private client-side deduplication protocol. A storage gateway allows efficient data ded...
متن کاملFinal Document: Improving Utility of Differentially Private Confidence Intervals
A differentially private randomized algorithm, M , is one meeting the requirement that given two neighboring datasets d and d′, that is datasets that differ in no more than one row, and a set of outcomes S, the following condition that Pr[M(d) ∈ S] ≤ e Pr[M(d′) ∈ S] holds for some ≥ 0. Differentially private algorithms run on datasets can provide the guarantee that the information of any one co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011