PRESS-NEWS.org - Press Release Distribution
PRESS RELEASES DISTRIBUTION

New hardware design protects data in the cloud

A new hardware design makes data encryption more secure by disguising cloud servers' memory-access patterns

2013-07-02
(Press-News.org) CAMBRIDGE, Mass -- Cloud computing -- outsourcing computational tasks over the Internet -- could give home-computer users unprecedented processing power and let small companies launch sophisticated Web services without building massive server farms.

But it also raises privacy concerns. A bank of cloud servers could be running applications for 1,000 customers at once; unbeknownst to the hosting service, one of those applications might have no purpose other than spying on the other 999.

Encryption could make cloud servers more secure. Only when the data is actually being processed would it be decrypted; the results of any computations would be re-encrypted before they're sent off-chip.

In the last 10 years or so, however, it's become clear that even when a computer is handling encrypted data, its memory-access patterns -- the frequency with which it stores and accesses data at different memory addresses — can betray a shocking amount of private information.

At the International Symposium on Computer Architecture in June, MIT researchers described a new type of secure hardware component, dubbed Ascend, that would disguise a server's memory-access patterns, making it impossible for an attacker to infer anything about the data being stored. Ascend also thwarts another type of attack, known as a timing attack, which attempts to infer information from the amount of time that computations take.

Computational trade-off

Similar designs have been proposed in the past, but they've generally traded too much computational overhead for security. "This is the first time that any hardware design has been proposed -- it hasn't been built yet -- that would give you this level of security while only having about a factor of three or four overhead in performance," says Srini Devadas, the Edwin Sibley Webster Professor of Electrical Engineering and Computer Science, whose group developed the new system. "People would have thought it would be a factor of 100."

The "trivial way" of obscuring memory-access patterns, Devadas explains, would be to request data from every address in the memory -- whether a memory chip or a hard drive -- and throw out everything except the data stored at the one address of interest. But that would be much too time-consuming to be practical.

What Devadas and his collaborators -- graduate students Ling Ren, Xiangyao Yu and Christopher Fletcher, and research scientist Marten van Dijk — do instead is to arrange memory addresses in a data structure known as a "tree." A family tree is a familiar example of a tree, in which each "node" (in this example, a person's name) is attached to only one node above it (the node representing the person's parents) but may connect to several nodes below it (the person's children).

With Ascend, addresses are assigned to nodes randomly. Every node lies along some "path," or route through the tree, that starts at the top and passes from node to node, without backtracking, until arriving at a node with no further connections. When the processor requires data from a particular address, it sends requests to all the addresses in a path that includes the one it's really after.

To prevent an attacker from inferring anything from sequences of memory access, every time Ascend accesses a particular memory address, it randomly swaps that address with one stored somewhere else in the tree. As a consequence, accessing a single address multiple times will very rarely require traversing the same path.

Less computation to disguise an address

By confining its dummy requests to a single path, rather than sending them to every address in memory, Ascend exponentially reduces the amount of computation required to disguise an address. In a separate paper, which is as-yet unpublished but has been posted online, the researchers prove that querying paths provides just as much security as querying every address in memory would.

Ascend also protects against timing attacks. Suppose that the computation being outsourced to the cloud is the mammoth task of comparing a surveillance photo of a criminal suspect to random photos on the Web. The surveillance photo itself would be encrypted, and thus secure from prying eyes. But spyware in the cloud could still deduce what public photos it was being compared to. And the time the comparisons take could indicate something about the source photos: Photos of obviously different people could be easy to rule out, but photos of very similar people might take longer to distinguish.

So Ascend's memory-access scheme has one final wrinkle: It sends requests to memory at regular intervals -- even when the processor is busy and requires no new data. That way, attackers can't tell how long any given computation is taking.

###

Written by Larry Hardesty, MIT News Office


ELSE PRESS RELEASES FROM THIS DATE:

Are thoughts of death conducive to humor?

2013-07-02
Humor is an intrinsic part of human experience. It plays a role in every aspect of human existence, from day-to-day conversation to television shows. Yet little research has been conducted to date on the psychological function of humor. In human psychology, awareness of the impermanence of life is just as prevalent as humor. According to the Terror Management Theory, knowledge of one's own impermanence creates potentially disruptive existential anxiety, which the individual brings under control with two coping mechanisms, or anxiety buffers: rigid adherence to dominant ...

Flexing the Verification Muscle

2013-07-02
The logistics were impressive, the timeframe tight, the conditions tough. From 26 May to 7 June 2013, nearly 150 experts from 40 countries set up shop on a military training ground near Veszprém, Hungary, for a simulated search for evidence of a nuclear explosion. Fifteen trucks transported 120 tons of state-of-the-art equipment from the CTBTO's Vienna storage facility to the site, where a fully functioning base of operations was established. Welcome to the world of on-site inspections (OSI). An OSI, a Treaty-specified search of the suspect area to determine if ...

Music to a gambler's ears

2013-07-02
Winning sounds on slot machines make gambling more exciting, according to a new study by Mike Dixon and colleagues from the University of Waterloo in Canada. Moreover, their work shows that sounds also cause players to overestimate the number of times they won while playing on slot machines. The study is published online in Springer's Journal of Gambling Studies. Sound has always been an integral part of the slot machine playing experience. Since the early 1900s, players have been rewarded with a ringing bell every time they have a winning combination. Today's slot machines ...

Neighborhood residents with lowest incomes most likely to care about their communities

2013-07-02
COLUMBIA, Mo. – Some may assume that low-income residents of run-down, crime-ridden neighborhoods do not care about their communities. However, research from the University of Missouri suggests otherwise. Mansoo Yu, an assistant professor of social work and public health at MU, studied levels of community care and vigilance among residents living in high-crime, low-income areas. Community care and vigilance refer to individuals' desires to improve their communities, to take pride in their neighborhoods and to monitor and report unwelcome happenings, such as crimes, near ...

Joslin scientists find that salsalate lowers blood glucose in type 2 diabetes

2013-07-02
BOSTON – July 1, 2013 -- Joslin scientists report that salsalate, a drug used to treat arthritis, lowers blood glucose and improves glycemic control in type 2 diabetes. These findings, which were published today by the Annals of Internal Medicine, provide additional evidence that salsalate may be an effective drug to treat type 2 diabetes. The scientists became interested in studying salsalate, an anti-inflammatory drug, after research conducted by Steven Shoelson, M.D., Ph.D., Head of the Section on Pathophysiology and Molecular Pharmacology and Professor of Medicine ...

Hijacking stress response in cancer

2013-07-02
Cancer cells have alteration in metabolic pathways as a result of oncogenes that promote tumor growth. NRF2 (nuclear factor erythroid-derived 2-related factor 2) works as a "master gene" that turns on stress response by increasing numerous antioxidants and pollutant-detoxifying genes to protect the lungs from variety of air pollutants such as diesel exhaust and cigarette smoke. However, researchers at the Johns Hopkins Bloomberg School of Public Health and others have found for the first time that NRF2 signaling also plays a role in the growth of tumor cells by altering ...

Dissecting the distinctive walk of disease

2013-07-02
PITTSBURGH -- Older adults diagnosed with brain disorders such as Parkinson's disease often feel a loss of independence because of their lack of mobility and difficulty walking. To better understand and improve these mobility issues—and detect them sooner—a University of Pittsburgh multidisciplinary research team is working toward building a more advanced motion test that addresses a wider range of walking patterns and movements. In a recent issue of IEEE Transactions on Neural Systems and Rehabilitation Engineering, researchers from Pitt's Swanson School of Engineering, ...

NASA sees tropical storm dalila weaken, new low pressure area form

2013-07-02
NOAA's GOES-15 satellite captured an infrared image of the Eastern Pacific Ocean during the pre-dawn hours on July 2 and noticed Tropical Storm Dalila weakening near the southwestern Mexico coast, while further southwest a new tropical low pressure area called System 97E, had formed. Dalila's maximum sustained winds appeared to peak on July 1 at 11 p.m. EDT when they hit 70 mph (110 kph). By 5 a.m. EDT on July 2, Dalila's maximum sustained winds dropped to 65 mph (100 kph). Dalila was also moving away from the southwestern coast of Mexico and headed into the open waters ...

Don't judge by the looks: Molecular analysis reveals a new species of white toothed shrew

2013-07-02
The white toothed shrew genus Crocidura is known as the largest mammal genus, with more than 180 species distributed around the world. A recent genetic analysis of the white toothed shrew fauna of Vietnam revealed the misinterpretations of previous morphological studies of the species, including the description of a new species of these very small mammals. The study was published in the open access journal ZooKeys. Describing new mammal species is an unusual event nowadays when mammal fauna has been by and large already thoroughly studied by zoologists during the previous ...

High nitrogen dioxide levels from Arizona's Yarnell Hill Fire

2013-07-02
This June 29, 2013 image from the OMI, or Ozone Monitoring Instrument aboard NASA's Aura satellite shows nitrogen dioxide (NO2) levels in Arizona pertaining to three large fires. The highest levels of NO2, which is produced by combustion, were from the Yarnell Hill fire (dark red and brown). NO2 concentration is given as the number of molecules in a cubic centimeter. The highest NO2 concentration values (8-9 x 10^15) indicated that this strong fire was burning a large amount of combustible material and thus generating a large amount of NO2 in a small area. The image was ...

LAST 30 PRESS RELEASES:

4,000-year-old teeth record the earliest traces of people chewing psychoactive betel nuts

Efficient solar harvesting even in high humidity

Heavy drinking raises the risk of undesired pregnancy; cannabis use does not

New study shows young adults who use high strength cannabis do not ‘titrate’ to less risky levels of use

Black hole vibes

Actual distance travelled by migrating whales drastically underestimated

The eagles resistant to poisonous toads

Cyberstalking growing at faster rate than other forms of stalking

CPADS: a web tool for comprehensive pancancer analysis of drug sensitivity

Several healthy diet patterns are associated with reduced risk of type 2 diabetes regardless of ethnicity – shows meta-analysis of more than 800,000 people

Liver fibrosis to cancer: scientists map path to block deadly transition

Microbiota boost immunotherapy? A meta-analysis dives into fecal microbiota transplantation and immune checkpoint inhibitors

Cancer's double agents: Fibroblasts both help and hinder immunotherapy

Unveiling large multimodal models in pulmonary CT: A comparative assessment of generative AI performance in lung cancer diagnostics

AI can fake peer reviews and escape detection, study finds

T cell senescence in the tumor microenvironment

Simple solution to save lives globally: Low-cost ‘SimpleSilo’ offers hope for babies with gastroschisis

Curbing roadway fatalities hinges on shared responsibility and rethinking safety

Beta-HPV can directly cause skin cancer in immunocompromised people

Efforts underway to end race-based assessments of lung function

CAR-T cell therapy linked to increased risk of secondary primary malignancies globally

THER: integrative web tool for tumor hypoxia exploration and research

How sources of dietary fat influence cancer growth in obesity

Women less likely than men to receive MS drugs

AI language models sharpen chest CT diagnoses, speeding surgical decisions

Machine learning model predicts which patients with nasopharyngeal cancer respond to radiation

GenAI models extract pathological features for lung adenocarcinoma grading and prognosis

New research further investigates safety of general anesthesia in infants

We might inhale 68,000 lung-penetrating microplastics daily in our homes and cars – 100x previous estimates

Indian adults who move to cities are significantly more likely to become obese than their rural counterparts - and the longer they stay, the greater the risk

[Press-News.org] New hardware design protects data in the cloud
A new hardware design makes data encryption more secure by disguising cloud servers' memory-access patterns