(Press-News.org) CAMBRIDGE, Mass -- Cloud computing -- outsourcing computational tasks over the Internet -- could give home-computer users unprecedented processing power and let small companies launch sophisticated Web services without building massive server farms.
But it also raises privacy concerns. A bank of cloud servers could be running applications for 1,000 customers at once; unbeknownst to the hosting service, one of those applications might have no purpose other than spying on the other 999.
Encryption could make cloud servers more secure. Only when the data is actually being processed would it be decrypted; the results of any computations would be re-encrypted before they're sent off-chip.
In the last 10 years or so, however, it's become clear that even when a computer is handling encrypted data, its memory-access patterns -- the frequency with which it stores and accesses data at different memory addresses — can betray a shocking amount of private information.
At the International Symposium on Computer Architecture in June, MIT researchers described a new type of secure hardware component, dubbed Ascend, that would disguise a server's memory-access patterns, making it impossible for an attacker to infer anything about the data being stored. Ascend also thwarts another type of attack, known as a timing attack, which attempts to infer information from the amount of time that computations take.
Computational trade-off
Similar designs have been proposed in the past, but they've generally traded too much computational overhead for security. "This is the first time that any hardware design has been proposed -- it hasn't been built yet -- that would give you this level of security while only having about a factor of three or four overhead in performance," says Srini Devadas, the Edwin Sibley Webster Professor of Electrical Engineering and Computer Science, whose group developed the new system. "People would have thought it would be a factor of 100."
The "trivial way" of obscuring memory-access patterns, Devadas explains, would be to request data from every address in the memory -- whether a memory chip or a hard drive -- and throw out everything except the data stored at the one address of interest. But that would be much too time-consuming to be practical.
What Devadas and his collaborators -- graduate students Ling Ren, Xiangyao Yu and Christopher Fletcher, and research scientist Marten van Dijk — do instead is to arrange memory addresses in a data structure known as a "tree." A family tree is a familiar example of a tree, in which each "node" (in this example, a person's name) is attached to only one node above it (the node representing the person's parents) but may connect to several nodes below it (the person's children).
With Ascend, addresses are assigned to nodes randomly. Every node lies along some "path," or route through the tree, that starts at the top and passes from node to node, without backtracking, until arriving at a node with no further connections. When the processor requires data from a particular address, it sends requests to all the addresses in a path that includes the one it's really after.
To prevent an attacker from inferring anything from sequences of memory access, every time Ascend accesses a particular memory address, it randomly swaps that address with one stored somewhere else in the tree. As a consequence, accessing a single address multiple times will very rarely require traversing the same path.
Less computation to disguise an address
By confining its dummy requests to a single path, rather than sending them to every address in memory, Ascend exponentially reduces the amount of computation required to disguise an address. In a separate paper, which is as-yet unpublished but has been posted online, the researchers prove that querying paths provides just as much security as querying every address in memory would.
Ascend also protects against timing attacks. Suppose that the computation being outsourced to the cloud is the mammoth task of comparing a surveillance photo of a criminal suspect to random photos on the Web. The surveillance photo itself would be encrypted, and thus secure from prying eyes. But spyware in the cloud could still deduce what public photos it was being compared to. And the time the comparisons take could indicate something about the source photos: Photos of obviously different people could be easy to rule out, but photos of very similar people might take longer to distinguish.
So Ascend's memory-access scheme has one final wrinkle: It sends requests to memory at regular intervals -- even when the processor is busy and requires no new data. That way, attackers can't tell how long any given computation is taking.
###
Written by Larry Hardesty, MIT News Office
New hardware design protects data in the cloud
A new hardware design makes data encryption more secure by disguising cloud servers' memory-access patterns
2013-07-02
ELSE PRESS RELEASES FROM THIS DATE:
Are thoughts of death conducive to humor?
2013-07-02
Humor is an intrinsic part of human experience. It plays a role in every aspect of human existence, from day-to-day conversation to television shows. Yet little research has been conducted to date on the psychological function of humor. In human psychology, awareness of the impermanence of life is just as prevalent as humor. According to the Terror Management Theory, knowledge of one's own impermanence creates potentially disruptive existential anxiety, which the individual brings under control with two coping mechanisms, or anxiety buffers: rigid adherence to dominant ...
Flexing the Verification Muscle
2013-07-02
The logistics were impressive, the timeframe tight, the conditions tough.
From 26 May to 7 June 2013, nearly 150 experts from 40 countries set up shop on a military training ground near Veszprém, Hungary, for a simulated search for evidence of a nuclear explosion. Fifteen trucks transported 120 tons of state-of-the-art equipment from the CTBTO's Vienna storage facility to the site, where a fully functioning base of operations was established. Welcome to the world of on-site inspections (OSI).
An OSI, a Treaty-specified search of the suspect area to determine if ...
Music to a gambler's ears
2013-07-02
Winning sounds on slot machines make gambling more exciting, according to a new study by Mike Dixon and colleagues from the University of Waterloo in Canada. Moreover, their work shows that sounds also cause players to overestimate the number of times they won while playing on slot machines. The study is published online in Springer's Journal of Gambling Studies.
Sound has always been an integral part of the slot machine playing experience. Since the early 1900s, players have been rewarded with a ringing bell every time they have a winning combination. Today's slot machines ...
Neighborhood residents with lowest incomes most likely to care about their communities
2013-07-02
COLUMBIA, Mo. – Some may assume that low-income residents of run-down, crime-ridden neighborhoods do not care about their communities. However, research from the University of Missouri suggests otherwise.
Mansoo Yu, an assistant professor of social work and public health at MU, studied levels of community care and vigilance among residents living in high-crime, low-income areas. Community care and vigilance refer to individuals' desires to improve their communities, to take pride in their neighborhoods and to monitor and report unwelcome happenings, such as crimes, near ...
Joslin scientists find that salsalate lowers blood glucose in type 2 diabetes
2013-07-02
BOSTON – July 1, 2013 -- Joslin scientists report that salsalate, a drug used to treat arthritis, lowers blood glucose and improves glycemic control in type 2 diabetes. These findings, which were published today by the Annals of Internal Medicine, provide additional evidence that salsalate may be an effective drug to treat type 2 diabetes.
The scientists became interested in studying salsalate, an anti-inflammatory drug, after research conducted by Steven Shoelson, M.D., Ph.D., Head of the Section on Pathophysiology and Molecular Pharmacology and Professor of Medicine ...
Hijacking stress response in cancer
2013-07-02
Cancer cells have alteration in metabolic pathways as a result of oncogenes that promote tumor growth. NRF2 (nuclear factor erythroid-derived 2-related factor 2) works as a "master gene" that turns on stress response by increasing numerous antioxidants and pollutant-detoxifying genes to protect the lungs from variety of air pollutants such as diesel exhaust and cigarette smoke. However, researchers at the Johns Hopkins Bloomberg School of Public Health and others have found for the first time that NRF2 signaling also plays a role in the growth of tumor cells by altering ...
Dissecting the distinctive walk of disease
2013-07-02
PITTSBURGH -- Older adults diagnosed with brain disorders such as Parkinson's disease often feel a loss of independence because of their lack of mobility and difficulty walking. To better understand and improve these mobility issues—and detect them sooner—a University of Pittsburgh multidisciplinary research team is working toward building a more advanced motion test that addresses a wider range of walking patterns and movements.
In a recent issue of IEEE Transactions on Neural Systems and Rehabilitation Engineering, researchers from Pitt's Swanson School of Engineering, ...
NASA sees tropical storm dalila weaken, new low pressure area form
2013-07-02
NOAA's GOES-15 satellite captured an infrared image of the Eastern Pacific Ocean during the pre-dawn hours on July 2 and noticed Tropical Storm Dalila weakening near the southwestern Mexico coast, while further southwest a new tropical low pressure area called System 97E, had formed.
Dalila's maximum sustained winds appeared to peak on July 1 at 11 p.m. EDT when they hit 70 mph (110 kph). By 5 a.m. EDT on July 2, Dalila's maximum sustained winds dropped to 65 mph (100 kph). Dalila was also moving away from the southwestern coast of Mexico and headed into the open waters ...
Don't judge by the looks: Molecular analysis reveals a new species of white toothed shrew
2013-07-02
The white toothed shrew genus Crocidura is known as the largest mammal genus, with more than 180 species distributed around the world. A recent genetic analysis of the white toothed shrew fauna of Vietnam revealed the misinterpretations of previous morphological studies of the species, including the description of a new species of these very small mammals. The study was published in the open access journal ZooKeys.
Describing new mammal species is an unusual event nowadays when mammal fauna has been by and large already thoroughly studied by zoologists during the previous ...
High nitrogen dioxide levels from Arizona's Yarnell Hill Fire
2013-07-02
This June 29, 2013 image from the OMI, or Ozone Monitoring Instrument aboard NASA's Aura satellite shows nitrogen dioxide (NO2) levels in Arizona pertaining to three large fires. The highest levels of NO2, which is produced by combustion, were from the Yarnell Hill fire (dark red and brown). NO2 concentration is given as the number of molecules in a cubic centimeter. The highest NO2 concentration values (8-9 x 10^15) indicated that this strong fire was burning a large amount of combustible material and thus generating a large amount of NO2 in a small area.
The image was ...
LAST 30 PRESS RELEASES:
Vision sensing for intelligent driving: technical challenges and innovative solutions
To attempt world record, researchers will use their finding that prep phase is most vital to accurate three-point shooting
AI is homogenizing human expression and thought, computer scientists and psychologists say
Severe COVID-19, flu facilitate lung cancer months or years later, new research shows
Housing displacement, employment disruption, and mental health after the 2023 Maui wildfires
GLP-1 receptor agonist use and survival among patients with type 2 diabetes and brain metastases
Solid but fluid: New materials reconfigure their entire crystal structure in response to humidity
New research reveals how development and sex shape the brain
New discovery may improve kidney disease diagnosis in black patients
What changes happen in the aging brain?
Pew awards fellowships to seven scientists advancing marine conservation
Turning cancer’s protein machinery against itself to boost immunity
Current Pharmaceutical Analysis releases Volume 22, Issue 2 with open access research
Researchers capture thermal fluctuations in polymer segments for the first time
16-year study finds major health burden in single‑ventricle heart
Disposable vapes ban could lead young adults to switch to cigarettes, study finds
Adults with concurrent hearing and vision loss report barriers and challenges in navigating complex, everyday environments
Breast cancer stage at diagnosis differs sharply across rural US regions
Concrete sensor manufacturer Wavelogix receives $500,000 grant from National Science Foundation
California communities’ recovery time between wildfire smoke events is shrinking
Augmented reality job coaching boosts performance by 79% for people with disabilities
Medical debt associated with deferring dental, medical, and mental health care
AAI appoints Anand Balasubramani as Chief Scientific Programs Officer
Prior authorization may hinder access to lifesaving heart failure medications
Scholars propose transparency, credit and accountability as key principles in scientific authorship guidelines
Jeonbuk National University researchers develop DDINet for accurate and scalable drug-drug interaction prediction
IEEE researchers achieve 20x signal boost in cerebral blood flow monitoring with next-generation interferometric diffusing wave spectroscopy
IEEE researchers achieve low-power ultrashort mid-IR pulse compression
Deep-sea natural compound targets cancer cells through a dual mechanism
Antibiotics can affect the gut microbiome for several years
[Press-News.org] New hardware design protects data in the cloudA new hardware design makes data encryption more secure by disguising cloud servers' memory-access patterns