(Press-News.org) CAMBRIDGE, Mass -- Cloud computing -- outsourcing computational tasks over the Internet -- could give home-computer users unprecedented processing power and let small companies launch sophisticated Web services without building massive server farms.
But it also raises privacy concerns. A bank of cloud servers could be running applications for 1,000 customers at once; unbeknownst to the hosting service, one of those applications might have no purpose other than spying on the other 999.
Encryption could make cloud servers more secure. Only when the data is actually being processed would it be decrypted; the results of any computations would be re-encrypted before they're sent off-chip.
In the last 10 years or so, however, it's become clear that even when a computer is handling encrypted data, its memory-access patterns -- the frequency with which it stores and accesses data at different memory addresses — can betray a shocking amount of private information.
At the International Symposium on Computer Architecture in June, MIT researchers described a new type of secure hardware component, dubbed Ascend, that would disguise a server's memory-access patterns, making it impossible for an attacker to infer anything about the data being stored. Ascend also thwarts another type of attack, known as a timing attack, which attempts to infer information from the amount of time that computations take.
Computational trade-off
Similar designs have been proposed in the past, but they've generally traded too much computational overhead for security. "This is the first time that any hardware design has been proposed -- it hasn't been built yet -- that would give you this level of security while only having about a factor of three or four overhead in performance," says Srini Devadas, the Edwin Sibley Webster Professor of Electrical Engineering and Computer Science, whose group developed the new system. "People would have thought it would be a factor of 100."
The "trivial way" of obscuring memory-access patterns, Devadas explains, would be to request data from every address in the memory -- whether a memory chip or a hard drive -- and throw out everything except the data stored at the one address of interest. But that would be much too time-consuming to be practical.
What Devadas and his collaborators -- graduate students Ling Ren, Xiangyao Yu and Christopher Fletcher, and research scientist Marten van Dijk — do instead is to arrange memory addresses in a data structure known as a "tree." A family tree is a familiar example of a tree, in which each "node" (in this example, a person's name) is attached to only one node above it (the node representing the person's parents) but may connect to several nodes below it (the person's children).
With Ascend, addresses are assigned to nodes randomly. Every node lies along some "path," or route through the tree, that starts at the top and passes from node to node, without backtracking, until arriving at a node with no further connections. When the processor requires data from a particular address, it sends requests to all the addresses in a path that includes the one it's really after.
To prevent an attacker from inferring anything from sequences of memory access, every time Ascend accesses a particular memory address, it randomly swaps that address with one stored somewhere else in the tree. As a consequence, accessing a single address multiple times will very rarely require traversing the same path.
Less computation to disguise an address
By confining its dummy requests to a single path, rather than sending them to every address in memory, Ascend exponentially reduces the amount of computation required to disguise an address. In a separate paper, which is as-yet unpublished but has been posted online, the researchers prove that querying paths provides just as much security as querying every address in memory would.
Ascend also protects against timing attacks. Suppose that the computation being outsourced to the cloud is the mammoth task of comparing a surveillance photo of a criminal suspect to random photos on the Web. The surveillance photo itself would be encrypted, and thus secure from prying eyes. But spyware in the cloud could still deduce what public photos it was being compared to. And the time the comparisons take could indicate something about the source photos: Photos of obviously different people could be easy to rule out, but photos of very similar people might take longer to distinguish.
So Ascend's memory-access scheme has one final wrinkle: It sends requests to memory at regular intervals -- even when the processor is busy and requires no new data. That way, attackers can't tell how long any given computation is taking.
###
Written by Larry Hardesty, MIT News Office
New hardware design protects data in the cloud
A new hardware design makes data encryption more secure by disguising cloud servers' memory-access patterns
2013-07-02
ELSE PRESS RELEASES FROM THIS DATE:
Are thoughts of death conducive to humor?
2013-07-02
Humor is an intrinsic part of human experience. It plays a role in every aspect of human existence, from day-to-day conversation to television shows. Yet little research has been conducted to date on the psychological function of humor. In human psychology, awareness of the impermanence of life is just as prevalent as humor. According to the Terror Management Theory, knowledge of one's own impermanence creates potentially disruptive existential anxiety, which the individual brings under control with two coping mechanisms, or anxiety buffers: rigid adherence to dominant ...
Flexing the Verification Muscle
2013-07-02
The logistics were impressive, the timeframe tight, the conditions tough.
From 26 May to 7 June 2013, nearly 150 experts from 40 countries set up shop on a military training ground near Veszprém, Hungary, for a simulated search for evidence of a nuclear explosion. Fifteen trucks transported 120 tons of state-of-the-art equipment from the CTBTO's Vienna storage facility to the site, where a fully functioning base of operations was established. Welcome to the world of on-site inspections (OSI).
An OSI, a Treaty-specified search of the suspect area to determine if ...
Music to a gambler's ears
2013-07-02
Winning sounds on slot machines make gambling more exciting, according to a new study by Mike Dixon and colleagues from the University of Waterloo in Canada. Moreover, their work shows that sounds also cause players to overestimate the number of times they won while playing on slot machines. The study is published online in Springer's Journal of Gambling Studies.
Sound has always been an integral part of the slot machine playing experience. Since the early 1900s, players have been rewarded with a ringing bell every time they have a winning combination. Today's slot machines ...
Neighborhood residents with lowest incomes most likely to care about their communities
2013-07-02
COLUMBIA, Mo. – Some may assume that low-income residents of run-down, crime-ridden neighborhoods do not care about their communities. However, research from the University of Missouri suggests otherwise.
Mansoo Yu, an assistant professor of social work and public health at MU, studied levels of community care and vigilance among residents living in high-crime, low-income areas. Community care and vigilance refer to individuals' desires to improve their communities, to take pride in their neighborhoods and to monitor and report unwelcome happenings, such as crimes, near ...
Joslin scientists find that salsalate lowers blood glucose in type 2 diabetes
2013-07-02
BOSTON – July 1, 2013 -- Joslin scientists report that salsalate, a drug used to treat arthritis, lowers blood glucose and improves glycemic control in type 2 diabetes. These findings, which were published today by the Annals of Internal Medicine, provide additional evidence that salsalate may be an effective drug to treat type 2 diabetes.
The scientists became interested in studying salsalate, an anti-inflammatory drug, after research conducted by Steven Shoelson, M.D., Ph.D., Head of the Section on Pathophysiology and Molecular Pharmacology and Professor of Medicine ...
Hijacking stress response in cancer
2013-07-02
Cancer cells have alteration in metabolic pathways as a result of oncogenes that promote tumor growth. NRF2 (nuclear factor erythroid-derived 2-related factor 2) works as a "master gene" that turns on stress response by increasing numerous antioxidants and pollutant-detoxifying genes to protect the lungs from variety of air pollutants such as diesel exhaust and cigarette smoke. However, researchers at the Johns Hopkins Bloomberg School of Public Health and others have found for the first time that NRF2 signaling also plays a role in the growth of tumor cells by altering ...
Dissecting the distinctive walk of disease
2013-07-02
PITTSBURGH -- Older adults diagnosed with brain disorders such as Parkinson's disease often feel a loss of independence because of their lack of mobility and difficulty walking. To better understand and improve these mobility issues—and detect them sooner—a University of Pittsburgh multidisciplinary research team is working toward building a more advanced motion test that addresses a wider range of walking patterns and movements.
In a recent issue of IEEE Transactions on Neural Systems and Rehabilitation Engineering, researchers from Pitt's Swanson School of Engineering, ...
NASA sees tropical storm dalila weaken, new low pressure area form
2013-07-02
NOAA's GOES-15 satellite captured an infrared image of the Eastern Pacific Ocean during the pre-dawn hours on July 2 and noticed Tropical Storm Dalila weakening near the southwestern Mexico coast, while further southwest a new tropical low pressure area called System 97E, had formed.
Dalila's maximum sustained winds appeared to peak on July 1 at 11 p.m. EDT when they hit 70 mph (110 kph). By 5 a.m. EDT on July 2, Dalila's maximum sustained winds dropped to 65 mph (100 kph). Dalila was also moving away from the southwestern coast of Mexico and headed into the open waters ...
Don't judge by the looks: Molecular analysis reveals a new species of white toothed shrew
2013-07-02
The white toothed shrew genus Crocidura is known as the largest mammal genus, with more than 180 species distributed around the world. A recent genetic analysis of the white toothed shrew fauna of Vietnam revealed the misinterpretations of previous morphological studies of the species, including the description of a new species of these very small mammals. The study was published in the open access journal ZooKeys.
Describing new mammal species is an unusual event nowadays when mammal fauna has been by and large already thoroughly studied by zoologists during the previous ...
High nitrogen dioxide levels from Arizona's Yarnell Hill Fire
2013-07-02
This June 29, 2013 image from the OMI, or Ozone Monitoring Instrument aboard NASA's Aura satellite shows nitrogen dioxide (NO2) levels in Arizona pertaining to three large fires. The highest levels of NO2, which is produced by combustion, were from the Yarnell Hill fire (dark red and brown). NO2 concentration is given as the number of molecules in a cubic centimeter. The highest NO2 concentration values (8-9 x 10^15) indicated that this strong fire was burning a large amount of combustible material and thus generating a large amount of NO2 in a small area.
The image was ...
LAST 30 PRESS RELEASES:
Spinal cord stimulation restores neural function, targets key feature of progressive neurodegenerative disease
Shut the nano gate! Electrical control of nanopore diameter
Cutting emissions in buildings and transport: Key strategies for 2050
How parents can protect children from mature and adult content
By studying neutron ‘starquakes’, scientists hope to transform their understanding of nuclear matter
Mouth bacteria may hold insight into your future brain function
Is cellular concrete a viable low-carbon alternative to traditional concrete for earthquake-resistant structures?
How does light affect citrus fruit coloration and the timing of peel and flesh ripening?
Male flies sharpened their eyesight to call the females' bluff
School bans alone not enough to tackle negative impacts of phone and social media use
Explaining science in court with comics
‘Living’ electrodes breathe new life into traditional silicon electronics
One in four chance per year that rocket junk will enter busy airspace
Later-onset menopause linked to healthier blood vessels, lower heart disease risk
New study reveals how RNA travels between cells to control genes across generations
Women health sector leaders good for a nation’s wealth, health, innovation, ethics
‘Good’ cholesterol may be linked to heightened glaucoma risk among over 55s
GLP-1 drug shows little benefit for people with Parkinson’s disease
Generally, things really do seem better in morning, large study suggests
Juicing may harm your health in just three days, new study finds
Forest landowner motivation to control invasive species depends on land use, study shows
Coal emissions cost India millions in crop damages
$10.8 million award funds USC-led clinical trial to improve hip fracture outcomes
University Hospitals Cleveland Medical Center among most reputable academic medical centers
Emilia Morosan on team awarded Kavli Foundation grant for quantum geometry-enabled superconductivity
Unlock sales growth: Implement “buy now, pay later” to increase customer spending
Research team could redefine biomedical research
Bridging a gap in carbon removal strategies
Outside-in signaling shows a route into cancer cells
NFL wives bring signature safe swim event to New Orleans
[Press-News.org] New hardware design protects data in the cloudA new hardware design makes data encryption more secure by disguising cloud servers' memory-access patterns