Memory Access Pattern Protection for Resource-Constrained Devices
نویسندگان
چکیده
We propose a practice-oriented scheme for protecting RAM access pattern. We first consider an instance which relies on the use of a secure (trusted) hardware buffer; it achieves both security and performance levels acceptable in practice by adapting ideas from oblivious RAM mechanisms, yet without the expensive (re-)shuffling of buffers. Another instance requires no special hardware, but as a result leads to a higher, yet practical overhead. One of the main features of the proposal is to maintain the history of memory access to help hiding the access pattern. We claim that under reasonable assumptions, the first scheme with trusted memory is secure with overhead of only 6×, as is the second scheme with overhead of (2m+2`h+2)× where m and `h are respectively the size of the buffer and history. We note that although the proposal is particularly focused on the software execution protection environment, its security may well be appropriate for most uses in the remote storage environment, to prevent access pattern leakage of cloud storage with much lower performance overhead than existing solutions.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملAn Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechan...
متن کاملTLS with PSK for Constrained Devices
In the recent years the advances in the area of Wireless Sensor Networks (WSNs) have led to extensive research of the question of securing WSNs, a challenging problem, mostly due to the constraints that have to be dealt with. Limited power supply and limited computational resources, very small RAM and Flash memory on the devices, network interfaces with low data rates and limited bandwidth, pos...
متن کاملt-kernel: Provide Reliable OS Support for Wireless Sensor Networks
The development of a reliable large-scale wireless sensor networks (WSNs) is very difficult because of their stringent resource constraints, harsh energy budget, and demanding application requirements. We identify that three OS features – OS protection, virtual memory, and preemptive scheduling – will significantly improve the reliability of WSN systems and facilitate developing complex WSN sof...
متن کاملTamper Event Detection on Distributed Devices in Critical Infrastructure
Utilities are currently installing a number of resource-constrained embedded devices at the remote endpoints of their SCADA (Supervisory Control and Data Acquisition) networks as part of their smart grid rollout. These devices present a security risk for utilities: They are deployed in many different places and environments; they have very little physical security; and they have direct access b...
متن کامل