Skip to main content
Erschienen in:
Buchtitelbild

2016 | OriginalPaper | Buchkapitel

1. Introduction

verfasst von : Wen Ming Liu, Lingyu Wang

Erschienen in: Preserving Privacy Against Side-Channel Leaks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The privacy preserving issue has attracted significant attentions in various domains, including census data publishing, data mining, location-based services, mobile and wireless networks, social networks, Web applications, smart grids, and so on. A rich literature exists on this topic, with various privacy properties, utility measures, and privacy-preserving solutions developed. However, one of the most challenging threats to privacy, side-channel leaks, has received limited attention. In a side-channel leak, adversaries attempt to steal sensitive information not only from obvious sources, such as published data or the content of network packets, but also through other, less obvious (side) channels, such as their knowledge about anonymization algorithms or the packet sizes (to be discussed in more details in the coming chapters). Side channel leaks can usually further complicate privacy preservation tasks to a significant extent, as we will demonstrate in this book. Various side-channel attacks have been studied in different domains, such as:
  • data publishing (e.g., adversarial knowledge about a generalization algorithm may allow adversaries to potentially infer more sensitive information from the disclosed data);
  • Web-based Application (e.g., exact user inputs can potentially be inferred from the packet sizes even if the traffic between client and server sides is encrypted);
  • smart metering (e.g., the fine-grained meter readings may be used to track the appliance’s usage patterns and consequently sensitive information about the household, such as daily activities or individuals’ habits);
  • cloud computing (e.g., the sharing of physical infrastructure among tenants allows adversaries to extract sensitive information about other tenants’ co-resident VMs);
  • Android smartphone (e.g., per data-usage statistics and speakers’ status may allow an unauthorized application to obtain the smartphone user’s identity, geo-location, or driving routes);
  • VoIP telephony (e.g., users’ conversations can be partially reconstructed from encrypted VoIP packets due to the use of VBR codecs for compression and length-preserving stream ciphers for encryption in VoIP protocols);
  • cryptography (e.g., information about the secret key may be retrieved from the physical characteristics of the cryptographic modules during algorithm execution, such as timing, power consumption, and so on).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gergely Ács and Claude Castelluccia. Dream: Differentially private smart metering. CoRR, abs/1201.2531, 2012. Gergely Ács and Claude Castelluccia. Dream: Differentially private smart metering. CoRR, abs/1201.2531, 2012.
2.
Zurück zum Zitat W. M. Liu and L. Wang. Privacy streamliner: a two-stage approach to improving algorithm efficiency. In CODASPY, pages 193–204, 2012. W. M. Liu and L. Wang. Privacy streamliner: a two-stage approach to improving algorithm efficiency. In CODASPY, pages 193–204, 2012.
3.
Zurück zum Zitat W. M. Liu, L. Wang, P. Cheng, and M. Debbabi. Privacy-preserving traffic padding in web-based applications. In WPES ’11, pages 131–136, 2011. W. M. Liu, L. Wang, P. Cheng, and M. Debbabi. Privacy-preserving traffic padding in web-based applications. In WPES ’11, pages 131–136, 2011.
4.
Zurück zum Zitat W. M. Liu, L. Wang, P. Cheng, K. Ren, S. Zhu, and M. Debbabi. Pptp: Privacy-preserving traffic padding in web-based applications. IEEE Transactions on Dependable and Secure Computing (TDSC), 11(6):538–552, 2014.CrossRef W. M. Liu, L. Wang, P. Cheng, K. Ren, S. Zhu, and M. Debbabi. Pptp: Privacy-preserving traffic padding in web-based applications. IEEE Transactions on Dependable and Secure Computing (TDSC), 11(6):538–552, 2014.CrossRef
5.
Zurück zum Zitat W. M. Liu, L. Wang, K. Ren, P. Cheng, and M. Debbabi. k-indistinguishable traffic padding in web applications. In PETS’12, pages 79–99, 2012. W. M. Liu, L. Wang, K. Ren, P. Cheng, and M. Debbabi. k-indistinguishable traffic padding in web applications. In PETS’12, pages 79–99, 2012.
6.
Zurück zum Zitat W. M. Liu, L. Wang, K. Ren, and M. Debbabi. Background knowledge-resistant traffic padding for preserving user privacy in web-based applications. In Proceedings of The 5th IEEE International Conference and on Cloud Computing Technology and Science (IEEE CloudCom2013), pages 679–686, 2013. W. M. Liu, L. Wang, K. Ren, and M. Debbabi. Background knowledge-resistant traffic padding for preserving user privacy in web-based applications. In Proceedings of The 5th IEEE International Conference and on Cloud Computing Technology and Science (IEEE CloudCom2013), pages 679–686, 2013.
7.
Zurück zum Zitat W. M. Liu, L. Wang, L. Zhang, and S. Zhu. k-jump: a strategy to design publicly-known algorithms for privacy preserving micro-data disclosure. Journal of Computer Security, 23(2):131–165, 2015. W. M. Liu, L. Wang, L. Zhang, and S. Zhu. k-jump: a strategy to design publicly-known algorithms for privacy preserving micro-data disclosure. Journal of Computer Security, 23(2):131–165, 2015.
8.
Zurück zum Zitat Wen Ming Liu and Lingyu Wang. Privacy streamliner: a two-stage approach to improving algorithm efficiency. In Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASPY ’12, pages 193–204, New York, NY, USA, 2012. ACM. Wen Ming Liu and Lingyu Wang. Privacy streamliner: a two-stage approach to improving algorithm efficiency. In Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASPY ’12, pages 193–204, New York, NY, USA, 2012. ACM.
9.
Zurück zum Zitat Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, and Xuemin Shen. Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. Parallel and Distributed Systems, IEEE Transactions on, 23(9):1621–1631, 2012.CrossRef Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, and Xuemin Shen. Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. Parallel and Distributed Systems, IEEE Transactions on, 23(9):1621–1631, 2012.CrossRef
10.
Zurück zum Zitat X. Luo, P. Zhou, E. W. W. Chan, W. Lee, R. K. C. Chang, and R. Perdisci. Httpos: Sealing information leaks with browser-side obfuscation of encrypted flows. In NDSS ’11. X. Luo, P. Zhou, E. W. W. Chan, W. Lee, R. K. C. Chang, and R. Perdisci. Httpos: Sealing information leaks with browser-side obfuscation of encrypted flows. In NDSS ’11.
11.
Zurück zum Zitat Q. Sun, D. R. Simon, Y. M. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu. Statistical identification of encrypted web browsing traffic. In IEEE Symposium on Security and Privacy ’02, pages 19–, 2002. Q. Sun, D. R. Simon, Y. M. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu. Statistical identification of encrypted web browsing traffic. In IEEE Symposium on Security and Privacy ’02, pages 19–, 2002.
12.
Zurück zum Zitat C. V. Wright, S. E. Coull, and F. Monrose. Traffic morphing: An efficient defense against statistical traffic analysis. In NDSS ’09. C. V. Wright, S. E. Coull, and F. Monrose. Traffic morphing: An efficient defense against statistical traffic analysis. In NDSS ’09.
13.
Zurück zum Zitat K. Zhang, Z. Li, R. Wang, X. Wang, and S. Chen. Sidebuster: automated detection and quantification of side-channel leaks in web application development. In CCS ’10, pages 595–606, 2010. K. Zhang, Z. Li, R. Wang, X. Wang, and S. Chen. Sidebuster: automated detection and quantification of side-channel leaks in web application development. In CCS ’10, pages 595–606, 2010.
Metadaten
Titel
Introduction
verfasst von
Wen Ming Liu
Lingyu Wang
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-42644-0_1