首页> 外文学位 >A Holistic Approach to Lightweight Data Security in Embedded Cloud Computing.
【24h】

A Holistic Approach to Lightweight Data Security in Embedded Cloud Computing.

机译:嵌入式云计算中轻量级数据安全的整体方法。

获取原文
获取原文并翻译 | 示例

摘要

Cloud connectivity and increased support for applications have resulted in significant amount of data that needs to be handled by embedded devices. The growth of embedded cloud as a successful service model largely depends on effectively securing such data. Data security in the domain of cloud enabled embedded devices brings about its own theoretical and practical challenges. In contrast with traditional computing devices, user/application data in embedded cloud may reside at different locations (such as embedded device, network or cloud). For example, when a user accesses a cloud based application on a smartphone, cached application data may reside on the internal storage whereas the remote storage is accessed via network to retrieve the actual user data. The location-augmented variation in the data lifecycle poses unique challenges for data security due to the asymmetric nature of resource and usage environment across different medium. However, existing approaches for data security do not consider such factors crucial for the integration of cloud enabled embedded devices.;Identification and mitigation of vulnerabilities are two complimentary but essential components of security research. Forensic techniques enable researchers in identifying such vulnerabilities while security techniques protect users from those. In this research, we first apply novel forensic techniques to identify data security vulnerabilities in cloud enabled embedded devices such as smartphones and netbooks. Next, we consider different stages of the data lifecycle leading to a holistic approach in developing data security techniques for embedded cloud computing. Specifically, we explore security solutions at three crucial parts of data lifecycle: data at the local storage (embedded device), data in communication (wireless medium) and data at the remote storage (storage cloud). Our goal is to design resource efficient techniques with flexible parameters to customize the schemes. Towards that end, we propose a novel reconfigurable encryption architecture to secure data at the local storage, a physical layer technique to secure data in wireless communication, and an information theoretic scheme to secure data at the remote storage.;The reconfigurable encryption architecture supports the implementation of any user-defined symmetric encryption algorithm based on substitution-permutation network. The user can configure the contents of s-boxes, permutations at each round, and number of rounds in the encryption process. Due to the reconfigurable nature of the proposed architecture, it is not possible for an attacker to directly launch the cryptanalysis or power analysis attack before committing significant resources to retrieve the encryption structure. Besides, resource consumption of symmetric encryption algorithms is directly related to the number of encryption rounds as well as implementation area. Therefore, by appropriately choosing encryption parameters, configurable and resource efficient data security can be achieved in the local storage.;The physical layer security technique is built upon constellation diversity i.e. the variation in the choices of bit sequences to symbol mapping during the modulation in wireless networks. Legitimate users can secure the data on the wireless medium by using a custom constellation not known to the attacker. Although a constellation with more bits per symbol increases the search space for attacker, it consumes more resources. Accordingly, by choosing a suitable constellation, users can secure the communication balancing the usage context and resource budget.;The storage enforcing security measure verifies the integrity of the data stored at the remote storage. The core of the approach is a polynomial hash based on error correcting codes. The user generates and stores the hash of the data before storing the data remotely. Upon retrieval, the user can recalculate the hash and verify the integrity. The design allows the user to choose a suitable finite field size for the error correcting code based on the usage and security requirements.;The proposed techniques instantiate a holistic approach for data security in cloud enabled embedded devices. Also, the design flexibility and resource efficiency of the proposed techniques show promise in usage context aware and power aware application scenarios as well.
机译:云连接和对应用程序的增强支持导致大量数据需要由嵌入式设备处理。嵌入式云作为一种成功的服务模型的增长很大程度上取决于有效保护此类数据。支持云的嵌入式设备领域的数据安全带来了其自身的理论和实践挑战。与传统的计算设备相反,嵌入式云中的用户/应用程序数据可能驻留在不同的位置(例如嵌入式设备,网络或云)。例如,当用户访问智能手机上的基于云的应用程序时,缓存的应用程序数据可能驻留在内部存储中,而远程存储则通过网络访问以检索实际的用户数据。由于资源和使用环境在不同介质之间的不对称特性,数据生命周期中位置增加的变化对数据安全提出了独特的挑战。但是,现有的数据安全方法并不认为这些因素对于启用云的嵌入式设备的集成至关重要。漏洞的识别和缓解是安全研究的两个互补但必不可少的组成部分。法医技术使研究人员能够识别此类漏洞,而安全技术可保护用户免受此类漏洞的侵害。在这项研究中,我们首先应用新颖的取证技术来识别支持云的嵌入式设备(如智能手机和上网本)中的数据安全漏洞。接下来,我们考虑数据生命周期的不同阶段,从而导致采用整体方法来开发嵌入式云计算的数据安全技术。具体来说,我们在数据生命周期的三个关键部分探索安全解决方案:本地存储(嵌入式设备)中的数据,通信中的数据(无线介质)和远程存储中的数据(存储云)。我们的目标是设计具有灵活参数的资源有效技术,以自定义方案。为此,我们提出了一种新颖的可重配置加密体系结构以保护本地存储中的数据,提出了一种物理层技术来保护无线通信中的数据,以及一种信息理论方案来保护远程存储中的数据。置换置换网络的任何用户定义对称加密算法的实现。用户可以配置s盒的内容,每轮的排列以及加密过程中的轮数。由于所提出体系结构的可重新配置的性质,攻击者不可能在投入大量资源以检索加密结构之前直接发起密码分析或功率分析攻击。此外,对称加密算法的资源消耗与加密轮次以及实现面积直接相关。因此,通过适当选择加密参数,可以在本地存储中实现可配置且资源高效的数据安全性。物理层安全技术建立在星座分集的基础上,即在无线调制过程中比特序列到符号映射选择的变化网络。合法用户可以使用攻击者未知的自定义星座来保护无线介质上的数据。尽管每个符号具有更多位的星座会增加攻击者的搜索空间,但它会消耗更多资源。因此,通过选择合适的星座,用户可以确保平衡使用上下文和资源预算的通信。存储实施安全措施验证了存储在远程存储处的数据的完整性。该方法的核心是基于纠错码的多项式哈希。用户在远程存储数据之前会生成并存储数据的哈希。检索后,用户可以重新计算哈希并验证完整性。该设计允许用户根据使用情况和安全性要求为纠错码选择合适的有限字段大小。拟议的技术实例化了启用云的嵌入式设备中数据安全的整体方法。而且,所提出技术的设计灵活性和资源效率在使用上下文感知和功率感知应用场景中也显示出希望。

著录项

  • 作者

    Husain, Mohammad Iftekhar.;

  • 作者单位

    State University of New York at Buffalo.;

  • 授予单位 State University of New York at Buffalo.;
  • 学科 Engineering Computer.;Computer Science.
  • 学位 Ph.D.
  • 年度 2012
  • 页码 164 p.
  • 总页数 164
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号