Abstract
Recently proposed trusted processor model is a promising model for building secure applications. While effective designs have been proposed for protecting data confidentiality and data integrity in such environments, an important security criterion -- user privacy is usually neglected in current designs. Due to the increasing concern of privacy protection in the Internet era, such deficiency can hinder the adoption of the new model.In this paper, we identify the threat model to user privacy and propose a new scheme for user privacy protection. In addition to providing the same ability in protecting data confidentiality and data integrity, the new scheme effectively protects user privacy and only introduces very low overhead.
- Crypto++ 5.1. http://sourceforge.net/projects/cryptopp/ and http://www.eskimo.com/~weidai/cryptlib.html.Google Scholar
- P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman, "A Trusted Open Platform," IEEE Computer, pages 55--62, July 2003. Google ScholarDigital Library
- B. Gassend, E. Suh, D. Clarke, M. van Dijk, and S. Devadas, "Caches and Merkle Trees for Efficient Memory Authentication," Ninth International Symposium on High Performance Computer Architecture (HPCA), Feb. 2003. Google ScholarDigital Library
- Intel. http://support.intel.com/support/processors/pentiumiii/sb/CS-007579.htm.Google Scholar
- D. Lie, C. Thekkath, P. Lincoln, M. Mitchell, D. Boneh, J. Mitchell, M. Horowitz, "Architectural Support for Copy and Tamper Resistant Software," ACM Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Nov. 2000. Google ScholarDigital Library
- D. Lie, C. Thekkath, and M. Horowitz, "Implementing an untrusted operating system on trusted hardware", Proc. of the 19th ACM Symposium on Operating Systems Principles, pages 178--192, 2003. Google ScholarDigital Library
- E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, "AEGIS: Architectures for Tamper-Evident and Tamper-Resistant Processing," ACM 17th International Conference on Supercomputing (ICS), June 2003. Google ScholarDigital Library
- E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, "Efficient Memory Integrity Verification and Encryption for Secure Processors," IEEE/ACM 36th International Symposium on Microarchitecture (MICRO), Dec. 2003. Google ScholarDigital Library
- J. Yang, Y. Zhang, and L. Gao, "Fast Secure Processor for Inhibiting Software Piracy and Tampering," IEEE/ACM 36th International Symposium on Microarchitecture (MICRO), Dec. 2003. Google ScholarDigital Library
- X. Zhuang, T. Zhang, and S. Pande, "HIDE: an infrastructure for efficiently protecting information leakage on the address bus," ACM 11th International Conference on Architecture Support for Programming Language and Operating Systems, 2004. Google ScholarDigital Library
Index Terms
- Architectural support for protecting user privacy on trusted processors
Recommendations
Protecting privacy in data release
Foundations of security analysis and design VIThe evolution of the Information and Communication Technology has radically changed our electronic lives, making information the key driver for today's society. Every action we perform requires the collection, elaboration, and dissemination of personal ...
Protecting User Privacy Better with Query l-Diversity
This paper examines major privacy concerns in location-based services. Most user privacy techniques are based on cloaking, which achieves location k-anonymity. The key is to reduce location resolution by ensuring that each cloaking area reported to a ...
Protecting IMSI and User Privacy in 5G Networks
MobiMedia '16: Proceedings of the 9th EAI International Conference on Mobile Multimedia CommunicationsIn recent years, many cases of compromising users' privacy in telecom networks have been reported. Stories of "fake" base stations capable of tracking users and collecting their personal data without users' knowledge have emerged. The current way of ...
Comments