DocumentCode :
2013209
Title :
Mitigating timing based information leakage in shared schedulers
Author :
Kadloor, Sachin ; Kiyavash, Negar ; Venkitasubramaniam, Parv
Author_Institution :
Coordinated Sci. Lab., ECE Dept., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA
fYear :
2012
fDate :
25-30 March 2012
Firstpage :
1044
Lastpage :
1052
Abstract :
In this work, we study information leakage in timing side channels that arise in the context of shared event schedulers. Consider two processes, one of them an innocuous process (referred to as Alice) and the other a malicious one (referred to as Bob), using a common scheduler to process their jobs. Based on when his jobs get processed, Bob wishes to learn about the pattern (size and timing) of jobs of Alice. Depending on the context, knowledge of this pattern could have serious implications on Alice´s privacy and security. For instance, shared routers can reveal traffic patterns, shared memory access can reveal cloud usage patterns, and suchlike. We present a formal framework to study the information leakage in shared resource schedulers using the pattern estimation error as a performance metric. In this framework, a uniform upper bound is derived to benchmark different scheduling policies. The first-come-first-serve scheduling policy is analyzed, and shown to leak significant information when the scheduler is loaded heavily. To mitigate the timing information leakage, we propose an “Accumulate-and-Serve” policy which trades in privacy for a higher delay. The policy is analyzed under the proposed framework and is shown to leak minimum information to the attacker, and is shown to have comparatively lower delay than a fixed scheduler that preemptively assigns service times irrespective of traffic patterns.
Keywords :
data privacy; scheduling; telecommunication channels; telecommunication network routing; telecommunication security; telecommunication traffic; Alice; Bob; accumulate-and-serve policy; cloud usage patterns; first-come-first-serve scheduling policy; information leakage; innocuous process; malicious process; pattern estimation error; shared event schedulers; shared memory access; shared routers; timing side channels; traffic patterns; Delay; Estimation error; Privacy; Scheduling; Time division multiple access;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM, 2012 Proceedings IEEE
Conference_Location :
Orlando, FL
ISSN :
0743-166X
Print_ISBN :
978-1-4673-0773-4
Type :
conf
DOI :
10.1109/INFCOM.2012.6195460
Filename :
6195460
Link To Document :
بازگشت