Mitigating Network Side Channel Leakage for Stream Processing Systems in Trusted Execution Environments

Muhammad Bilal, Hassan Alsibyani, Marco Canini

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

A crucial concern regarding cloud computing is the confidentiality of sensitive data being processed in the cloud. Trusted Execution Environments (TEEs), such as Intel Software Guard extensions (SGX), allow applications to run securely on an untrusted platform. However, using TEEs alone for stream processing is not enough to ensure privacy as network communication patterns may leak information about the data. This paper introduces two techniques -- anycast and multicast --for mitigating leakage at inter-stage communications in streaming applications according to a user-selected mitigation level. These techniques aim to achieve network data obliviousness, i.e., communication patterns should not depend on the data. We implement these techniques in an SGX-based stream processing system. We evaluate the latency and throughput overheads, and the data obliviousness using three benchmark applications. The results show that anycast scales better with input load and mitigation level, and provides better data obliviousness than multicast.
Original languageEnglish (US)
Title of host publicationProceedings of the 12th ACM International Conference on Distributed and Event-based Systems - DEBS '18
PublisherAssociation for Computing Machinery (ACM)
Pages16-27
Number of pages12
ISBN (Print)9781450357821
DOIs
StatePublished - Jun 20 2018

Bibliographical note

KAUST Repository Item: Exported on 2021-02-19
Acknowledgements: We thank the anonymous reviewers for their useful feedback. We would like to thank Taesoo Kim for helpful comments and discussions. Muhammad Bilal was supported by a fellowship from the Erasmus Mundus Joint Doctorate in Distributed Computing (EMJD-DC) program funded by the European Commission (EACEA) (FPA 2012-0030).

Fingerprint

Dive into the research topics of 'Mitigating Network Side Channel Leakage for Stream Processing Systems in Trusted Execution Environments'. Together they form a unique fingerprint.

Cite this