Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2016, Vol. 56 Issue (1) : 51-57,65     DOI: 10.16511/j.cnki.qhdxxb.2016.23.007
INFORMATION SECURITY |
Method for sensitive data protection of web servers in the cloud
HAN Xinhui, WANG Dongqi, CHEN Zhaofeng, ZHANG Huilin
Institute of Computer Science & Technology, Peking University, Beijing 100871, China
Download: PDF(1762 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  A sensitive data protection method (SDPM) for web servers in the cloud was proposed to prevent sensitive data leakage from the compromised web servers, which utilizes the features of virtualization and combines the concepts of data encryption and execution isolation. By predetermining and fixing a small amount of application codes that will compute over sensitive data, and by encrypting sensitive data before these data are available to the rest of untrusted codes, the SDPM provides strong defense against all malicious codes that an attacker may run in the server software stack. The SDPM was implemented based on the kernel of Xen Hypervisor and PHP. The results show that the amount of sensitive codes is small with a percentage of less than 2% and the overhead of protecting sensitive data is moderate with a percentage of less than 40% according to six popular web applications in this paper.
Keywords data protection      server      trusted computing     
ZTFLH:  TP309  
Issue Date: 15 January 2016
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
HAN Xinhui
WANG Dongqi
CHEN Zhaofeng
ZHANG Huilin
Cite this article:   
HAN Xinhui,WANG Dongqi,CHEN Zhaofeng, et al. Method for sensitive data protection of web servers in the cloud[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(1): 51-57,65.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2016.23.007     OR     http://jst.tsinghuajournals.com/EN/Y2016/V56/I1/51
  
  
  
  
  
  
[1] The OWASP Foundation. Top 10 2013-A6-Sensitive Data Exposure[EB/OL]. (2013-02).https://www.owasp.org/index.php/Top_10_2013-A6-Sensitive_Data_Exposure.
[2] Verizon. 2013 Data Breach Investigations Report[EB/OL]. (2013). http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf.
[3] Popa R A, Redfield C, Zeldovich N, et al. Cryptdb: Protecting confidentiality with encrypted query processing [C]//Proceedings of the 23rd ACM Symposium on Operating Systems Principles. New York, NY: ACM Press, 2011: 85-100.
[4] Puttaswamy K P N, Kruegel C, Zhao B Y. Silverline: Toward data confidentiality in storage-intensive cloud applications [C]//Proceedings of the 2nd ACM Symposium on Cloud Computing. New York, NY: ACM Press, 2011: 10.
[5] Parno B, McCune J M, Wendlandt D, et al. CLAMP: Practical prevention of large-scale data leaks [C]//Security and Privacy, 2009 30th IEEE Symposium on. Piscataway, NJ: IEEE Press, 2009: 154-169.
[6] Felt A P, Finifter M, Weinberger J, et al. Diesel: Applying privilege separation to database access [C]//Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. New York: ACM Press, 2011: 416-422.
[7] Lampson B, Abadi M, Burrows M, et al. Authentication in distributed systems: Theory and practice [J]. ACM Transactions on Computer Systems (TOCS), 1992, 10(4): 265-310.
[8] Wikipedia. Trusted computing base [EB/OL]. (2002-02).http://en.wikipedia.org/wiki/Trusted_computing_base.
[9] Howard M. Attack surface: Mitigate security risks by minimizing the code you expose to untrusted users [EB/OL]. (2004-11). http://msdn.microsoft.com/en-us/magazine/cc163882.aspx.
[10] McCune J M, Parno B J, Perrig A, et al. Flicker: An execution infrastructure for TCB minimization [J]. ACM SIGOPS Operating Systems Review, 2008, 42(4): 315-328.
[11] Dworkin M. Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC [R]. Gaithersburg: US Department of Commerce, National Institute of Standards and Technology, 2007.
[12] McGrew D, Viega J. The Galois/counter mode of operation (GCM) [EB/OL]. (2004).http://siswg.net/docs/gcm_ spec.pdf.
[13] Wikipedia. Block cipher mode of operation [EB/OL]. (2014-05). http://en.wikipedia.org/wiki/Block_cipher_mode_ of_operation.
[14] Gueron S, Kounavis M E. Intel? carry-less multiplication instruction and its usage for computing the GCM mode, Intel white paper [R]. 2012.
[15] W3Techs. Usage of server-side programming languages for websites [EB/OL]. (2014-04). http://w3techs.com/technologies/overview/programming_language/all.
[16] Gueron S. AES-GCM for efficient authenticated encryption: Ending the reign of HMAC-SHA-1? [C]//Workshop on Real-World Cryptography. Stanford: Stanford Univ, 2013.
[17] The PHP Group. vld Package Information [EB/OL]. (2003-09).http://pecl.php.net/package/vld.
[18] Crawljax. Crawling Ajax-based Web Applications [EB/OL]. (2007-10). http://crawljax.com.
[19] Computer Science Department at the University of Illinois at Urbana-Champaign. The LLVM Compiler Infrastructure [EB/OL]. (2002-06). http://llvm.org.
[1] MIAO Xupeng, ZHANG Minxu, SHAO Yingxia, CUI Bin. PS-Hybrid: Hybrid communication framework for large recommendation model training[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(9): 1417-1425.
[2] WANG Xiaoguang, WU Jun, LIN Qi. Kinematics analysis and control of under-constrained cable-driven parallel suspension systems[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(3): 193-201.
[3] KONG Xiao, LIU Naijia, ZHANG Menghao, XU Mingwei. Analysis of online college teaching data before and after the COVID-19 epidemic[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(2): 104-116.
[4] GAO Yang, REN Wang, WU Renpu, WANG Weiping, YI Shengwei, HAN Baijing. Attack detection and security state estimation of cyber-physical systems[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(11): 1234-1239.
[5] LONG Yu, WANG Xin, XU Xian, HONG Xuan. Highly-descriptive chain of trust in trusted computing[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(4): 387-394.
[6] CAO Laicheng, LIU Yufei, DONG Xiaoye, GUO Xian. User privacy-preserving cloud storage scheme on CP-ABE[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(2): 150-156.
[7] XU Limin, ZHANG Tao. Dual channel spacecraft attitude control method based on an external disturbance observer[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(6): 631-636.
[8] LI Fang, YE Peiqing, YAN Leyang, ZHANG Hui. Repetitive sliding mode observer for disturbance estimation of a linear motor system[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(6): 626-632.
[9] JIANG Wenxue, ZHOU Kai. Precise feedback linearization in EMS systems based on a disturbance observer[J]. Journal of Tsinghua University(Science and Technology), 2015, 55(10): 1067-1071.
[10] Kun YU,Congxiao BAO,Xing LI. Internet path performance measurements using web servers[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(4): 474-479.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd