A case for validating remote application integrity for data processing systems

Jonathan M. Chu, Mirko Montanari, R. Campbell
{"title":"A case for validating remote application integrity for data processing systems","authors":"Jonathan M. Chu, Mirko Montanari, R. Campbell","doi":"10.1109/ISRCS.2012.6309313","DOIUrl":null,"url":null,"abstract":"There has been a great increase in recent years as to the amount of data from the grid that has been going to online systems. As more smart meters get installed into the AMI(advanced metering infrastructure), there is a need to mitigate the potential security threats in the collection system. There are a multitude of attack vectors that an adversary may take to compromise the confidentiality of user data and it may take much time and effort for developers to securely cover all such attack vectors. In this paper, we analyze the architecture of AMI systems and how data moves from one end to the other. In particular, we discuss the need for more research in safe program validation that protects against information leaks. Security problems can arise when programs do not perform as intended and may reveal confidential information or take unexpected actions. We discuss a theoretical network architecture that could take advantage of such secure program validation. The model minimizes attack vectors by containing data in one secure location that we call a DBPC(database processing center) instead of transporting data to multiple locations through a traditional DBMS(database management system). When outside parties want access to the data, they can send verified secure applications to the DBPC to run their applications remotely without direct access to the data. We describe the design of the AMI simulator and DBPC prototype module that we implemented.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 5th International Symposium on Resilient Control Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISRCS.2012.6309313","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

There has been a great increase in recent years as to the amount of data from the grid that has been going to online systems. As more smart meters get installed into the AMI(advanced metering infrastructure), there is a need to mitigate the potential security threats in the collection system. There are a multitude of attack vectors that an adversary may take to compromise the confidentiality of user data and it may take much time and effort for developers to securely cover all such attack vectors. In this paper, we analyze the architecture of AMI systems and how data moves from one end to the other. In particular, we discuss the need for more research in safe program validation that protects against information leaks. Security problems can arise when programs do not perform as intended and may reveal confidential information or take unexpected actions. We discuss a theoretical network architecture that could take advantage of such secure program validation. The model minimizes attack vectors by containing data in one secure location that we call a DBPC(database processing center) instead of transporting data to multiple locations through a traditional DBMS(database management system). When outside parties want access to the data, they can send verified secure applications to the DBPC to run their applications remotely without direct access to the data. We describe the design of the AMI simulator and DBPC prototype module that we implemented.
验证数据处理系统的远程应用程序完整性的案例
近年来,从电网传输到在线系统的数据量有了很大的增长。随着越来越多的智能电表被安装到AMI(高级计量基础设施)中,需要减轻收集系统中潜在的安全威胁。攻击者可能会采取多种攻击向量来破坏用户数据的机密性,开发人员可能需要花费大量时间和精力来安全地覆盖所有这些攻击向量。在本文中,我们分析了AMI系统的体系结构以及数据如何从一端移动到另一端。特别地,我们讨论了在防止信息泄露的安全程序验证方面进行更多研究的必要性。当程序未按预期执行,可能泄露机密信息或采取意外操作时,就会出现安全问题。我们讨论了一个可以利用这种安全程序验证的理论网络架构。该模型通过将数据包含在一个我们称为DBPC(数据库处理中心)的安全位置,而不是通过传统的DBMS(数据库管理系统)将数据传输到多个位置,从而最大限度地减少了攻击向量。当外部各方希望访问数据时,他们可以将经过验证的安全应用程序发送到DBPC,以便在不直接访问数据的情况下远程运行他们的应用程序。介绍了实现的AMI仿真器和DBPC原型模块的设计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信