Malware checking is changing from being a local service to a cloudassisted one where users' devices query a cloud server, which hosts a dictionary of malware signatures, to check if particular applications are potentially malware. Whilst such an architecture gains all the benefits of cloud-based services, it opens up a major privacy concern since the cloud service can infer personal traits of the users based on the lists of applications queried by their devices. Private membership test (PMT) schemes can remove this privacy concern. However, known PMT schemes do not scale well to a large number of simultaneous users and high query arrival rates. We propose a simple PMT approach using a carousel: circling the entire dictionary through trusted hardware on the cloud server. Users communicate with the trusted hardware via secure channels. We show how the carousel approach, using different data structures to represent the dictionary, can be realized on two different commercial hardware security architectures (ARM TrustZone and Intel SGX).We highlight subtle aspects of securely implementing seemingly simple PMT schemes on these architectures. Through extensive experimental analysis, we show that for the malware checking scenario our carousel approach surprisingly outperforms Path ORAM on the same hardware by supporting a much higher query arrival rate while guaranteeing acceptable response latency for individual queries.
|Title of host publication||ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security|
|Publisher||Association for Computing Machinery, Inc|
|Number of pages||14|
|State||Published - 2 Apr 2017|
|Event||2017 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2017 - Abu Dhabi, United Arab Emirates|
Duration: 2 Apr 2017 → 6 Apr 2017
|Name||ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security|
|Conference||2017 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2017|
|Country/Territory||United Arab Emirates|
|Period||2/04/17 → 6/04/17|
Bibliographical noteFunding Information:
This work was supported by the Cloud Security Services (CloSer) project (3881/31/2016), funded by TEKES - the Finnish Funding Agency for Innovation, and by a grant from the Israel Science Foundation, and the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister's Office.
© 2017 ACM.
- ARM trust zone
- Intel SGX
- Malware checking