Since 1986 - Covering the Fastest Computers in the World and the People Who Run Them

Language Flags
July 7, 2013

MIT Works toward Cloud Data Protection

Nicole Hemsoth

Ensuring the security of one’s information in the cloud has proven to be problematic, especially considering the recent revelations regarding the National Security Administration and their accessing of data.

Researchers at MIT sought to combat that security risk in proposing the building of Ascend, a hardware component that can be coupled with cloud servers and prevents two types of security risks on public information.

“This is the first time that any hardware design has been proposed — it hasn’t been built yet — that would give you this level of security while only having about a factor of three or four overhead in performance,” said Srini Devadas, MIT’s Edwin Sibley Webster Professor of Electrical Engineering and Computer Science, whose group developed the new system. “People would have thought it would be a factor of 100.”

While a performance penalty of a factor of three or four is certainly preferable to that of a hundred, those keen on running experiments in the cloud on generalized data may not be too willing to take on such a decrease. However, there are applications whose data is sensitive, particularly in the genomic and other related healthcare fields, where Ascend would be advantageous.

According to MIT, Ascend works by randomly assigning access nodes. Every time Ascend traverses a path down the access tree to retrieve information from a node, it swaps the information with another random node somewhere in the file system. In this way, it becomes difficult for potential attackers to inferring specific data locations based on sequences of memory access.

Further, Ascend would reportedly protect against timed attacks by sending requests at regular intervals to the memory, meaning a spyware application would be unable to determine the runtime of any other particular application.

The importance of keeping one’s data secure is always there, even if it is variable from application to application. The performance penalty of Ascend, once it is built, may be worth ensuring data is kept out of curious hands.

Tags: ,

SC14 Virtual Booth Tours

AMD SC14 video AMD Virtual Booth Tour @ SC14
Click to Play Video
Cray SC14 video Cray Virtual Booth Tour @ SC14
Click to Play Video
Datasite SC14 video DataSite and RedLine @ SC14
Click to Play Video
HP SC14 video HP Virtual Booth Tour @ SC14
Click to Play Video
IBM DCS3860 and Elastic Storage @ SC14 video IBM DCS3860 and Elastic Storage @ SC14
Click to Play Video
IBM Flash Storage
@ SC14 video IBM Flash Storage @ SC14  
Click to Play Video
IBM Platform @ SC14 video IBM Platform @ SC14
Click to Play Video
IBM Power Big Data SC14 video IBM Power Big Data @ SC14
Click to Play Video
Intel SC14 video Intel Virtual Booth Tour @ SC14
Click to Play Video
Lenovo SC14 video Lenovo Virtual Booth Tour @ SC14
Click to Play Video
Mellanox SC14 video Mellanox Virtual Booth Tour @ SC14
Click to Play Video
Panasas SC14 video Panasas Virtual Booth Tour @ SC14
Click to Play Video
Quanta SC14 video Quanta Virtual Booth Tour @ SC14
Click to Play Video
Seagate SC14 video Seagate Virtual Booth Tour @ SC14
Click to Play Video
Supermicro SC14 video Supermicro Virtual Booth Tour @ SC14
Click to Play Video