Skip to main content

Privacy in Data Centers: A Survey of Attacks and Countermeasures

  • 3740 Accesses

Abstract

A Data Center collects, stores, and transmits huge dimensions of sensitive information of many types. Data Center security has become one of the highest network priorities as data thieves and crime cells look to infiltrate perimeter defenses through increasingly complex attack vectors with alarming success and devastating effects.

Keywords

  • Bipartite Graph
  • Traffic Analysis
  • Anonymous Communication
  • Privacy Enhance Technology
  • Anonymity System

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-1-4939-2092-1_34
  • Chapter length: 15 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   229.00
Price excludes VAT (USA)
  • ISBN: 978-1-4939-2092-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Hardcover Book
USD   299.99
Price excludes VAT (USA)
Fig. 1

References

  1. Krishnamurthy, B.: Privacy and Online Social Networks: Can Colorless Green Ideas Sleep Furiously? IEEE Security Privacy 11(3) (May 2013) 14–20

    CrossRef  MathSciNet  Google Scholar 

  2. Dey, R., Jelveh, Z., Ross, K.: Facebook Users Have Become Much More Private: A Large-Scale Study. In: IEEE International Conference on Pervasive Computing and Communications Workshops. (19–23 March 2012) 346–352

    Google Scholar 

  3. Christofides, E., Desmarais, A.M.S.: Information Disclosure and Control on Facebook: Are They Two Sides of the Same Coin or Two Different Processes? CyberPsychology & Behavior 12(3) (June 2013) 341–345

    CrossRef  Google Scholar 

  4. Gross, R., Acquisti, A.: Information Revelation and Privacy in Online Social Networks. In: 2005 ACM Workshop on Privacy in the Electronic Society, ACM (2005) 71–80

    Google Scholar 

  5. Goldberg, I., Wagner, D., Brewer, E.: Privacy-enhancing technologies for the Internet. In: IEEE Compcon'97. (February 23–26 1997) 103–109

    Google Scholar 

  6. Goldberg, I.: Privacy-Enhancing Technologies for the Internet, II: Five Years Later. In: Second International Workshop on Privacy Enhancing Technologies. (April 14–15 2003) 1–12

    Google Scholar 

  7. Goldberg, I.: Privacy Enhancing Technologies for the Internet III: Ten Years Later. In: Digital Privacy: Theory, Technologies and Practices, Auerbach Publications (December 2007) 3–18

    Google Scholar 

  8. Westin, A.F.: Privacy and Freedom. The Bodley Head Ltd (1997)

    Google Scholar 

  9. R. Gellman, P.D.: Online Privacy: A Reference Handbook. ABC-CLIO (2011)

    Google Scholar 

  10. Berendt, B., Günther, O., Spiekermann, S.: Privacy in e-Commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM 48(4) (April 2005) 101–106

    CrossRef  Google Scholar 

  11. Narayanan, A., Shmatikov, V.: De-Anonymizing Social Networks. In: IEEE Symposium on Security and Privacy, Washington, DC, USA, IEEE Computer Society (2009) 173–187

    Google Scholar 

  12. Commission, E.: Privacy Enhancing Technologies (PETs): The Existing Legal Framework (May 2007)

    Google Scholar 

  13. Fritsch, L.: State of the Art of Privacy-Enhancing Technology (PET). Technical report, Norsk Regnesentral, Norwegian Computing Center (2007)

    Google Scholar 

  14. Group, M.: Privacy Enhancing Technologies". Technical report, Ministry of Science, Technology and Innovation (March 2005)

    Google Scholar 

  15. Adams, C.: A Classification for Privacy Techniques. University of Ottawa Law & Technology Journal 3(1) (July 2006) 35–52

    Google Scholar 

  16. Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management: A Consolidated Proposal for Terminology. http://dud.inf.tu-dresden.de/Anon_Terminology.shtml (February 2008) v0.31.

  17. Solove, D.J.: A Classification for Privacy Techniques. University of Pennsylvania Law Review 154(3) (January 2006) 477–560

    CrossRef  Google Scholar 

  18. Diaz, C., Gürses, S.: Understanding the Landscape of Privacy Technologies. In: The 13th International Conference on Information Security (Information Security Summit). (2012) 1–6

    Google Scholar 

  19. Chaum, D.L.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of ACM 24(2) (February 1981) 84–90

    CrossRef  Google Scholar 

  20. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1) (November 1998) 66–92

    CrossRef  Google Scholar 

  21. Levine, B.N., Shields, C.: Hordes: A Multicast Based Protocol for Anonymity. Journal of Computer Security 10(3) (September 2002) 213–240

    Google Scholar 

  22. Gulcu, C., Tsudik, G.: Mixing Email with Babel. In: Symposium on Network and Distributed System Security, Washington, DC, USA, IEEE Computer Society (1996) 1–15

    Google Scholar 

  23. Berthold, O., Federrath, H., Kopsell, S.: Web MIXes: A System for Anonymous and Unobservable Internet Access. In: International Workshop On Designing Privacy Enhancing Technologies: Design Issues In Anonymity And Unobservability, Springer-Verlag New York, Inc. (2001) 115–129

    Google Scholar 

  24. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: First International Workshop on Information Hiding, London, UK, UK, Springer-Verlag (May 30 - June 1 1996) 137–150

    Google Scholar 

  25. Back, A., Goldberg, I., Shostack, A.: Freedom Systems 2.1 Security Issues and Analysis (May 2001)

    Google Scholar 

  26. Back, A., Goldberg, I., Shostack, A.: I2P (2003)

    Google Scholar 

  27. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-generation Onion Router. In: 13th Conference on USENIX Security Symposium - Volume 13, Berkeley, CA, USA, USENIX Association (2004) 21–21

    Google Scholar 

  28. Loesing, K.: Privacy-Enhancing Technologies for Private Services. PhD thesis, University of Bamberg (2009)

    Google Scholar 

  29. Edman, M., Yener, B.: On Anonymity in an Electronic Society: A Survey of Anonymous Communication Systems. ACM Computing Surveys 42(1) (December 2009) 1–35

    CrossRef  Google Scholar 

  30. Benson, T., Anand, A., Akella, A., Zhang, M.: Understanding Data Center Traffic Characteristics. ACM SIGCOMM Computer Communication Review 40(1) (January 2010) 92–99

    CrossRef  Google Scholar 

  31. Pang, R., Allman, M., Bennett, M., Lee, J., Paxson, V., Tierney, B.: A First Look at Modern Enterprise Traffic. In: 5th ACM SIGCOMM Conference on Internet Measurement, Berkeley, CA, USA, USENIX Association (October 19-21 2005) 2–2

    Google Scholar 

  32. Guha, S., Chandrashekar, J., Taft, N., Papagiannaki, K.: How Healthy Are Today’s Enterprise Networks? In: 8th ACM SIGCOMM Conference on Internet Measurement, New York, NY, USA, ACM (October 20-22 2008) 145–150

    Google Scholar 

  33. Kandula, S., Sengupta, S., Greenberg, A., Patel, P., Chaiken, R.: The Nature of Data Center Traffic: Measurements & Analysis. In: 9th ACM SIGCOMM Conference on Internet Measurement Conference, New York, NY, USA, ACM (November 4-6 2009) 202–208

    Google Scholar 

  34. Greenberg, A., Maltz, D.A.: What Goes Into a Data Center? (2009)

    Google Scholar 

  35. Balakrishnan, M.: Reliable Communication for Datacenters. PhD thesis, Cornell University (September 2008)

    Google Scholar 

  36. Raymond, J.F.: Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems. In: International Workshop On Design Issues In Anonymity And Unobservability, Springer-Verlag New York, Inc. (July 25-26 2000) 10–29

    Google Scholar 

  37. Kedogan, D., Agrawal, D., Penz, S.: Limits of Anonymity in Open Environments. In: 5th International Workshop on Information Hiding, London, UK, UK, Springer-Verlag (October 7–9 2002) 53–69

    Google Scholar 

  38. Agrawal, D., Kesdogan, D.: Measuring Anonymity: The Disclosure Attack. IEEE Security Privacy 1(6) (2003) 27–34

    CrossRef  Google Scholar 

  39. Danezis, G.: Statistical Disclosure Attacks: Traffic Confirmation in Open Environments. In: IFIP Advances in Information and Communication Technology, Kluwer (2003) 421–426

    Google Scholar 

  40. Danezis, G., Serjantov, A.: Statistical Disclosure or Intersection Attacks on Anonymity Systems. In: 6th Information Hiding Workshop. (May 23–25 2004) 293–308

    Google Scholar 

  41. Mathewson, N., Dingledine, R.: Practical Traffic Analysis: Extending and Resisting Statistical Disclosure. In: 4th International Conference on Privacy Enhancing Technologies. (May 23-25 2004) 17–34

    Google Scholar 

  42. Danezis, G., Diaz, C., Troncoso, C.: Two-sided Statistical Disclosure Attack. In: 7th International Conference on Privacy Enhancing Technologies, Berlin, Heidelberg, Springer-Verlag (June 20–22 2007) 30–44

    Google Scholar 

  43. Brigham, R., Harary, F., Violin, E., Yellen, J.: Perfect-Matching Preclusion. Congressus Numerantium 174 (2005) 185–192

    MATH  MathSciNet  Google Scholar 

  44. Park, J.H., Son, S.H.: Conditional Matching Preclusion for Hypercube-like Interconnection Networks. Theoretical Computer Science 410(27–29) (June 2009) 2632–2640

    MATH  MathSciNet  Google Scholar 

  45. Danezis, G., Troncoso, C.: Vida: How to use Bayesian Inference to De-anonymize Persistent Communications. In: 9th International Symposium of Privacy Enhancing Technologies, Springer Berlin Heidelberg (August 5-7 2009) 56–72

    Google Scholar 

  46. Al-Ameen, M., Gatz, C., Wright, M.: SDA-2H: Understanding the Value of Background Cover Against Statistical Disclosure. In: 14th International Conference on Computer and Information Technology. (December 22-24 2011) 196–201

    Google Scholar 

Download references

Acknowledgment

Part of the computations of this work were performed in EOLO, the HPC of Climate Change of the International Campus of Excellence of Moncloa, funded by MECD and MICINN.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luis Javier García Villalba .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this chapter

Cite this chapter

García Villalba, L., Silva Trujillo, A., Portela, J. (2015). Privacy in Data Centers: A Survey of Attacks and Countermeasures. In: Khan, S., Zomaya, A. (eds) Handbook on Data Centers. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-2092-1_34

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-2092-1_34

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-2091-4

  • Online ISBN: 978-1-4939-2092-1

  • eBook Packages: Computer ScienceComputer Science (R0)