A Prospective Analysis of Security Vulnerabilities within Link Traversal-Based Query Processing (Extended Version)

10/10/2022
by   Ruben Taelman, et al.
0

The societal and economical consequences surrounding Big Data-driven platforms have increased the call for decentralized solutions. However, retrieving and querying data in more decentralized environments requires fundamentally different approaches, whose properties are not yet well understood. Link Traversal-based Query Processing (LTQP) is a technique for querying over decentralized data networks, in which a client-side query engine discovers data by traversing links between documents. Since decentralized environments are potentially unsafe due to their non-centrally controlled nature, there is a need for client-side LTQP query engines to be resistant against security threats aimed at the query engine's host machine or the query initiator's personal data. As such, we have performed an analysis of potential security vulnerabilities of LTQP. This article provides an overview of security threats in related domains, which are used as inspiration for the identification of 10 LTQP security threats. Each threat is explained, together with an example, and one or more avenues for mitigations are proposed. We conclude with several concrete recommendations for LTQP query engine developers and data publishers as a first step to mitigate some of these issues. With this work, we start filling the unknowns for enabling querying over decentralized environments. Aside from future work on security, wider research is needed to uncover missing building blocks for enabling true decentralization.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/14/2023

Evaluation of Link Traversal Query Execution over Decentralized Environments with Structural Assumptions

To counter societal and economic problems caused by data silos on the We...
research
11/05/2018

Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference

The exponential increase in dependencies between the cyber and physical ...
research
08/24/2023

Use of LLMs for Illicit Purposes: Threats, Prevention Measures, and Vulnerabilities

Spurred by the recent rapid increase in the development and distribution...
research
06/23/2018

A Recursive PLS (Partial Least Squares) based Approach for Enterprise Threat Management

Most of the existing solutions to enterprise threat management are preve...
research
08/23/2019

Adversary-resilient Inference and Machine Learning: From Distributed to Decentralized

While the last few decades have witnessed a huge body of work devoted to...
research
05/03/2020

Guided Link-Traversal-Based Query Processing

Link-Traversal-Based Query Processing (LTBQP) is a technique for evaluat...
research
01/13/2020

Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer

JavaScript (JS) engine vulnerabilities pose significant security threats...

Please sign up or login with your details

Forgot password? Click here to reset