The Case for the Anonymization of Offloaded Computation

05/12/2023
by   Md Washik Al Azad, et al.
0

Computation offloading (often to external computing resources over a network) has become a necessity for modern applications. At the same time, the proliferation of machine learning techniques has empowered malicious actors to use such techniques in order to breach the privacy of the execution process for offloaded computations. This can enable malicious actors to identify offloaded computations and infer their nature based on computation characteristics that they may have access to even if they do not have direct access to the computation code. In this paper, we first demonstrate that even non-sophisticated machine learning algorithms can accurately identify offloaded computations. We then explore the design space of anonymizing offloaded computations through the realization of a framework, called Camouflage. Camouflage features practical mechanisms to conceal characteristics related to the execution of computations, which can be used by malicious actors to identify computations and orchestrate further attacks based on identified computations. Our evaluation demonstrated that Camouflage can impede the ability of malicious actors to identify executed computations by up to 60 while incurring modest overheads for the anonymization of computations.

READ FULL TEXT

page 1

page 2

page 7

page 9

page 10

research
09/30/2018

Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation

The proliferation of web applications has essentially transformed modern...
research
02/23/2019

Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data

Malicious web domains represent a big threat to web users' privacy and s...
research
10/02/2019

Machine-Learning Techniques for Detecting Attacks in SDN

With the advent of Software Defined Networks (SDNs), there has been a ra...
research
06/25/2021

Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties

The rise in the adoption of blockchain technology has led to increased i...
research
02/21/2020

Practical Verification of MapReduce Computation Integrity via Partial Re-execution

Big data processing is often outsourced to powerful, but untrusted cloud...
research
08/24/2018

Making Bubbling Practical

Bubbling is a run-time graph transformation studied for the execution of...
research
06/04/2018

Learning a Code: Machine Learning for Approximate Non-Linear Coded Computation

Machine learning algorithms are typically run on large scale, distribute...

Please sign up or login with your details

Forgot password? Click here to reset