Open rachellkm opened 4 years ago
Reviewer: Huachuan Wang Review Type: Critique
Overview
Large amounts of personal information generated from IoT devices need to prevent misuse. This paper proposed LogSafe, which can store this information securely to perform forensic analysis. LogSafe is a scalable and fault-tolerant logger than can run on an untrusted cloud infrastructure and satisfies Confidentiality, Integrity, and Availability (CIA) security properties.
Contribution
This paper presented LogSafe, which uses cloud infrastructure and controls the system’s security. LogSafe can perform online computation on logged data while preserving privacy. It can accommodate a large number of IoT devices, a scalable snapshot algorithm to defend against attacks without compromising the logger’s performance. It performance evaluation of the logger implementation to test its scalability properties
Questions
The author states that the setup time is significantly higher if the Logger needs to be provisioned. Logger provision is a one-time cost. How about the Device Negotiate? Without prevision. Is it also a one time cost? What is the benefit of using provision?
In TLS session resumption part, the author mentioned that the existing device could reuse the previous session to reduce overhead. However, the session cannot be used forever to ensure forward secrecy. The TLS configuration time is once every hour, does that mean within this hour, the forward secrecy cannot be ensured?
Critique
The IoT device might better be set to have the capability to reuse a session up to N times instead of setting the time limit.
Table II provides the average time it takes to perform the logging sub-procedures. It is better for the author to plot a curve to show the linearity.
Reviewer: Niko Reveliotis Review Type: Comprehension
Problem Being Solved
LogSafe attempts to create an environment which would allow for easier cyber-forensic analysis of data attacks on IoT systems using a secure data logger. Many major services (such as AWS) don't disclose the details of their infrastructure for proprietary reasons; this paper discusses how evaluating their security systems is difficult. LogSafe is an additional cloud-based option for IoT developers to use to handle data logging/collection.
Three Questions
1) This paper heavily leverages the use of Intel's Software Guard Extensions as one of their security measures. Unfortunately there we're no critical review slots left, but I'd consider limiting to Intel to be a critique. Also later in the paper they also state Linux not having full support of SGX (making this limitation to SGX worse). Is there an equivalent to SGX for AMD? Recent benchmarks of consumer-grade processors have begun to tip the scale of performance towards AMD, and if users have to choose between speed and security for management of these data logging services I feel the speed will be selected more often than not.
2) This paper refers to the lack of a full-proof solution to a DDOS attack. They say they can alleviate the issue by "requiring attackers to compromise many more machines in order to disrupt the functionality of LogSafe". Is there any sort of model that can determine the amount/percentage of machines needed to be taken offline to disrupt a system of linked nodes sharing computation? For example, you have 10 machines that offload workloads to each other. How many of these machines need to be taken down before performance is significantly reduced? Does this vary by implementation of cloud-computing solutions? Or even by location of the systems to each other?
3) Looking at the average performance time in figure 5, the cloud logger using SGX performs significantly worse than LogSafe. Going back to the lack of compatibility of SGX, are there other secure solutions on the processor level that have been examined? LogSafe seems to try and implement SGX in a more efficient way.
Reviewer: Sam Frey Review Type: Comprehension
Problem: IoT devices generate massive amounts of data about the personal lives of their users, but not all of these devices are designed with security in mind. Because IoT devices are prone to far more cyber-physical attacks than the average personal computer, it must be insured that communication a storage of this data is managed in a safe, secure way. Loggers that satisfy this condition exist for those running their own servers, but not for those using a cloud-based or distributed infrastructure.
Contribution: The authors propose LogSafe as a solution to the problem presented above. LogSafe uses Intel's Software Guard Extensions to ensure that a cloud application storing user data can remain protected even if a hacker has access to a physical device communicating with the server.
Questions:
The paper very briefly mentions that SGX doesn't support I/O operations. If enough nodes received sufficient I/O requests to impact their performance, could this potentially compromise the system as a whole?
Because LogSafe is distributed, could moving LogSafe nodes to the Edge further improve the performance of data logging for cloud based systems?
Niko brought up the project's reliance on Intel's SGX, but the paper also only mentions testing logging performance on one machine (Dell Latitude 5480, a laptop). Could this have impacted the performance results? I am certainly not an expert in the area of distributed systems, but this seems limiting. They mention that 3 LogSafe nodes can handle 5000 devices. What about millions?
Many IoT devices record large amounts of data about people's personal information which when analyzed can provide sensitive information on the individuals, such as their address and times that they are home or away from home. Although that this information might not be explicitly recorded by analyzing logs from their home IoT device, unauthorized people can gain a lot of sensitive information on people
LogSafe is proposing the design and implementation of a distributed and secure cloud based logger using SGX to ensure confidentiality, integrity, and availability. By developing a secure logger for IoT devices, the logs of potentially sensitive information harvested from various IoT devices can remain secure from other devices or users. They are using SGX to enclaves to run code securely on untrusted hardware.
1 - How exactly do the SGX enclaves work? They briefly discussed how they use the EENTER
and EEXIT
commands, but I didn't understand how exactly it protects against untrusted users in possession of the hardware from accessing their memory.
2 - When establishing a connection between the IoT node and the Logger node, if there is already sealed device meta data, it is unsealed and put into system memory. Is this a security threat? Will other processes be able to read this unsealed meta data to gain access to the secure logger with the encryption key?
3 - Would a malicious node be able to disable the system by sending requests just to increase the monotonically increasing sequence node? Or maybe another malicious process on the untrusted hardware?
Reviewer: Cuidi Wei Review Type: Critique
Problem being solved This paper addresses the problem of how to design and implement a distributed cloud-based logger for IoT devices using SGX. The logger must satisfy the CIA properties in the presence of eavesdropping, injection, and replay attacks.
Main contributions This paper proposes a design and implementation of LogSafe, a cloud-based secure, scalable, and fault-tolerant logger that can accommodate a large number of IoT devices and a scalable snapshot algorithm to defend against attacks without compromising the logger’s performance. Moreover, this paper evaluates the performance of the logger implementation to test its scalability properties.
Critiques about the paper
Reviewer: Reese Jones Review Type: Critical Review
Problem Being Solved:
Main Contributions:
Questions:
Critiques:
Reviewer: Alvaro Albero Review Type: Critical
Problem being solved With the increase use and penetration of IoT the amount collected of private data is rapidly increasing. Many of the IoT devices available are generally not secured and the data they are working with is exposed to many different threats.
Main Contributions The paper proposes LogSafe as a solution for this problem. Assuming that making the devices secure enough is not feasible, LogSafe is a logger system that allows to perform forensic operations after and attack has occurred. LogSafe uses SGX trusted software for confidentiality, integrity, and availability. It ensures highly scalability and fault tolerance as It is cloud based, without losing control of the system.
Questions
Critiques
Reviewer: Sean McBride
Review Types: Critique
Security logs traditionally play an important role in understanding what has recently occurred on network systems and performing cyber forensics after the fact to understand the nature of an attack. IOT is a fast growing area, but it has traditionally under-invested in security and now is a large attack target. Additionally, there is little visibility into this area because of poor logging, so there is little understanding of the nature of these attacks and how IOT might act as the soft underbelly of larger attacks.
The authors create LogSafe, a logging system that can run on top of untrusted cloud computing infrastructure, by using SGX. It uses a hashchain and only uses the Intel Monotonic Counter in contexts where the performance penalty isn't too expensive (Tracker versus Logger).
Reviewer: Zach Day Review type: Comprehension
In the IoT sphere, attacks on personal data have become more and more frequent as the number of devices has increased. While actively preventing the exposure and tampering of data remains an active research field, there has been significantly less work done in storing data in logs for posthumous analysis of attacks.
LogSafe proposes a secure, reliable, verifiable system for IoT devices to record connection statistics and other network heuristics. They utilize Intel's SGX, a new set of instructions that enable creating a confidential & trusted environment within the system, protecting applications from tampering even if the attacker has physical access to the machine. LogSafe provides a number of reliability features that ensure logs are up to date and do not get overwritten by backups desyncing from the main log, guarding against replay attacks.
Reviewer: Sam Hanna Review Type: Critical
Problem Being Solved: This paper talked about LogSafe, a secure logging software to log data for audits and forensics in case of vulnerabilities. The number of IoT devices is increasing and they are not being built for security, so they are bound to be exploited. LogSafe is designed with the key CIA (Confidentiality, Integrity, Availability) security triad in mind to find devices that have been exploited and help with forensics.
Important Areas: LogSafe focuses on providing a safe and scalable logger for forensic uses. They do this by utilizing the SGX architecture and the cloud. They focus on security and ensure that there are confidentiality and integrity throughout with encryption and hashing schemes in place. The logger uses nodes to decentralize the system and provide some assurance against availability attacks and provide for multiple nodes at the same time.
Questions:
Critiques:
There are a multitude of IoT devices running on various networks. These devices tend not to be the most secure things. In order to provide better security, it'd be good to have accurate logs so we can analyze attacks after the fact.
They suggest LogSafe
a system for logging. It's cool because it provides the following three properties:
1) Confidentiality: Unauthorized access to the logs is impossible
2) Integrity: The logs cannot be modified or deleted by an unauthorized individual
3) Availability: The logs are always available for introspection by authorized individuals
This is especially impressive, since this is all running on the cloud -- and they assume that that system is not fully trusted either.
1) Does hashchain = blockchain? 2) Can multiple tenants securely share the LogSafe infrastructure? 3) Is there integration of "blockchain" and "SGX" more generally useful?
1) They mention side channel attacks on SGX in brief -- how serious is this in a Spectre world? Feels like this is a flaw in their security model (maybe not at time of writing) 2) This seems like a super complex infrastructure, and a solution in search of a problem. In today's world, can't most applications just send their logs to a trusted third party? (Who then just has a simple authentication system?) 3) Maybe I'm missing something, but couldn't you just put a public key on each device, then just encrypt and send logs to some sort of reliable block storage? (assuming you even need to run your own log infrastructure)
Shared concerns/questions:
Please add your feedback and reviews below.