Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ABSTRACT
The Encrypted traffic of many popular Web Applications may disclose highly sensitive data. Unique
patterns may be identified in the encrypted traffic and an Eavesdropper can identify the actual application
data. These are side-channel attacks. The existing solutions like random padding and packet rounding
incur high cost. Hence we present a formal PPTP algorithm to efficiently reduce overhead cost incurred
and also prevent side-channel attacks. This algorithm maps the similarity between the PPDP and PPTP
problems and provides solution for the former.
Keywords: PPDP- Privacy Preserving Data Publishing, PPTP – Privacy Preserving Traffic Padding,
Side-Channel Attacks, Web Application.
I. INTRODUCTION
The obvious solution for preventing side channel
The Web-based applications are more popular than attack is to pad packets such that the each packet
the desktop applications. These Web applications size will no longer map to a unique input. The
pose security and privacy threats as the untrusted straightforward solutions include random padding
internet have essentially become an integral and rounding packet size. These methods though
component of such applications for facilitating effective incur a high prohibitive overhead.
interaction between the users and the application.
Recent studies have shown that the encrypted traffic The conflicting goals for preventing the side
of these Web applications may have highly channel leaks are: First, the difference in packet
sensitive data and may lead to security and privacy size needs to be reduced sufficiently so that the
breaches i.e. by searching specifically for unique packets may not be distinguished. Second, the
patterns exhibited in the packets’ sizes and/or overhead for achieving such privacy protection
timing, an eavesdropper can identify the original should be minimized. Thus the objective now is to
sensitive data. These side-channel attacks (shown in find a solution that can provide sufficient privacy as
Figure 1.0) are pervasive and fundamental to many well as reduce padding cost.
of the Web applications.
In this paper, we find the similarity between two
problems PPDP and PPTP. PPDP is well studied
and there are several solutions to solve this problem.
Hence PPDP is mapped with PPTP problem and the
same solution is applied to the former.
IJSRSET151179 | Received: 24 Feb 2015 | Accepted: 3 March 2015 | March-April 2015 [(1)2: 16-19] 16
A. PPTP Problem C. PPDP Solution
The Web application contains of sensitive data that The k-anonymity model was devised to address this
gets encrypted into packets. Observations can be challenge. The table is divided into anonymized groups
made on these packets and then the original data and then the quasi-identifier is generalized. Thus any
can be identified. The main issue to be solved deals quasi identifier wouldn’t uniquely identify an entity
instead it would point to a set of entities and so the
with two perspectives: the interaction between the
linking attack fails. Hence the above table is generalized
users and servers and the observation made by
and data is made anonymous.
eavesdroppers. A single user keystroke may affect
the other in terms of packet size. Thus multiple Table 2: Sensitive and non-Sensitive (not fully disclosed) detail of
observations by eavesdropper can be combined and Patient
privacy and security of data can be violated.
B. PPDP Example
IV. CONCLUSION