Online trading protocols enable participants to trade, barter, or sell goods and services over a private network or the global Net. Due to diversity of network and computational resources at their disposal, participants communicate and carry out their trading with different latencies. This scenario may give rise to latency attacks, where malicious parties (a.k.a. fast traders) exploit lower latency to attack trading protocols' fairness and increase their income. With the advent of the cloud, the problem of identifying and preventing latency attacks is exacerbated by the fact that cloud providers and privileged users could collude to make latency attacks simpler and more effective. In this paper, we give an overview of network and storage latency attacks in multi-party trading protocols, focusing on cloud peculiarities and providing some empirical recommendations for protocol design.
Network and Storage Latency Attacks to Online Trading Protocols in the Cloud / C.A. Ardagna, E. Damiani - In: On the Move to Meaningful Internet Systems: OTM 2014 Workshops[s.l] : Springer, 2014. - ISBN 978-3-662-45549-4. - pp. 192-201 (( Intervento presentato al 4. convegno 4th International Symposium on Secure Cloud-based Infrastructures - Cloud and Trusted Computing (C&TC 2014) nel 2014 [10.1007/978-3-662-45550-0_20].
Network and Storage Latency Attacks to Online Trading Protocols in the Cloud
C.A. Ardagna;E. Damiani
2014
Abstract
Online trading protocols enable participants to trade, barter, or sell goods and services over a private network or the global Net. Due to diversity of network and computational resources at their disposal, participants communicate and carry out their trading with different latencies. This scenario may give rise to latency attacks, where malicious parties (a.k.a. fast traders) exploit lower latency to attack trading protocols' fairness and increase their income. With the advent of the cloud, the problem of identifying and preventing latency attacks is exacerbated by the fact that cloud providers and privileged users could collude to make latency attacks simpler and more effective. In this paper, we give an overview of network and storage latency attacks in multi-party trading protocols, focusing on cloud peculiarities and providing some empirical recommendations for protocol design.File | Dimensione | Formato | |
---|---|---|---|
AA.DOA2014.pdf
accesso riservato
Tipologia:
Post-print, accepted manuscript ecc. (versione accettata dall'editore)
Dimensione
223.1 kB
Formato
Adobe PDF
|
223.1 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.