Online trading protocols enable participants to trade, barter, or sell goods and services over a private network or the global Net. Due to diversity of network and computational resources at their disposal, participants communicate and carry out their trading with different latencies. This scenario may give rise to latency attacks, where malicious parties (a.k.a. fast traders) exploit lower latency to attack trading protocols' fairness and increase their income. With the advent of the cloud, the problem of identifying and preventing latency attacks is exacerbated by the fact that cloud providers and privileged users could collude to make latency attacks simpler and more effective. In this paper, we give an overview of network and storage latency attacks in multi-party trading protocols, focusing on cloud peculiarities and providing some empirical recommendations for protocol design.

Network and Storage Latency Attacks to Online Trading Protocols in the Cloud / C.A. Ardagna, E. Damiani - In: On the Move to Meaningful Internet Systems: OTM 2014 Workshops[s.l] : Springer, 2014. - ISBN 978-3-662-45549-4. - pp. 192-201 (( Intervento presentato al 4. convegno 4th International Symposium on Secure Cloud-based Infrastructures - Cloud and Trusted Computing (C&TC 2014) nel 2014 [10.1007/978-3-662-45550-0_20].

Network and Storage Latency Attacks to Online Trading Protocols in the Cloud

C.A. Ardagna;E. Damiani
2014

Abstract

Online trading protocols enable participants to trade, barter, or sell goods and services over a private network or the global Net. Due to diversity of network and computational resources at their disposal, participants communicate and carry out their trading with different latencies. This scenario may give rise to latency attacks, where malicious parties (a.k.a. fast traders) exploit lower latency to attack trading protocols' fairness and increase their income. With the advent of the cloud, the problem of identifying and preventing latency attacks is exacerbated by the fact that cloud providers and privileged users could collude to make latency attacks simpler and more effective. In this paper, we give an overview of network and storage latency attacks in multi-party trading protocols, focusing on cloud peculiarities and providing some empirical recommendations for protocol design.
Cloud; Multi-party online trading protocol; Network latency attack; Storage latency attack
Settore INF/01 - Informatica
2014
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
AA.DOA2014.pdf

accesso riservato

Tipologia: Post-print, accepted manuscript ecc. (versione accettata dall'editore)
Dimensione 223.1 kB
Formato Adobe PDF
223.1 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/244907
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 5
  • ???jsp.display-item.citation.isi??? 4
social impact