A case for validating remote application integrity for data processing systems

Jonathan M. Chu, Mirko Montanari, R H Campbell

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

There has been a great increase in recent years as to the amount of data from the grid that has been going to online systems. As more smart meters get installed into the AMI(advanced metering infrastructure), there is a need to mitigate the potential security threats in the collection system. There are a multitude of attack vectors that an adversary may take to compromise the confidentiality of user data and it may take much time and effort for developers to securely cover all such attack vectors. In this paper, we analyze the architecture of AMI systems and how data moves from one end to the other. In particular, we discuss the need for more research in safe program validation that protects against information leaks. Security problems can arise when programs do not perform as intended and may reveal confidential information or take unexpected actions. We discuss a theoretical network architecture that could take advantage of such secure program validation. The model minimizes attack vectors by containing data in one secure location that we call a DBPC(database processing center) instead of transporting data to multiple locations through a traditional DBMS(database management system). When outside parties want access to the data, they can send verified secure applications to the DBPC to run their applications remotely without direct access to the data. We describe the design of the AMI simulator and DBPC prototype module that we implemented.

Original languageEnglish (US)
Title of host publicationProceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012
Pages168-173
Number of pages6
DOIs
StatePublished - Nov 12 2012
Event2012 5th International Symposium on Resilient Control Systems, ISRCS 2012 - Salt Lake City, UT, United States
Duration: Aug 14 2012Aug 16 2012

Publication series

NameProceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012

Other

Other2012 5th International Symposium on Resilient Control Systems, ISRCS 2012
CountryUnited States
CitySalt Lake City, UT
Period8/14/128/16/12

Fingerprint

Advanced metering infrastructures
Processing
Smart meters
Online systems
Network architecture
Simulators

Keywords

  • Advanced Metering Infrastructure
  • Database Management Systems
  • Database Processing Center
  • confidentiality
  • security
  • smart meters

ASJC Scopus subject areas

  • Control and Systems Engineering

Cite this

Chu, J. M., Montanari, M., & Campbell, R. H. (2012). A case for validating remote application integrity for data processing systems. In Proceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012 (pp. 168-173). [6309313] (Proceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012). https://doi.org/10.1109/ISRCS.2012.6309313

A case for validating remote application integrity for data processing systems. / Chu, Jonathan M.; Montanari, Mirko; Campbell, R H.

Proceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012. 2012. p. 168-173 6309313 (Proceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chu, JM, Montanari, M & Campbell, RH 2012, A case for validating remote application integrity for data processing systems. in Proceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012., 6309313, Proceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012, pp. 168-173, 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012, Salt Lake City, UT, United States, 8/14/12. https://doi.org/10.1109/ISRCS.2012.6309313
Chu JM, Montanari M, Campbell RH. A case for validating remote application integrity for data processing systems. In Proceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012. 2012. p. 168-173. 6309313. (Proceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012). https://doi.org/10.1109/ISRCS.2012.6309313
Chu, Jonathan M. ; Montanari, Mirko ; Campbell, R H. / A case for validating remote application integrity for data processing systems. Proceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012. 2012. pp. 168-173 (Proceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012).
@inproceedings{56013236a0204b79adaac6b06e7f6201,
title = "A case for validating remote application integrity for data processing systems",
abstract = "There has been a great increase in recent years as to the amount of data from the grid that has been going to online systems. As more smart meters get installed into the AMI(advanced metering infrastructure), there is a need to mitigate the potential security threats in the collection system. There are a multitude of attack vectors that an adversary may take to compromise the confidentiality of user data and it may take much time and effort for developers to securely cover all such attack vectors. In this paper, we analyze the architecture of AMI systems and how data moves from one end to the other. In particular, we discuss the need for more research in safe program validation that protects against information leaks. Security problems can arise when programs do not perform as intended and may reveal confidential information or take unexpected actions. We discuss a theoretical network architecture that could take advantage of such secure program validation. The model minimizes attack vectors by containing data in one secure location that we call a DBPC(database processing center) instead of transporting data to multiple locations through a traditional DBMS(database management system). When outside parties want access to the data, they can send verified secure applications to the DBPC to run their applications remotely without direct access to the data. We describe the design of the AMI simulator and DBPC prototype module that we implemented.",
keywords = "Advanced Metering Infrastructure, Database Management Systems, Database Processing Center, confidentiality, security, smart meters",
author = "Chu, {Jonathan M.} and Mirko Montanari and Campbell, {R H}",
year = "2012",
month = "11",
day = "12",
doi = "10.1109/ISRCS.2012.6309313",
language = "English (US)",
isbn = "9781467301633",
series = "Proceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012",
pages = "168--173",
booktitle = "Proceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012",

}

TY - GEN

T1 - A case for validating remote application integrity for data processing systems

AU - Chu, Jonathan M.

AU - Montanari, Mirko

AU - Campbell, R H

PY - 2012/11/12

Y1 - 2012/11/12

N2 - There has been a great increase in recent years as to the amount of data from the grid that has been going to online systems. As more smart meters get installed into the AMI(advanced metering infrastructure), there is a need to mitigate the potential security threats in the collection system. There are a multitude of attack vectors that an adversary may take to compromise the confidentiality of user data and it may take much time and effort for developers to securely cover all such attack vectors. In this paper, we analyze the architecture of AMI systems and how data moves from one end to the other. In particular, we discuss the need for more research in safe program validation that protects against information leaks. Security problems can arise when programs do not perform as intended and may reveal confidential information or take unexpected actions. We discuss a theoretical network architecture that could take advantage of such secure program validation. The model minimizes attack vectors by containing data in one secure location that we call a DBPC(database processing center) instead of transporting data to multiple locations through a traditional DBMS(database management system). When outside parties want access to the data, they can send verified secure applications to the DBPC to run their applications remotely without direct access to the data. We describe the design of the AMI simulator and DBPC prototype module that we implemented.

AB - There has been a great increase in recent years as to the amount of data from the grid that has been going to online systems. As more smart meters get installed into the AMI(advanced metering infrastructure), there is a need to mitigate the potential security threats in the collection system. There are a multitude of attack vectors that an adversary may take to compromise the confidentiality of user data and it may take much time and effort for developers to securely cover all such attack vectors. In this paper, we analyze the architecture of AMI systems and how data moves from one end to the other. In particular, we discuss the need for more research in safe program validation that protects against information leaks. Security problems can arise when programs do not perform as intended and may reveal confidential information or take unexpected actions. We discuss a theoretical network architecture that could take advantage of such secure program validation. The model minimizes attack vectors by containing data in one secure location that we call a DBPC(database processing center) instead of transporting data to multiple locations through a traditional DBMS(database management system). When outside parties want access to the data, they can send verified secure applications to the DBPC to run their applications remotely without direct access to the data. We describe the design of the AMI simulator and DBPC prototype module that we implemented.

KW - Advanced Metering Infrastructure

KW - Database Management Systems

KW - Database Processing Center

KW - confidentiality

KW - security

KW - smart meters

UR - http://www.scopus.com/inward/record.url?scp=84868530666&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84868530666&partnerID=8YFLogxK

U2 - 10.1109/ISRCS.2012.6309313

DO - 10.1109/ISRCS.2012.6309313

M3 - Conference contribution

AN - SCOPUS:84868530666

SN - 9781467301633

T3 - Proceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012

SP - 168

EP - 173

BT - Proceedings - 2012 5th International Symposium on Resilient Control Systems, ISRCS 2012

ER -