Providing privacy from the residential cloud
Permanent URL:
http://hdl.handle.net/2047/d20128811
Choffnes, David R. (Committee member)
Mislove, Alan (Committee member)
Gnawali, Omprakash (Committee member)
The increased connectivity has changed user expectations for access to their data. Cloud service providers have seen similar increases in their user bases as clients migrate from laptops and desktop computers to tablets and smartphones. The amounts of data and computation performed in cloud services has always been of interest to eavesdroppers, and their growth can only make it more valuable to them. In such a world, a growing dependency on centralized providers makes them single points of failures for privacy threats.
In this work we show our prototyping work implemented over our own testbed for residential devices that we will also use for implementation and evaluation, and describe the proposed work to solve the research problems emerging in this context. We illustrate the vulnerability of what is considered the most secure implementation of WiFi, and devise a novel attack using a multi-layered targeted approach that makes the attack hard to detect yet having long range and effectively invisible to the victim.
We present the OpenInfrastructure system, a home-broadband research platform built on off-the-shelf components and open source software deployed over 30 Access Points through Boston, Houston and San Francisco urban areas. The data obtained over the course of the project since February 2011 confirms the ongoing trends in home broadband Internet access, and highlights the feasibility of providing network access over home installations. Finally we show how to improve privacy in network access is illustrated using Private Information Retrieval techniques over installations of tens of millions of users. We implement and evaluate the performance of the PIR as an EAP protocol extension, making it readily usable by providers and clients.
broadband
privacy
residential
security
Wi-Fi
Computer Sciences
Computer networks -- Security measures
Web services -- Security measures
Cloud computing -- Security measures
Mobile computing -- Security measures
Wireless LANs -- Security measures
Broadband communication systems -- Security measures
Privacy, Right of
Copyright restrictions may apply.