TY - GEN
T1 - Network and storage latency attacks to online trading protocols in the cloud
AU - Ardagna, Claudio A.
AU - Damiani, Ernesto
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2014.
PY - 2014
Y1 - 2014
N2 - Online trading protocols enable participants to trade, barter, or sell goods and services over a private network or the global Net. Due to diversity of network and computational resources at their disposal, participants communicate and carry out their trading with different latencies. This scenario may give rise to latency attacks, where malicious parties (a.k.a. fast traders) exploit lower latency to attack trading protocols’ fairness and increase their income. With the advent of the cloud, the problem of identifying and preventing latency attacks is exacerbated by the fact that cloud providers and privileged users could collude to make latency attacks simpler and more effective. In this paper, we give an overview of network and storage latency attacks in multi-party trading protocols, focusing on cloud peculiarities and providing some empirical recommendations for protocol design.
AB - Online trading protocols enable participants to trade, barter, or sell goods and services over a private network or the global Net. Due to diversity of network and computational resources at their disposal, participants communicate and carry out their trading with different latencies. This scenario may give rise to latency attacks, where malicious parties (a.k.a. fast traders) exploit lower latency to attack trading protocols’ fairness and increase their income. With the advent of the cloud, the problem of identifying and preventing latency attacks is exacerbated by the fact that cloud providers and privileged users could collude to make latency attacks simpler and more effective. In this paper, we give an overview of network and storage latency attacks in multi-party trading protocols, focusing on cloud peculiarities and providing some empirical recommendations for protocol design.
KW - Cloud
KW - Multi-party online trading protocol
KW - Network latency attack
KW - Storage latency attack
UR - http://www.scopus.com/inward/record.url?scp=84910113621&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-45550-0_20
DO - 10.1007/978-3-662-45550-0_20
M3 - Conference contribution
AN - SCOPUS:84910113621
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 192
EP - 201
BT - On the Move to Meaningful Internet Systems
A2 - Meersman, Robert
A2 - Panetto, Hervé
A2 - Mishra, Alok
A2 - Valencia-García, Rafael
A2 - Lucas Soares, António
A2 - Ciuciu, Ioana
A2 - Ferri, Fernando
A2 - Weichhart, Georg
A2 - Moser, Thomas
A2 - Bezzi, Michele
A2 - Chan, Henry
PB - Springer Verlag
T2 - International Workshops: OTM Academy,OTM Industry Case Studies Program, C and TC, EI2N, INBAST, ISDE, META4eS, MSC, and OnToContent 2014
Y2 - 27 October 2014 through 31 October 2014
ER -