<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A probabilistic small model theorem to assess confidentiality of dispersed cloud storage (extended abstract)</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Marco</forename><surname>Baldi</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Università Politecnica delle Marche</orgName>
								<address>
									<settlement>Ancona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ezio</forename><surname>Bartocci</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">TU Wien</orgName>
								<address>
									<settlement>Vienna</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Franco</forename><surname>Chiaraluce</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Università Politecnica delle Marche</orgName>
								<address>
									<settlement>Ancona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alessandro</forename><surname>Cucchiarelli</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Università Politecnica delle Marche</orgName>
								<address>
									<settlement>Ancona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Linda</forename><surname>Senigagliesi</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Università Politecnica delle Marche</orgName>
								<address>
									<settlement>Ancona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Luca</forename><surname>Spalazzi</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Università Politecnica delle Marche</orgName>
								<address>
									<settlement>Ancona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Francesco</forename><surname>Spegni</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Università Politecnica delle Marche</orgName>
								<address>
									<settlement>Ancona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A probabilistic small model theorem to assess confidentiality of dispersed cloud storage (extended abstract)</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">1792705E8042D6991BDDD089BBAC2E10</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T07:53+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Recent developments in cloud architectures and security concerns have originated new models of online storage clouds based on data dispersal algorithms. According to these algorithms the data is divided into several slices that are distributed among remote and independent storage nodes. Ensuring confidentiality in this context is crucial: only legitimate users should access any part of information they distribute among storage nodes. We use parameterized Markov Decision Processes to model such a class of systems and Probabilistic Model Checking to assess the likelihood of breaking the confidentiality. We showed that a Small Model Theorem can be proven for a specific types of models, preserving PCTL formulae. Finally, we report the result of applying our methodology to feasibly assess the security of existing dispersed cloud storage solutions.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>New models of cloud storage protocols are emerging, that are based on data dispersal algorithms, where data is divided into several slices distributed among remote and independent storage node <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b5">6]</ref>. The main advantage of these techniques consists in their reliability since the dispersion is usually accompanied by redundancy. However, in this context, ensuring confidentiality is equally important: only legitimate users should have access to any part of the information that was dispersed among the independent storage nodes.</p><p>We developed an assessment methodology for dispersed storage clouds that can describe real-world implementations and the presence of a passive eavesdropper trying to spill the slices and reconstruct the users secret.</p><p>The proposed methodology relies on parameterized Markov Decision Processes to model such a class of systems and probabilistic model checking as a verification tool. Since many parameters contribute to the description of the system, we addressed it applying common bounded model checking techniques. For certain classes of models we were able to prove a small-model theorem, implying that certain security specifications hold irrespective of the actual number of storage providers.</p><p>In dispersed storage clouds any user has some amount of cloud storage space assigned on independent storage nodes. In order to assure reliability on the one hand and security on the other, several authors have proposed schemata based on fragmentation, erasure coding, and encryption <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>.</p><p>From a purely abstract point of view, all these algorithms can be characterized by a set of parameters. Let x be the original file size (measured in bits) to be dispersed and let l • q be the size of each fragment called slice (when q = 8, l is the size of a slice in bytes). The parameters of interest are n and k, the former being the number of slices after the transformation of the original file, and the latter the minimum number of slices to recover the original file (i.e. n − k is the maximum number of lost (erased) slices that still enables file recover).</p><p>In Fig. <ref type="figure" target="#fig_1">1</ref> we depicted AONT-RS <ref type="bibr" target="#b4">[5]</ref>, a popular schemata consisting in applying the Reed-Solomon erasure code (Encoder ) to the All-or-Nothing-Transform (AONT and Slicer ). The produced fragments are finally dispatched among the providers (Dispatcher ).</p><p>Attacker models. To the aim of assessing the security of dispersed storage clouds, we introduced a probabilistic attacker model. Assuming the user is connected to the Internet from its (wired or wireless) local area network (LAN), a passive eavesdropper on the user LAN has some chances to intercept the exchanged slices. We have considered mainly two types of attackers: in one case the attacker can intercept each exchanged slice independently from the others (slice attacker <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b2">3]</ref>), while in the other he/she can choose to attack the storage providers trying to steal all the slices stored there (provider attacker <ref type="bibr" target="#b2">[3]</ref>).</p><p>In the case of a slice attacker on a wireless LAN, one can use a frequentistic approach and rely on the physical properties of the channel to determine the likelihood of successfully intercepting a slice (as we have shown in <ref type="bibr" target="#b0">[1]</ref>). In the case of a provider attacker, one can use a more subjective approach to determine the likelihood of breaking a storage provider. In both cases such likelihoods are required as input parameters of the system models.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Assessment methodology</head><p>Now we briefly describe how the user, links to storage nodes and attacker are modeled using MDPs.   </p><formula xml:id="formula_0">x + α k • (l • q) n • (l • q) l • n1 • q l • n2 • q l • nm • q</formula><formula xml:id="formula_1">nra = n reads di : nw &lt; n ∧ c = i nw = n ∧ c = 0 [Wi] c = i ∧ c = 0 ∧ nw = nw + 1 nra &gt; 0 ∧ nra = nra − 1 ∧ nr 1 = ctr1 ∧ . . . ∧ nr m = ctrm nra = 0 ∧ nr1 = 0 ∧ . . . ∧ nrm = 0 nr1 = 0 ∧ . . . ∧ nrm = 0 [Ri] nri &gt; 0 ∧ nr i = nri − 1</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Modeling</head><p>In Figs. <ref type="figure" target="#fig_2">2,</ref> 3 and 4 we represent the relevant MDPs for the case of a system with a slice attacker. We use straight variable names for edge pre-conditions, while primed variable names are considered edge post-conditions.</p><p>First, the user loops until all slices are dispatched to the storage providers (i.e. nw = n). Next, he/she loops until n reads attempts have been consumed (i.e. nra = 0). The link to the storage provider i either receives a written slice [W i ] or sends a slice to be read [R i ]. In both cases there is some chance a i that the slice is leaked to the attacker. The latter increments a counter of stolen slices ctr a for each leak event [L i ].</p><p>Security assessment analysis. It is clear that assessing the security of such systems is a parametric problem. Indeed, by allowing an arbitrarily large number of read operations by the user, the attacker has probability 1 of intercepting more than k slices (every read the attacker has one more chance of intercepting the missing slices, until it intercepts all of them). Similarly, assuming the secret is split into an arbitrarily large number of slices gives the attacker a negligible probability of succeeding in his/her attack. Between these ends lie all the parameters values of the actual implementations of AONT-based algorithms. Very often such values are not bound to a clearly stated security metric. We employ bounded and probabilistic model checking to compute the likelihood of a successful attack for several parameter configurations. The obtinaed probabilities Small model theorem for node links. A small model theorem allows to verify a class of infinite state systems by only checking a finite size system. The key observation is that, in a system where slices are intercepted when traveling between user and storage nodes, two or more node links with the same attack probability are indistinguishable from a single node link having the same attack probability, modulo some technicalities. Since the attack probability is determined by the physical properties of the employed LAN, the number of required node links reduces to the number of used LANs.</p><formula xml:id="formula_2">leak i = 0 [Wi] 1 − ai : ctri &lt; c ∧ leak i = 0 ∧ ctr i = ctri + 1 [Ri] 1 − ai : ctri &gt; 0 ∧ leak i = 0 ∧ ctr i = ctri [Wi] ai : ctri &lt; c ∧ leak1 = 0 ∧ . . . ∧ leakm = 0 ∧ leak i = 1 ∧ ctr i = ctri [Ri] ai : ctri &gt; 0 ∧ leak1 = 0 ∧ . . . ∧ leakm = 0 ∧ leak i = 1 ∧ ctr i = ctri − 1 [Li] leaki = 0 Fig. 3: The Link c i (a i ) [Li] ctra &lt; n ∧ ctr a = ctra + 1</formula><p>We denote with Link c i (a) a generic link to storage provider i, having capacity of c slices and probability a of leaking a slice to the slice attacker, during reads or writes. We write ≈ Γ denoting the (equivalence) relation of probabilistic bisimulation modulo action replacement <ref type="bibr" target="#b0">[1]</ref>. Then we can state the following.</p><p>Lemma 1 (Reduction <ref type="bibr" target="#b0">[1]</ref>). For any natural numbers c, d, i, j, k &gt; 0 such that i = j, any probability a. Given the MDPs Link c i (a), Link d j (a), and Link c+d k (a):</p><formula xml:id="formula_3">Link c i (a) Link d j (a) ≈ Γ Link c+d k (a) where Γ renames R i , R j (resp. W i , W j , resp. L i , L j ) to R k (resp. W k , resp. L k ).</formula><p>Given a sorted list of numbers a 1 , . . . , a m s.t. a 1 ≤ . . . ≤ a m , let us call its distinction the list of indices i 1 , . . . , i q+1 satisfying the following:</p><formula xml:id="formula_4">-i 1 = 1, i q+1 = m, and i 1 &lt; . . . &lt; i q+1 , -∀j ∈ [1, q].∀k ∈ [i j , i j+1 − 1]. a ij = a k , and -∀j ∈ [1, q]. a ij &lt; a ij+1 .</formula><p>Such constraints mean that the list a 1 , . . . , a m can be partitioned into q sublists, each containing identical values, and each pair of lists containing distinct values. For example, the distinction of the sorted list of probabilities 0.00, 0.00, 0.05, 0.10, 0.10, 0.10, 0.15, is the list of indices 1, 3, 4, 7.</p><p>The small model theorem states that there exists a cutoff to the number of Links to be considered in a system.</p><p>Theorem 1 (Small model theorem). For any naturals m, c 1 , . . . , c m &gt; 0 and probabilities a 1 , . . . , a m . Given the MDPs Link c1 1 (a 1 ), . . . , Link cm m (a m ). For any MDP M and formula Φ ∈ PCTL the following holds:</p><formula xml:id="formula_5">M Link c1 1 (a 1 ) . . . Link cm m (a m ) |= Φ ⇔ M Link ci 1 1 (a i1 ) . . . Link ci q q (a iq ) |= Φ</formula><p>where, for some 0 &lt; q ≤ m, the list of indices i 1 , . . . , i q is a distinction of the list a 1 , . . . , a m (assume w.l.o.g. that the latter is sorted), the dispatch probabilities are given by</p><formula xml:id="formula_6">d ij = ij+1−1 k=ij d k while the capacities are defined as c ij = ij+1−1 k=ij c k .</formula><p>In our works we have introduced a novel formal probabilistic model to verify security properties of online storage clouds based on data dispersal algorithms. We have also considered different (probabilistic) models of attackers, namely some try to intercept the traveling slices while others try to attack the providers hosting the slices. In both cases their aim is to collect at least k slices, allowing to reconstruct the user's secret.</p><p>Based on this we designed a methodology for assessing security of dispersed cloud storage architectures. In the case of an attacker intercepting the exchanged slices, we were even able to prove a small model theorem for the number of storage providers to be model checked in the system. This in turn allowed us to measure the confidentiality of such systems for any number of storage providers in the network. Our methodology can be applied (1) a posteriori to measure the degree of security of an existing system w.r.t. a given specification, or (2) a priori in order to determine the best parameter values allowing the system to minimize the likelihood of an attack, from the considered intruder model.</p><p>In <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b2">3]</ref> we have shown how to apply our methodology on scenarios where a slice attacker is present, both for assessing security of an existing system and for determining best parameter values. In particular, in <ref type="bibr" target="#b1">[2]</ref> we exploited our methodology to find parameter values ensuring that the dispersed cloud storage reaches the degree of security known as perfect secrecy. Intuitively, the latter means that the slice attacker has equal likelihoods of intercepting k slices and of guessing the entire message content out of nothing. In <ref type="bibr" target="#b2">[3]</ref> the methodology has been used to model scenarios with a provider attacker.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 1 :</head><label>1</label><figDesc>Fig. 1: Block diagram of AONT-RS (with data length expressed in bits)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 2 :</head><label>2</label><figDesc>Fig. 2: The User(d 1 , . . . , d m )</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 4 :</head><label>4</label><figDesc>Fig. 4: The Attacker</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A probabilistic small model theorem to assess confidentiality of dispersed cloud storage</title>
		<author>
			<persName><forename type="first">M</forename><surname>Baldi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bartocci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Chiaraluce</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cucchiarelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Senigagliesi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Spalazzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Spegni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Quantitative Evaluation of Systems -14th International Conference, QEST 2017, Proceedings</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="123" to="139" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Security in heterogeneous distributed storage systems: A practically achievable informationtheoretic approach</title>
		<author>
			<persName><forename type="first">M</forename><surname>Baldi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Chiaraluce</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Senigagliesi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Spalazzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Spegni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computers and Communications (ISCC)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="1021" to="1028" />
		</imprint>
	</monogr>
	<note>IEEE Symposium on</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Parametric and probabilistic model checking of confidentiality in data dispersal algorithms</title>
		<author>
			<persName><forename type="first">M</forename><surname>Baldi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cucchiarelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Senigagliesi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Spalazzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Spegni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">High Performance Computing &amp; Simulation (HPCS), 2016 International Conference on</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="476" to="483" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">CDstore: Toward reliable, secure, and cost-efficient cloud storage via convergent dispersal</title>
		<author>
			<persName><forename type="first">M</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Qin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">P</forename><surname>Lee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet Comp</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="45" to="53" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Aont-rs: blending security and performance in dispersed storage systems</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">K</forename><surname>Resch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">S</forename><surname>Plank</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 9th USENIX conference on File and stroage technologies</title>
				<meeting>the 9th USENIX conference on File and stroage technologies</meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="14" to="14" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Clouds: A multi-cloud storage system with multi-level security</title>
		<author>
			<persName><forename type="first">L</forename><surname>Shen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Feng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing</title>
				<meeting>the International Conference on Algorithms and Architectures for Parallel Processing</meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="703" to="716" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
