Network and storage latency attacks to online trading protocols in the cloud

5Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Online trading protocols enable participants to trade, barter, or sell goods and services over a private network or the global Net. Due to diversity of network and computational resources at their disposal, participants communicate and carry out their trading with different latencies. This scenario may give rise to latency attacks, where malicious parties (a.k.a. fast traders) exploit lower latency to attack trading protocols’ fairness and increase their income. With the advent of the cloud, the problem of identifying and preventing latency attacks is exacerbated by the fact that cloud providers and privileged users could collude to make latency attacks simpler and more effective. In this paper, we give an overview of network and storage latency attacks in multi-party trading protocols, focusing on cloud peculiarities and providing some empirical recommendations for protocol design.

Cite

CITATION STYLE

APA

Ardagna, C. A., & Damiani, E. (2014). Network and storage latency attacks to online trading protocols in the cloud. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8842, pp. 192–201). Springer Verlag. https://doi.org/10.1007/978-3-662-45550-0_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free