Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3599691.3603403acmconferencesArticle/Chapter ViewAbstractPublication PageshotstorageConference Proceedingsconference-collections
research-article
Public Access

Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers?

Published: 10 July 2023 Publication History
  • Get Citation Alerts
  • Abstract

    The growing worldwide attention toward large-scale subsea data centers has garnered substantial interest from commercial entities which have built and deployed underwater prototypes since 2015. These data centers utilize hard disk drives (HDDs) as a cost-effective method of data storage. However, researchers have demonstrated that acoustic waves can affect the availability and integrity of HDDs and applications that rely on them. These studies are all conducted in air on commercial laptops, hence their applicability and implications in submerged environments remain unexplored. In this position paper, we investigate potential vulnerabilities of storage devices deployed in underwater data centers and subsea storage platforms against targeted acoustic attacks. Based on our initial investigation of a simplified scenario, a victim HDD deployed in an enclosed submerged container is especially vulnerable to those acoustic attacks, which at frequencies ranging from 300 Hz 1300 Hz can result in up to 100% throughput loss and application crashes. Based on these findings, we argue that further study is necessary to assess underwater storage system security and develop effective defenses against overlooked acoustic attacks.

    References

    [1]
    2021. Install Ubuntu Server 16.04. https://ubuntu.com/tutorials/install-ubuntu-server-1604#1-overview.
    [2]
    Mahmoud Abdelsalam, Ram Krishnan, Yufei Huang, and Ravi Sandhu. 2018. Malware detection in cloud infrastructures using convolutional neural networks. In 2018 IEEE 11th international conference on cloud computing (CLOUD). IEEE, 162--169.
    [3]
    Adrien Ramirez. [n. d.]. What's The difference Between A Hard Drive And A Solid State Drive? https://reviewed.usatoday.com/laptops/features/ssd-vs-hdd.
    [4]
    Alexander Gillis and Sarah Wilson. 2021. Hard Disk Drive (HDD). https://www.techtarget.com/searchstorage/definition/hard-disk-drive#:~:text=Hard%20disk%20drive%20components%20include,arm%20and%20read%2Fwrite%20head.
    [5]
    A.R. Collins. [n. d.]. Underwater sound pressure levels. https://www.arc.id.au/SoundLevels.html.
    [6]
    Connor Bolton, Sara Rampazzi, Chaohao Li, Andrew Kwong, Wenyuan Xu, and Kevin Fu. 2018. Blue note: How intentional acoustic interference damages availability and integrity in hard disk drives and operating systems. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 1048--1062.
    [7]
    Ming-Hung Chen, Jyun-Yan Ciou, I-Hsin Chung, and Cheng-Fu Chou. 2018. FlexProtect: A SDN-based DDoS attack protection architecture for multi-tenant data centers. In Proceedings of the International Conference on High Performance Computing in Asia-Pacific Region. 202--209.
    [8]
    Yu-Jia Chen, Li-Chun Wang, and Chen-Hung Liao. 2015. Eavesdropping prevention for network coding encrypted cloud storage systems. IEEE Transactions on Parallel and Distributed Systems 27, 8 (2015), 2261--2273.
    [9]
    Keywhan Chung, Zbigniew T Kalbarczyk, and Ravishankar K Iyer. 2019. Availability attacks on computing systems through alteration of environmental control: smart malware approach. In Proceedings of the 10th ACM/IEEE international conference on cyber-physical systems. 1--12.
    [10]
    Clark Synthesis. [n. d.]. AQ339 Diluvio Underwater Loudspeaker. https://clarksynthesis.com/aq339/.
    [11]
    Ben Cutler, Spencer Fowers, Jeffrey Kramer, and Eric Peterson. 2017. Dunking the data center. IEEE Spectrum 54, 3 (2017), 26--31.
    [12]
    David Both. 2021. An introduction to Linux's EXT4 filesystem. https://opensource.com/article/17/5/introduction-ext4-filesystem.
    [13]
    Yangze Dong, Hefeng Dong, and Gangqiang Zhang. 2014. Study on denial of service against underwater acoustic networks. J. Commun. 9, 2 (2014), 135--143.
    [14]
    Andreas Fischer, Thomas Kittel, Bojan Kolosnjaji, Tamas K Lengyel, Waseem Mandarawi, Hermann Meer, Tilo Müller, Mykola Protsenko, Hans P Reiser, Benjamin Taubmann, et al. 2015. CloudIDEA: A Malware Defense Architecture for Cloud Data Centers. In Proceedings of the Confederated International Conferences on On the Move to Meaningful Internet Systems: OTM2015 Conferences-Volume 9415. 594--611.
    [15]
    FH Fisher and VP Simmons. 1977. Sound absorption in sea water. The Journal of the Acoustical Society of America 62, 3 (1977), 558--564.
    [16]
    Xing Gao, Guannan Liu, Zhang Xu, Haining Wang, Li Li, and Xiaorui Wang. 2020. Investigating security vulnerabilities in a hot data center with reduced cooling redundancy. IEEE Transactions on Dependable and Secure Computing 19, 1 (2020), 208--226.
    [17]
    GNU Radio Project. [n.d.]. GNU Radio. https://www.gnuradio.org/
    [18]
    Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, and Yuval Elovici. 2017. Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise ('DiskFiltration'). In 22nd European Symposium on Research in Computer Security, (ESORICS 2017). Springer, 98--115.
    [19]
    David Halliday, Robert Resnick, and Jearl Walker 2013. Fundamentals of physics. John Wiley & Sons.
    [20]
    Jens Axboe. [n.d.]. Flexible I/O Tester https://github.com/axboe/fio.
    [21]
    Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, and Kevin Fu. 2021. Poltergeist: Acoustic adversarial machine learning against cameras and computer vision. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 160--175.
    [22]
    John Roach. 2020. Microsoft finds underwater datacenters are reliable, practical and use energy sustainably. https://news.microsoft.com/source/features/sustainability/project-natick-underwater-datacenter/.
    [23]
    William Kuperman and Philippe Roux. 2007. Underwater acoustics. Springer Handbook of Acoustics (2007), 149--204.
    [24]
    Andrew Kwong, Wenyuan Xu, and Kevin Fu. 2019. Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone. In 2019 IEEE Symposium on Security and Privacy (SP). 905--919.
    [25]
    Antonio Libri, Andrea Bartolini, and Luca Benini. 2020. pAElla: Edge AI-based real-time malware detection in data centers. IEEE Internet of Things Journal 7, 10 (2020), 9589--9599.
    [26]
    Litton Power. 2021. The Ongoing Value of Hard Disk Drives in Data Centers. https://www.enterprisestorageforum.com/news/hard-disk-drives-data-centers/.
    [27]
    Tiara J Lu, Audrey Hess, and MF Ashby. 1999. Sound absorption in metallic foams. Journal of applied physics 85, 11 (1999), 7528--7539.
    [28]
    Xavier Lurton. 2002. An introduction to underwater acoustics: principles and applications. Vol. 2. Springer.
    [29]
    Mark Shaw and Martin Goldstein. 2015. Open CloudServer JBOD specification. https://www.opencompute.org/documents/microsoft-ocs-v1-jbod-blade.
    [30]
    Herman Medwin. 1975. Speed of sound in water: A simple equation for realistic parameters. The Journal of the Acoustical Society of America 58, 6 (1975), 1318--1319.
    [31]
    Bi Meng, Wang Andi, Xu Jian, and Zhou Fucai. 2017. Ddos attack detection system based on analysis of users' behaviors for application layer. In 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Vol. 1. IEEE, 596--599.
    [32]
    Meta. [n. d.]. A persistent key-value database for fast storage environments. https://rocksdb.org/.
    [33]
    Mukund Agarwal. [n. d.]. Microsoft's Project NATICK(Underwater Data Center)). https://vdocuments.mx/microsofts-project-natickunderwater-datacentre.html?page=1.
    [34]
    Peter Judge. 2022. Subsea Cloud announces three underwater data center projects. https://www.datacenterdynamics.com/en/news/subsea-cloud-announces-three-underwater-data-center-projects/.
    [35]
    Peter Judge. 2022. Work begins on Chinese underwater data center. https://www.datacenterdynamics.com/en/news/work-begins-on-chinese-underwater-data-center/.
    [36]
    Allan D Pierce. 2019. Acoustics: an introduction to its physical principles and applications. Springer.
    [37]
    William John Richardson. 1991. Effects of noise on marine mammals. Number 93. The Region.
    [38]
    Seagate. 2015. Desktop HDD Product Manual. https://www.seagate.com/www-content/product-content/desktop-hdd-fam/en-us/docs/100768625b.pdf.
    [39]
    Mohammad Shahrad, Arsalan Mosenia, Liwei Song, Mung Chiang, David Wentzlaff, and Prateek Mittal. 2018. Acoustic denial of service attacks on hard disk drives. In Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security. 34--39.
    [40]
    Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 881--896.
    [41]
    Leslie Howard Sperling. 1990. Sound and vibration damping with polymers: Basic viscoelastic definitions and concepts. ACS Publications.
    [42]
    Straits Research. [n. d.]. Data Center Storage Market Size is projected to reach USD 74.02 Billion by 2030, growing at a CAGR of 4.4%: Straits Research. https://www.globenewswire.com/news-release/2023/03/14/2626744/0/en/Data-Center-Storage-Market-Size-is-projected-to-reach-USD-74-02-Billion-by-2030-growing-at-a-CAGR-of-4-4-Straits-Research.html.
    [43]
    Supermicro. [n.d.]. Mobile Rack CSE-M35TQB. https://www.supermicro.com/en/products/accessories/mobilerack/CSE-M35TQB.php.
    [44]
    TOA Electronics. [n.d.]. Mixer / Amplifier - 120W. https://toaelectronics.com/product/BG-2120.
    [45]
    Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, and Kevin Fu. 2017. WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In 2017 IEEE European symposium on security and privacy (EuroS&P). IEEE, 3--18.
    [46]
    Yazhou Tu, Sara Rampazzi, Bin Hao, Angel Rodriguez, Kevin Fu, and Xiali Hei. 2019. Trick or heat? Manipulating critical temperature-based control systems using rectification attacks. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2301--2315.
    [47]
    Camiel AM van Moll, Michael A Ainslie, and Robbert van Vossen. 2009. A simple and accurate formula for the absorption of sound in seawater. IEEE Journal of Oceanic Engineering 34, 4 (2009), 610--616.
    [48]
    Peng Xiao, Michael Kowalski, Daniel McCulley, and Michael Zuba. 2015. An experimental study of jamming attacks in underwater acoustic communication. In Proceedings of the 10th International Conference on Underwater Networks & Systems. 1--5.
    [49]
    Yevgeniy Sverdlik. [n.d.]. Mcrosoft's Project NATICK (Underwater Datacenter). https://www.datacenterknowledge.com/archives/2017/01/09/microsoft-wants-to-patent-an-underwater-data-center-reef.
    [50]
    Michael Zuba, Zhijie Shi, Zheng Peng, and Jun-Hong Cui. 2011. Launching denial-of-service jamming attacks in underwater sensor networks. In Proceedings of the 6th International Workshop on Underwater Networks. 1--5.
    [51]
    Michael Zuba, Zhijie Shi, Zheng Peng, Jun-Hong Cui, and Shengli Zhou. 2015. Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks. Security and Communication Networks 8, 16 (2015), 2635--2645.

    Index Terms

    1. Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers?

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        HotStorage '23: Proceedings of the 15th ACM Workshop on Hot Topics in Storage and File Systems
        July 2023
        131 pages
        ISBN:9798400702242
        DOI:10.1145/3599691
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Sponsors

        In-Cooperation

        • USENIX

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 10 July 2023

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. hardware attacks
        2. storage security
        3. underwater data center

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        HotStorage '23
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 34 of 87 submissions, 39%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 229
          Total Downloads
        • Downloads (Last 12 months)229
        • Downloads (Last 6 weeks)7

        Other Metrics

        Citations

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media