MIT Research News' Journal
 
[Most Recent Entries] [Calendar View]

Tuesday, July 2nd, 2013

    Time Event
    4:00a
    Protecting data in the cloud
    Cloud computing — outsourcing computational tasks over the Internet — could give home-computer users unprecedented processing power and let small companies launch sophisticated Web services without building massive server farms.

    But it also raises privacy concerns. A bank of cloud servers could be running applications for 1,000 customers at once; unbeknownst to the hosting service, one of those applications might have no purpose other than spying on the other 999.

    Encryption could make cloud servers more secure. Only when the data is actually being processed would it be decrypted; the results of any computations would be re-encrypted before they’re sent off-chip.

    In the last 10 years or so, however, it’s become clear that even when a computer is handling encrypted data, its memory-access patterns — the frequency with which it stores and accesses data at different memory addresses — can betray a shocking amount of private information.

    At the International Symposium on Computer Architecture in June, MIT researchers described a new type of secure hardware component, dubbed Ascend, that would disguise a server’s memory-access patterns, making it impossible for an attacker to infer anything about the data being stored. Ascend also thwarts another type of attack, known as a timing attack, which attempts to infer information from the amount of time that computations take.

    Computational trade-off

    Similar designs have been proposed in the past, but they’ve generally traded too much computational overhead for security. “This is the first time that any hardware design has been proposed — it hasn’t been built yet — that would give you this level of security while only having about a factor of three or four overhead in performance,” says Srini Devadas, the Edwin Sibley Webster Professor of Electrical Engineering and Computer Science, whose group developed the new system. “People would have thought it would be a factor of 100.”

    The “trivial way” of obscuring memory-access patterns, Devadas explains, would be to request data from every address in the memory — whether a memory chip or a hard drive — and throw out everything except the data stored at the one address of interest. But that would be much too time-consuming to be practical.

    What Devadas and his collaborators — graduate students Ling Ren, Xiangyao Yu and Christopher Fletcher, and research scientist Marten van Dijk — do instead is to arrange memory addresses in a data structure known as a “tree.” A family tree is a familiar example of a tree, in which each “node” (in this example, a person’s name) is attached to only one node above it (the node representing the person’s parents) but may connect to several nodes below it (the person’s children).

    With Ascend, addresses are assigned to nodes randomly. Every node lies along some “path,” or route through the tree, that starts at the top and passes from node to node, without backtracking, until arriving at a node with no further connections. When the processor requires data from a particular address, it sends requests to all the addresses in a path that includes the one it’s really after.

    To prevent an attacker from inferring anything from sequences of memory access, every time Ascend accesses a particular memory address, it randomly swaps that address with one stored somewhere else in the tree. As a consequence, accessing a single address multiple times will very rarely require traversing the same path.

    Less computation to disguise an address

    By confining its dummy requests to a single path, rather than sending them to every address in memory, Ascend exponentially reduces the amount of computation required to disguise an address. In a separate paper, which is as-yet unpublished but has been posted online, the researchers prove that querying paths provides just as much security as querying every address in memory would.

    Ascend also protects against timing attacks. Suppose that the computation being outsourced to the cloud is the mammoth task of comparing a surveillance photo of a criminal suspect to random photos on the Web. The surveillance photo itself would be encrypted, and thus secure from prying eyes. But spyware in the cloud could still deduce what public photos it was being compared to. And the time the comparisons take could indicate something about the source photos: Photos of obviously different people could be easy to rule out, but photos of very similar people might take longer to distinguish.

    So Ascend’s memory-access scheme has one final wrinkle: It sends requests to memory at regular intervals — even when the processor is busy and requires no new data. That way, attackers can’t tell how long any given computation is taking.
    4:00a
    Nanoparticles, made to order — inside and out
    A new coating technology developed at MIT, combined with a novel nanoparticle-manufacturing technology developed at the University of North Carolina at Chapel Hill, may offer scientists a way to quickly mass-produce tailored nanoparticles that are specially coated for specific applications, including medicines and electronics.

    Using this new combination of the two existing technologies, scientists can produce very small, uniform particles with customized layers of material that can carry drugs or other molecules to interact with their environment, or even target specific types of cells.

    Creating highly reproducible batches of precisely engineered, coated nanoparticles is important for the safe manufacture of drugs and obtaining regulatory approval, says Paula Hammond, the David H. Koch Professor in Chemical Engineering at MIT and a member of MIT’s Koch Institute for Integrative Cancer Research.

    “Everyone’s excited about nanomedicine’s potential, and there are some systems that are making it out to market, but people are also concerned about how reproducible each batch is. That’s especially critical for applications such as cancer therapies,” Hammond says. “Fortunately, we have combined two technologies that are at the forefront of addressing these issues and that show great promise for the future of nanomanufacturing.”

    Hammond and Joseph DeSimone, the Chancellor’s Eminent Professor of Chemistry at UNC and the William R. Kenan Jr. Distinguished Professor of Chemical Engineering at North Carolina State University, are the senior authors of a paper describing the technology in the July 1 online edition of Advanced Materials. Lead author of the paper is Stephen Morton, a graduate student in Hammond’s lab.

    ‘A very versatile platform’

    Hammond’s lab previously developed a layer-by-layer deposition technique for coating nanoparticle surfaces with alternating layers of drugs, RNA, proteins or other molecules of interest. Those coatings can also be designed to protect nanoparticles from being destroyed by the body’s immune system before reaching their intended targets.

    “It’s a very versatile platform for incorporating therapeutics,” Hammond says.

    However, the layer-by-layer application processes commonly used today to coat nanoparticles take too long to be useful for rapid, large-scale manufacture: For each layer, the particles must be soaked in a solution of the coating material, then spun in a centrifuge to remove excess coating. Applying each layer takes about an hour.

    In the new study, the MIT researchers used a spray-based technique, which allows them to apply each layer in just a few seconds. This technology was previously developed in the Hammond lab and is now being commercialized by Svaya Nanotechnologies.

    Hammond combined this approach with a nanoparticle-manufacturing technology known as the PRINT (Particle Replication In Non-wetting Templates) platform, which was developed in the DeSimone lab at UNC and is now being commercialized by Liquidia Technologies. Liquidia focuses on using the PRINT platform to create novel nanotechnology-based health-care products, vaccines and therapeutics. 

    The PRINT platform is a continuous roll-to-roll particle-molding technology that enables the design and mass production of precisely engineered particles of controlled size, shape and chemical composition. To make particles like the ones used in this study, a mixture of polymers and drug molecules (or other payload) is applied to a large roll of film that consists of a nano-sized mold containing features of the desired shape and size. The mixture fills every feature of the mold and solidifies to create billions of nanoparticles. Particles are removed from the mold using another roll of adhesive film, which can then be sprayed with layers of specialized coatings using Hammond’s novel technology and separated into individual particles.

    “The idea was to put these two industrial-scale processes together and create a sophisticated, beautifully coated nanoparticle, in the same way that bakeries glaze your favorite donut on the conveyor belt,” Hammond says.

    “The combination of PRINT and spray layer-by-layer provides a versatile platform for rapidly modifying the surface chemistry of particles,” says Frank Caruso, a professor of chemical and biomolecular engineering at the University of Melbourne who was not part of the research team. “This approach also holds promise for high throughput in the development of particle-delivery systems for nanomedicine applications.”

    Multiple functions

    This new process promises to yield large quantities of coated nanoparticles while dramatically reducing production time. It also allows for custom design of a wide variety of materials, both in the nanoparticle core and in the coating, for applications including electronics, drug delivery, vaccines, wound healing or imaging, Morton says.

    “Both the PRINT and layer-by-layer technologies allow for incorporation of many different materials that have unique properties to make systems with multiple built-in functions,” he says.

    To demonstrate the potential usefulness of this technique, the researchers created particles coated with hyaluronic acid, which has been shown to target proteins, called CD44 receptors, that are found in high levels on aggressive cancer cells. They found that breast cancer cells grown in the lab engulf particles coated with layers of hyaluronic acid much more efficiently than particles without the coatings or with coatings not containing hyaluronic acid.

    In follow-up studies, the researchers plan to design particles containing cancer drugs and cancer-fighting coatings to see if they can effectively shrink tumors. Some of those particles may include combinations, such as two different chemotherapy drugs, or a drug combined with RNA molecules that target cancerous genes. These combinations can work together in a synergistic fashion to selectively disarm and kill cancer cells.

    The research was funded by the NIH-funded Centers for Cancer Nanotechnology Excellence at MIT and UNC, a National Science Foundation graduate research fellowship, and a National Sciences and Engineering Research Council postdoctoral fellowship.

    << Previous Day 2013/07/02
    [Calendar]
    Next Day >>

MIT Research News   About LJ.Rossia.org