Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3365871.3365888acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiotConference Proceedingsconference-collections
short-paper

Privacy-Preserving IoT Cloud Data Processing Using SGX

Published: 22 October 2019 Publication History

Abstract

This paper describes a privacy-aware ecosystem for the Internet of Things (IoT) in cloud environment. Using Intel Software Guard Extensions (SGX) technology, we present an IoT middleware solution suitable for deployment on untrusted platforms, with strong assumptions that the processed data are hidden from any unauthorized party, including the cloud provider. Clients communicate with our system using an application-layer security mechanism on top of HTTP. In order to validate our contribution, we ran performance tests which suggest that the security overhead of our system remains acceptable for real-life applications.

References

[1]
Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark L. Stillwell, David Goltzsche, Dave Eyers, Rüdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 689--703. https://doi.org/10.5281/zenodo.163059
[2]
Ing-Ray Chen, Jia Guo, and Jeffrey JP Tsai. 2017. Trust as a service for SOA-based IoT systems. Services Transactions on Internet of Things(STIOT) 1, 1 (2017), 43--52.
[3]
Joerg Daubert, Alexander Wiesmaier, and Panayotis Kikiras. 2015. A view on privacy & trust in IoT. In 2015 IEEE International Conference on Communication Workshop (ICCW). IEEE, 2665--2670. https://doi.org/10.1109/ICCW.2015.7247581
[4]
Ben Francis. 2019. Web Thing API. Retrieved August 29, 2019 from https://iot.mozilla.org/wot/.
[5]
Pascal Gremaud, Arnaud Durand, and Jacques Pasquier. 2017. A secure, privacy-preserving IoT middleware using Intel SGX. In Proceedings of the Seventh International Conference on the Internet of Things (IoT '17). ACM, New York, NY, USA, Article 22, 2 pages. https://doi.org/10.1145/3131542.3140258
[6]
Pascal Gremaud, Arnaud Durand, and Jacques Pasquier. 2019. Communication Protocol for Sec-Flux. Retrieved August 29, 2019 from https://www3.unifr.ch/inf/softeng/en/assets/public/files/research/research_topics/Protocol_sec_flux.pdf.
[7]
Marcel Grosjean. 2018. A Client Interface for interacting with a privacy-preserving IoT middleware. Master's thesis. University of Fribourg, Fribourg, Switzerland. Retrieved August 29, 2019 from https://www3.unifr.ch/inf/softeng/en/assets/public/files/research/students_projects/master/Master_Grosjean_Marcel.pdf.
[8]
Olivier Liechti, Laurent Prévost, Valentin Delaye, Jean Hennebert, Vincent Grivel, Jean-Philippe Rey, Jonathan Depraz, and Marc Sommer. 2015. Enabling reactive cities with the iFLUXc middleware. In Proceedings of the 6th International Workshop on the Web of Things. ACM, 1. https://doi.org/10.1145/2834791.2834794
[9]
Rafael Pires, Daniel Gavril, Pascal Felber, Emanuel Onica, and Marcelo Pasin. 2017. A lightweight MapReduce framework for secure processing with SGX. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid '17). IEEE Press, Piscataway, NJ, USA, 1100--1107. https://doi.org/10.1109/CCGRID.2017.129
[10]
Rafael Pires, Marcelo Pasin, Pascal Felber, and Christof Fetzer. 2016. Secure content-based routing using Intel software guard extensions. In Proceedings of the 17th International Middleware Conference (Middleware '16). ACM, New York, NY, USA, Article 10, 10 pages. https://doi.org/10.1145/2988336.2988346
[11]
Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, and Mark Russinovich. 2015. VC3: Trustworthy data analytics in the cloud using SGX. In 2015 IEEE Symposium on Security and Privacy. IEEE, 38--54. https://doi.org/10.1109/SP.2015.10
[12]
Goeran Selander, John Mattsson, Francesca Palombini, and Ludwig Seitz. 2019. Object Security for Constrained RESTful Environments (OSCORE). Retrieved August 29, 2019 from https://tools.ietf.org/html/draft-ietf-core-object-security-16.
[13]
Shweta Shinde, Dat Le Tien, Shruti Tople, and Prateek Saxena. 2017. Panoply: Low-TCB Linux applications with SGX enclaves. In Proceedings of the 2017 Annual Network and Distributed System Security Symposium (NDSS). https://doi.org/10.14722/ndss.2017.23500
[14]
Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer networks 76 (2015), 146--164. https://doi.org/10.1016/j.comnet.2014.11.008
[15]
Chungsheng Zhu, Joel Rodrigues, Victor Leung, Lei Shu, and Laurence Yang. 2018. Trust-based communication for the industrial Internet of Things. IEEE Communications Magazine 56, 2 (Feb 2018), 16--22. https://doi.org/10.1109/MCOM.2018.1700592

Cited By

View all
  • (2023)Intel Software Guard Extensions Applications: A SurveyACM Computing Surveys10.1145/359302155:14s(1-38)Online publication date: 17-Jul-2023
  • (2023)ReFlat: A Robust Access Pattern Hiding Solution for General Cloud Query Processing Based on K-Isomorphism and Hardware EnclaveIEEE Transactions on Cloud Computing10.1109/TCC.2021.313735111:2(1474-1486)Online publication date: 1-Apr-2023
  • (2022)Privacy Protection in 5G Positioning and Location-based Services Based on SGXACM Transactions on Sensor Networks10.1145/351289218:3(1-19)Online publication date: 30-Aug-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
IoT '19: Proceedings of the 9th International Conference on the Internet of Things
October 2019
263 pages
ISBN:9781450372077
DOI:10.1145/3365871
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 October 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cloud computing
  2. Intel SGX
  3. IoT
  4. Privacy
  5. Rules engine
  6. Secure computing
  7. Trusted Execution

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

IoT 2019

Acceptance Rates

IoT '19 Paper Acceptance Rate 28 of 84 submissions, 33%;
Overall Acceptance Rate 28 of 84 submissions, 33%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)24
  • Downloads (Last 6 weeks)3
Reflects downloads up to 10 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Intel Software Guard Extensions Applications: A SurveyACM Computing Surveys10.1145/359302155:14s(1-38)Online publication date: 17-Jul-2023
  • (2023)ReFlat: A Robust Access Pattern Hiding Solution for General Cloud Query Processing Based on K-Isomorphism and Hardware EnclaveIEEE Transactions on Cloud Computing10.1109/TCC.2021.313735111:2(1474-1486)Online publication date: 1-Apr-2023
  • (2022)Privacy Protection in 5G Positioning and Location-based Services Based on SGXACM Transactions on Sensor Networks10.1145/351289218:3(1-19)Online publication date: 30-Aug-2022
  • (2022)A Privacy-Preserving Data Aggregation Scheme for Fog/Cloud-Enhanced IoT Applications Using a Trusted Execution Environment2022 IEEE International Systems Conference (SysCon)10.1109/SysCon53536.2022.9773838(1-5)Online publication date: 25-Apr-2022
  • (2021)Intel Software Guard Extensions in Internet of Things Scenarios: A Systematic Mapping Study2021 8th International Conference on Future Internet of Things and Cloud (FiCloud)10.1109/FiCloud49777.2021.00056(342-349)Online publication date: Aug-2021
  • (2020)A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT DeploymentsSensors10.3390/s2018525220:18(5252)Online publication date: 14-Sep-2020

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media