Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing

被引:0
|
作者
Islam, Md Shihabul [1 ]
Zamani, Mahmoud [1 ]
Hamlen, Kevin W. [1 ]
Khan, Latifur [1 ]
Kantarcioglu, Murat [1 ]
机构
[1] Univ Texas Dallas, Richardson, TX 75080 USA
关键词
IoT; Data Security and Privacy; Confidential Computing;
D O I
10.1007/978-3-031-65172-4_5
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
IoT devices gather data from the most intimate and sensitive aspects of our lives, transmitting it to untrusted cloud services for further managing and automating tasks through interconnecting smart devices without human intervention. To safeguard sensitive and private IoT data, solutions based on Trusted Execution Environments (Tees) could be utilized, providing end-to-end encrypted solution. Specifically, Tees securely process sensitive data within a protected area of the processor, isolated from the main operating system and applications, ensuring data confidentiality and integrity. However, in this study, we demonstrate that the end-to-end encryption offered by Tee based solutions for IoT devices may not be entirely sufficient. We present the first attack against Tee-based IoT solutions that can deduce sensitive information, such as a motion sensor reading, merely by analyzing memory access patterns. Our findings show that we can identify the type of device with about 95% accuracy and determine the values sent by IoT devices, like temperature readings, with approximately 85% accuracy. To counter these vulnerabilities, we design a system that enhances data security for IoT solutions in the untrusted cloud, using techniques like data oblivious execution and padding. With these defenses, we observe significant reduction in accuracy of device type detection and value prediction to at most 27% and 19%, respectively.
引用
收藏
页码:71 / 91
页数:21
相关论文
共 50 条
  • [1] An End-to-End View of IoT Security and Privacy
    Ling, Zhen
    Liu, Kaizheng
    Xu, Yiling
    Jin, Yier
    Fu, Xinwen
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [2] Improved End-to-End Data Security Approach for Cloud Computing
    Ghosh, Soumalya
    Verma, Shiv Kumar
    Ghosh, Uttam
    Al-Numay, Mohammed
    SUSTAINABILITY, 2023, 15 (22)
  • [3] End-to-end Security Architecture for Federated Cloud and IoT Networks
    Massonet, Philippe
    Deru, Laurent
    Achour, Amel
    Dupont, Sebastien
    Levin, Anna
    Villari, Massimo
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 463 - 468
  • [4] End-to-End Security for the IoT
    Dooley, James
    INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [5] Efficient End-to-End Security Scheme for Privacy-Preserving in IoT
    Harbi, Yasmine
    Refoufi, Allaoua
    Aliouat, Zibouda
    Harous, Saad
    2019 4TH INTERNATIONAL CONFERENCE ON NETWORKING AND ADVANCED SYSTEMS (ICNAS 2019), 2019, : 94 - 99
  • [6] End-to-end Security in the IoT Computing Continuum: Perspectives in the SWAMP Project
    Kleinschmidt, Joao H.
    Kamienski, Carlos
    Prati, Ronaldo C.
    Kolehmainen, Kari
    Aguzzi, Cristiano
    2019 9TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2019, : 191 - 192
  • [7] Ensuring End-to-End Security in Computing Continuum Exploiting Physical Unclonable Functions
    Barbareschi, Mario
    Casola, Valentina
    Lombardi, Daniele
    2023 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE, CLOUDCOM 2023, 2023, : 273 - 278
  • [8] Confidential Computing: Elevating Cloud Security and Privacy
    Russinovich, Mark
    COMMUNICATIONS OF THE ACM, 2024, 67 (01) : 52 - 53
  • [9] Confidential Computing: Elevating Cloud Security and Privacy
    Russinovich M.
    Queue, 2023, 21 (04): : 44 - 48
  • [10] Flexible IoT security middleware for end-to-end cloud-fog communication
    Mukherjee, Bidyut
    Wang, Songjie
    Lu, Wenyi
    Neupane, Roshan Lal
    Dunn, Daniel
    Ren, Yijie
    Su, Qi
    Calyam, Prasad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 688 - 703