Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing

被引:0
|
作者
Islam, Md Shihabul [1 ]
Zamani, Mahmoud [1 ]
Hamlen, Kevin W. [1 ]
Khan, Latifur [1 ]
Kantarcioglu, Murat [1 ]
机构
[1] Univ Texas Dallas, Richardson, TX 75080 USA
关键词
IoT; Data Security and Privacy; Confidential Computing;
D O I
10.1007/978-3-031-65172-4_5
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
IoT devices gather data from the most intimate and sensitive aspects of our lives, transmitting it to untrusted cloud services for further managing and automating tasks through interconnecting smart devices without human intervention. To safeguard sensitive and private IoT data, solutions based on Trusted Execution Environments (Tees) could be utilized, providing end-to-end encrypted solution. Specifically, Tees securely process sensitive data within a protected area of the processor, isolated from the main operating system and applications, ensuring data confidentiality and integrity. However, in this study, we demonstrate that the end-to-end encryption offered by Tee based solutions for IoT devices may not be entirely sufficient. We present the first attack against Tee-based IoT solutions that can deduce sensitive information, such as a motion sensor reading, merely by analyzing memory access patterns. Our findings show that we can identify the type of device with about 95% accuracy and determine the values sent by IoT devices, like temperature readings, with approximately 85% accuracy. To counter these vulnerabilities, we design a system that enhances data security for IoT solutions in the untrusted cloud, using techniques like data oblivious execution and padding. With these defenses, we observe significant reduction in accuracy of device type detection and value prediction to at most 27% and 19%, respectively.
引用
收藏
页码:71 / 91
页数:21
相关论文
共 50 条
  • [21] Towards an End-to-End IoT Data Privacy-Preserving Framework Using Blockchain Technology
    Loukil, Faiza
    Ghedira-Guegan, Chirine
    Boukadi, Khouloud
    Benharkat, Aicha Nabila
    WEB INFORMATION SYSTEMS ENGINEERING, WISE 2018, PT I, 2018, 11233 : 68 - 78
  • [22] Application Layer Key Establishment for End-to-End Security in IoT
    Perez, Salvador
    Hernandez-Ramos, Jose L.
    Raza, Shahid
    Skarmeta, Antonio
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03): : 2117 - 2128
  • [23] Decentralized security framework for future IoT end-to-end connectivity
    Xin, Qin
    Gonzalez Crespo, Ruben
    Enrique Montenegro-Marin, Carlos
    Garcia Diaz, Vicente
    Alazab, Mamoun
    ANNALS OF OPERATIONS RESEARCH, 2023, 326 (SUPPL 1) : 79 - 79
  • [24] Performance Analysis of End-to-End Security Schemes in Healthcare IoT
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Levorato, Marco
    Virtanen, Seppo
    Isoaho, Jouni
    9TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2018) / THE 8TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2018) / AFFILIATED WORKSHOPS, 2018, 130 : 432 - 439
  • [25] End-to-End Privacy for Open Big Data Markets
    Perera, Charith
    Ranjan, Rajiv
    Wang, Lizhe
    IEEE CLOUD COMPUTING, 2015, 2 (04): : 44 - 53
  • [26] Zeph: Cryptographic Enforcement of End-to-End Data Privacy
    Burkhalter, Lukas
    Kuchler, Nicolas
    Viand, Alexander
    Shafagh, Hossein
    Hithnawi, Anwar
    PROCEEDINGS OF THE 15TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI '21), 2021, : 387 - 404
  • [27] Data Security and Privacy in Cloud Computing
    Sun, Yunchuan
    Zhang, Junsheng
    Xiong, Yongping
    Zhu, Guangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [28] SECUPerf: End-to-End Security and Performance Assessment of Cloud Services
    Xiong, Kaiqi
    Pantangi, Ajay
    Makati, Mufaddal
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1747 - 1752
  • [29] Ensuring Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    IWQOS: 2009 IEEE 17TH INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2009, : 37 - +
  • [30] End-to-end energy models for Edge Cloud-based IoT platforms: Application to data stream analysis in IoT
    Li, Yunbo
    Orgerie, Anne-Cecile
    Rodero, Ivan
    Amersho, Betsegaw Lemma
    Parashar, Manish
    Menaud, Jean-Marc
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 667 - 678