Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing

被引:0
|
作者
Islam, Md Shihabul [1 ]
Zamani, Mahmoud [1 ]
Hamlen, Kevin W. [1 ]
Khan, Latifur [1 ]
Kantarcioglu, Murat [1 ]
机构
[1] Univ Texas Dallas, Richardson, TX 75080 USA
关键词
IoT; Data Security and Privacy; Confidential Computing;
D O I
10.1007/978-3-031-65172-4_5
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
IoT devices gather data from the most intimate and sensitive aspects of our lives, transmitting it to untrusted cloud services for further managing and automating tasks through interconnecting smart devices without human intervention. To safeguard sensitive and private IoT data, solutions based on Trusted Execution Environments (Tees) could be utilized, providing end-to-end encrypted solution. Specifically, Tees securely process sensitive data within a protected area of the processor, isolated from the main operating system and applications, ensuring data confidentiality and integrity. However, in this study, we demonstrate that the end-to-end encryption offered by Tee based solutions for IoT devices may not be entirely sufficient. We present the first attack against Tee-based IoT solutions that can deduce sensitive information, such as a motion sensor reading, merely by analyzing memory access patterns. Our findings show that we can identify the type of device with about 95% accuracy and determine the values sent by IoT devices, like temperature readings, with approximately 85% accuracy. To counter these vulnerabilities, we design a system that enhances data security for IoT solutions in the untrusted cloud, using techniques like data oblivious execution and padding. With these defenses, we observe significant reduction in accuracy of device type detection and value prediction to at most 27% and 19%, respectively.
引用
收藏
页码:71 / 91
页数:21
相关论文
共 50 条
  • [31] TOWARD END-TO-END BIOMETRICS-BASED SECURITY FOR IOT INFRASTRUCTURE
    Hossain, M. Shamim
    Muhammad, Ghulam
    Rahman, Sk Md Mizanur
    Abdul, Wadood
    Alelaiwi, Abdulhameed
    Alamri, Atif
    IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) : 44 - 51
  • [32] Providing End-to-End Security Using Quantum Walks in IoT Networks
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Venegas-Andraca, Salvador E.
    Elwahsh, Haitham
    Piran, Md Jalil
    Bashir, Ali Kashif
    Song, Oh-Young
    Mazurczyk, Wojciech
    IEEE ACCESS, 2020, 8 : 92687 - 92696
  • [33] Hybrid End-to-End VPN Security Approach for Smart IoT Objects
    Juma, Mazen
    Monem, Azza Abdel
    Shaalan, Khaled
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 158
  • [34] End-to-end security enabled intelligent remote IoT monitoring system
    Saleem, Kashif
    Zinou, Mohammed Farouk
    Mohammad, Farah
    Ouni, Ridha
    Elhendi, Ahmed Zohier
    Almuhtadi, Jalal
    FRONTIERS IN PHYSICS, 2024, 12
  • [35] Smart End-to-end Massive IoT Interoperability, Connectivity and Security (SEMIoTICS)
    Petroulakis, Nikolaos
    Fysarakis, Konstantinos
    Ioannidis, Sotiris
    Spanoudakis, George
    Kulkarni, Vivek
    ERCIM NEWS, 2019, (119): : 32 - 33
  • [36] Selective End-To-End Data-Sharing in the Cloud
    Hoerandner, Felix
    Ramacher, Sebastian
    Roth, Simon
    INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 175 - 195
  • [37] Selective end-to-end data-sharing in the cloud
    Felix Hörandner
    Sebastian Ramacher
    Simon Roth
    Journal of Banking and Financial Technology, 2020, 4 (1): : 139 - 157
  • [38] End-to-end privacy preserving scheme for IoT-based healthcare systems
    Nasr Esfahani, Maryam
    Shahgholi Ghahfarokhi, Behrouz
    Etemadi Borujeni, Shahram
    WIRELESS NETWORKS, 2021, 27 (06) : 4009 - 4037
  • [39] End-to-end privacy preserving scheme for IoT-based healthcare systems
    Maryam Nasr Esfahani
    Behrouz Shahgholi Ghahfarokhi
    Shahram Etemadi Borujeni
    Wireless Networks, 2021, 27 : 4009 - 4037
  • [40] A THREE TIER SCHEME FOR END TO END SECURITY IN CLOUD COMPUTING
    Chandar, R. Bala
    Kavitha, M. S.
    Seenivasan, K.
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2013,