Intel Software Guard Extensions in Internet of Things Scenarios: A Systematic Mapping Study

被引:5
作者
Will, Newton Carlos [1 ]
Cezane Gomes Valadares, Dalton [2 ]
de Souza Santos, Danilo Freire [3 ]
Perkusich, Angelo [3 ]
机构
[1] Univ Tecnol Fed Parana, Dept Comp Sci, Dois Vizinhos, Brazil
[2] Fed Inst Pernambuco, Dept Mech Engn, Caruaru, Brazil
[3] Univ Fed Campina Grande, Informat & Elect Engn Ctr, Comp Sci, Campina Grande, Paraiba, Brazil
来源
2021 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD, FICLOUD 2021 | 2021年
关键词
IoT; SGX; security; privacy; integrity; fog; cloud;
D O I
10.1109/FiCloud49777.2021.00056
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to the Internet of Things (IoT) devices' processing and memory constraints, the processing and analysis of data acquired by such devices are generally performed in a fog or cloud environment, which offers more processing power. When delegating data processing to third parties, it is necessary to ensure their confidentiality and their owners' privacy, which can be achieved using a Trusted Execution Environment, such as Intel SGX. In this paper, we present a systematic mapping study to review recent works related to the use of Intel SGX architecture in IoT scenarios. We conduct the study by selecting 35 papers published between 2017 and 2020 and providing a comprehensive overview of the application scenarios and solutions when combining Intel SGX and the IoT paradigm.
引用
收藏
页码:342 / 349
页数:8
相关论文
共 56 条
[1]   Migrating SGX Enclaves with Persistent State [J].
Alder, Fritz ;
Kurnikov, Arseny ;
Paverd, Andrew ;
Asokan, N. .
2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, :195-206
[2]  
Ali J., 2019, INT C OMN LAYER INT
[3]  
Anati I., 2013, Intl Wksp on Hardware and Architectural Support for Security and Privacy
[4]  
Ayoade G., 2018, INT C INF REUS INT
[5]   Secure data processing for IoT middleware systems [J].
Ayoade, Gbadebo ;
El-Ghamry, Amir ;
Karande, Vishal ;
Khan, Latifur ;
Alrahmawy, Mohammed ;
Rashad, Magdi Zakria .
JOURNAL OF SUPERCOMPUTING, 2019, 75 (08) :4684-4709
[6]  
Bao Z., 2020, IEEE Access, V8
[7]  
Bierzynski K., 2017, INT C FOG MOB EDG CO
[8]  
Chen Y., 2018, INT C SEC PRIV COMM
[9]   A comprehensive survey of hardware-assisted security: From the edge to the cloud [J].
Coppolino, Luigi ;
D'Antonio, Salvatore ;
Mazzeo, Giovanni ;
Romano, Luigi .
INTERNET OF THINGS, 2019, 6
[10]   A novel data exploitation framework based on blockchain [J].
Dib, Omar ;
Huyart, Clement ;
Toumi, Khalifa .
PERVASIVE AND MOBILE COMPUTING, 2020, 61