Secure data processing for IoT middleware systems

被引:16
作者
Ayoade, Gbadebo [1 ]
El-Ghamry, Amir [1 ]
Karande, Vishal [1 ]
Khan, Latifur [1 ]
Alrahmawy, Mohammed [2 ]
Rashad, Magdi Zakria [2 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
[2] Mansoura Univ, Dept Comp Sci, Mansoura, Egypt
关键词
Middleware; Security; IoT; SGX;
D O I
10.1007/s11227-018-2686-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Increasingly, more manufacturing companies are equipping their products with smart capabilities which allow them to provide more informed services to customers. Unfortunately, most of these companies lack enough technical capabilities to build scalable platforms to process data collected by the deployed devices. As a result, these device manufacturers rely on IoT middleware companies to provide the needed processing capabilities and scalability. With the proliferation of these middleware services in handling data and the increase in the risk of data leakage and data breaches, we propose an approach that ensures data protection by leveraging trusted hardware-based technology from the recent Software Guard Extension (SGX) provided by Intel. SGX is a new technology that enforces strong isolation by running a process in a secure sandbox called enclave, and it offers remote attestation to ensure computations on an untrusted system are running within an enclave. By deploying SGX in the IoT gateway and the cloud service, we show that our approach prevents attacks on IoT data in transit as well as at rest by using key hashing to enforce message integrity. Our proposed framework ensures the protection of user data on third-party IoT middleware platforms by dividing the IoT data platform into trusted and untrusted modules and ensures the execution of all sensitive data processing in the trusted module which runs inside a hardware protected memory region called as enclave. Our approach enables the user to implement data access policy control within the enclave. Our proposed framework allows the user to verify that the application is running in an authenticated SGX machine and to ensure the application is not modified by a platform owner as a result of the remote attestation mechanism provided by SGX. Meanwhile, our approach defeats low-level attacks and keeps all data securely encrypted without introducing significant overhead.
引用
收藏
页码:4684 / 4709
页数:26
相关论文
共 46 条
[1]  
[Anonymous], 2016, GUID ACGS
[2]  
[Anonymous], 2016, INTEL SOFTWARE GUARD
[3]  
[Anonymous], TECH REP
[4]  
ARM A, 2009, CISC VIS NETW IND GL
[5]  
Arnautov S, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P689
[6]  
Bagci I. E., 2015, Proceedings of the 31st Annual Computer Security Applications Conference, P131
[7]  
Bajaj S., 2011, Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data. SIGMOD'11, P205, DOI DOI 10.1145/1989323.1989346
[8]   CorrectDB: SQL Engine with Practical Query Authentication [J].
Bajaj, Sumeet ;
Sion, Radu .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (07) :529-540
[9]   Shielding Applications from an Untrusted Cloud with Haven [J].
Baumann, Andrew ;
Peinado, Marcus ;
Hunt, Galen .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2015, 33 (03)
[10]  
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1