2020
DOI: 10.1109/access.2020.2991431
|View full text |Cite
|
Sign up to set email alerts
|

Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone

Abstract: Most applications for the Internet of Things operate on embedded systems. In particular, embedded devices intended for smart healthcare, smart homes, and smart cars generate logs containing sensitive user information. These logs must be protected from malicious users while also being accessible for legitimate users to utilize them for providing customized services. Unfortunately, the existing logging system only supporting one-to-one encryption based on a server-client model, so there are limitations in buildi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…In this system, a two-dimensional hash chain is used to ensure the integrity and continuity of logging data. Recently, an attribute-based encryption method was proposed to support fine-grained access control of EDR data [10]. In addition, D. Lu et al proposed TEE-based SQLite for embedded systems [28].…”
Section: B Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In this system, a two-dimensional hash chain is used to ensure the integrity and continuity of logging data. Recently, an attribute-based encryption method was proposed to support fine-grained access control of EDR data [10]. In addition, D. Lu et al proposed TEE-based SQLite for embedded systems [28].…”
Section: B Related Workmentioning
confidence: 99%
“…T datagen ≥ 2wT mac + T sign + T ws (10) If TB-Logger violates Eq. 10, data loss occurs as the basic data block recording time would take longer than the basic data block generation time.…”
Section: ) Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…For reflecting on the progress of our current research, we took into consideration the recent advances that have been accomplished in attribute-based encryption with keyword search [24][25][26][27][28] and attribute-based encryption with privacy protection and accountability [29][30][31][32][33][34][35].…”
Section: State-of-the-art Approachmentioning
confidence: 99%
“…This opens the performance perspective (Ding et al, 2015), where the overhead incurred by intensive logging is non-negligible added to the concept of redundant logs. Finally, there is a legal perspective facing the problems with logs such as privacy (Miller, 2017) or cybersecurity to log files, which opens the use of BlockChain-based technologies (White et al, 2019) or encrypted decentralized logging infrastructures like the one proposed by Lee et al (2020), which are not explored in this research but leave the way open for further development and analysis.…”
mentioning
confidence: 99%