Proceedings of The10th International Conference on Utility and Cloud Computing 2017
DOI: 10.1145/3147213.3147230
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Privacy-Aware Data Dissemination for Cloud-Based Applications

Abstract: In this paper we propose a data dissemination platform that supports data security and different privacy levels even when the platform and the data are hosted by untrusted infrastructures. The proposed system aims at enabling an application ecosystem that uses off-the-shelf trusted platforms (in this case, Intel SGX), so that users may allow or disallow third parties to access the live data stream with a specific sensitivity-level. Moreover, this approach does not require users to manage the encryption keys di… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…• Automotive -device access for automotive software [26] and secure communication between vehicle infotainment system and user devices [67]; • Healthcare -secure heartbeat sensor application [36], critical medical services [72] and healthcare data monitoring system [73]; • Smart metering -data dissemination [61] and data aggregation [75]; • Video application -video surveillance devices [46] and duplicate removal operations [69]; • Edge computing -industrial IoT edge devices [43] and edge-cloud communications [63]; • Industrial maintenance -secure smart service for industrial maintenance scenarios [32]; • Payment system -trusted OS for mobile payment system [29]; • Smart home -device authentication for smart home/smart grid scenario [28]. The rest of the papers (about 76%) did not present any IoT scenario.…”
Section: B Iot Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“…• Automotive -device access for automotive software [26] and secure communication between vehicle infotainment system and user devices [67]; • Healthcare -secure heartbeat sensor application [36], critical medical services [72] and healthcare data monitoring system [73]; • Smart metering -data dissemination [61] and data aggregation [75]; • Video application -video surveillance devices [46] and duplicate removal operations [69]; • Edge computing -industrial IoT edge devices [43] and edge-cloud communications [63]; • Industrial maintenance -secure smart service for industrial maintenance scenarios [32]; • Payment system -trusted OS for mobile payment system [29]; • Smart home -device authentication for smart home/smart grid scenario [28]. The rest of the papers (about 76%) did not present any IoT scenario.…”
Section: B Iot Scenariosmentioning
confidence: 99%
“…Protection for flow tracking application [59] Trusted framework to develop IoT applications [36] Protection for health data [73] Secure architecture for P2P scenarios [24] Protection for edge computing [63] Comparison between TEE and secure multi-party computation application [62] Protection for video application [46], [69] Secure logger [13], [76] Protection for system analyser [49] Societal model for IoT security [68] Protection for location-based services [60] Trusted auditor [47] Protection for data dissemination [61] Data encryption mechanism [56] Protection for data management [14] Data protection (app) [71] Protection for data aggregation (app) [75] Checker for Industrial gateway communications [52] Lightweithg anonymous authentication [25] Remote attestation mechanism [38] Device snapshot authentication system [32] Control-flow attestation [37] Authentication scheme [58] Remote attestation and channel protection [44] Secure authentication and key distribution [67] Boot attestation [53] Protection for data through authentication [50] Protection and attestation for remote terminal [65] Device private keys protection architecture [28] Remote attestation [64] Keys derivation from device characteristics [31] Authenticity detection service [40] Keys protection against cold boot attacks [55] Cache rootkit exploiting TrustZone [35] vendors, e.g., ARM and Intel, already present many of the general advantages, such as hardware isolation (normal world and the secure world) and mem...…”
Section: Tee Advantages and Disadvantagesmentioning
confidence: 99%
“…It resolves the potential research gaps highlighted by the sink‐based approach of data dissemination. Sampaio et al [68 ] developed an efficient, privacy‐preserving and reliable data dissemination methods, which control the usage of relevant data by third parties. Later on, Kong et al [69 ] proposed a secure querying data dissemination method for the vehicular fog.…”
Section: Privacy‐based Verification and Validation Schemesmentioning
confidence: 99%
“…Finally, Sampaio et al built on top of SCBR and consider that publications maybe be restricted to a set of subscribers [41]. Nevertheless, the approach involves a thirdparty entity that filters individual subscriptions according to limitations from the publishers.…”
Section: B Systems Leveraging Teesmentioning
confidence: 99%