Proceedings of the Seventh ACM Symposium on Cloud Computing 2016
DOI: 10.1145/2987550.2987574
|View full text |Cite
|
Sign up to set email alerts
|

Styx

Abstract: With the advent of the Internet of Things (IoT), billions of devices are expected to continuously collect and process sensitive data (e.g., location, personal health). Due to limited computational capacity available on IoT devices, the current de facto model for building IoT applications is to send the gathered data to the cloud for computation. While private cloud infrastructures for handling large amounts of data streams are expensive to build, using low cost public (untrusted) cloud infrastructures for proc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…We plan in our future work to further extend and thoroughly evaluate S S against other known approaches on secure stream processing, like S [45], MrCrypt [47] or DEFC [38]. In particular, we plan to extend S S with full automation of container deployments, as well as enriching the framework with a library of standard stream processing operators and e cient yet secure native plugins, to ease the development of complex stream processing pipelines.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We plan in our future work to further extend and thoroughly evaluate S S against other known approaches on secure stream processing, like S [45], MrCrypt [47] or DEFC [38]. In particular, we plan to extend S S with full automation of container deployments, as well as enriching the framework with a library of standard stream processing operators and e cient yet secure native plugins, to ease the development of complex stream processing pipelines.…”
Section: Resultsmentioning
confidence: 99%
“…S S avoids of complex encryption schemes, decrypts data entering enclaves and processes in plaintext. e S [45] system uses partial homorphic encryption to allow for e cient stream processing in trusted cloud environments. Interestingly, the authors of that system mention Intel® SGX as possible alternative to deploy stream processing systems on trusted hardware o ered by untrusted/malicious cloud environments.…”
Section: Related Workmentioning
confidence: 99%
“…Some proposals rely on a hybrid model with trusted and untrusted infrastructures, where critical processing is done in private clouds. Under this model, Styx [118] uses partial homomorphic encryption and show overheads of 25 % in comparison to Apache Storm. However, they cannot guarantee data integrity.…”
Section: Stream Processingmentioning
confidence: 99%