Christian Meurisch, Bekir Bayrak, Florian Giger, M. Mühlhäuser
{"title":"PDSProxy: Trusted IoT Proxies for Confidential Ad-hoc Personalization of AI Services","authors":"Christian Meurisch, Bekir Bayrak, Florian Giger, M. Mühlhäuser","doi":"10.1109/ICCCN49398.2020.9209655","DOIUrl":null,"url":null,"abstract":"Personal data stores (PDS) typically provide internal confidential processing mechanisms for personalizing AI services. However, these mechanisms cannot be easily applied when AI services are required to run outside a user’s PDS on third-party IoT devices. This paper closes this gap by presenting PDSProxy— an extension for external confidential processing on untrusted devices, newly enabling the secure transmission of personal data over hierarchically operating un-/trusted nodes. Our evaluation shows the feasibility of PDSProxy with reasonable overhead.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN49398.2020.9209655","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Personal data stores (PDS) typically provide internal confidential processing mechanisms for personalizing AI services. However, these mechanisms cannot be easily applied when AI services are required to run outside a user’s PDS on third-party IoT devices. This paper closes this gap by presenting PDSProxy— an extension for external confidential processing on untrusted devices, newly enabling the secure transmission of personal data over hierarchically operating un-/trusted nodes. Our evaluation shows the feasibility of PDSProxy with reasonable overhead.