{"title":"Privacy-Preserving IoT Cloud Data Processing Using SGX","authors":"Pascal Gremaud, Arnaud Durand, J. Pasquier-Rocha","doi":"10.1145/3365871.3365888","DOIUrl":null,"url":null,"abstract":"This paper describes a privacy-aware ecosystem for the Internet of Things (IoT) in cloud environment. Using Intel Software Guard Extensions (SGX) technology, we present an IoT middleware solution suitable for deployment on untrusted platforms, with strong assumptions that the processed data are hidden from any unauthorized party, including the cloud provider. Clients communicate with our system using an application-layer security mechanism on top of HTTP. In order to validate our contribution, we ran performance tests which suggest that the security overhead of our system remains acceptable for real-life applications.","PeriodicalId":350460,"journal":{"name":"Proceedings of the 9th International Conference on the Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 9th International Conference on the Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3365871.3365888","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
This paper describes a privacy-aware ecosystem for the Internet of Things (IoT) in cloud environment. Using Intel Software Guard Extensions (SGX) technology, we present an IoT middleware solution suitable for deployment on untrusted platforms, with strong assumptions that the processed data are hidden from any unauthorized party, including the cloud provider. Clients communicate with our system using an application-layer security mechanism on top of HTTP. In order to validate our contribution, we ran performance tests which suggest that the security overhead of our system remains acceptable for real-life applications.