Talos: Encrypted Query Processing for the Internet of Things

作者: Hossein Shafagh , Anwar Hithnawi , Andreas Droescher , Simon Duquennoy , Wen Hu

DOI: 10.1145/2809695.2809723

关键词:

摘要: The Internet of Things, by digitizing the physical world, is envisioned to enable novel interaction paradigms with our surroundings. This creates new threats and leads unprecedented security privacy concerns. To tackle these concerns, we introduce Talos, a system that stores IoT data securely in Cloud database while still allowing query processing over encrypted data. We this encrypting set cryptographic schemes such as order-preserving partially homomorphic encryption. In order achieve constrained devices, Talos relies on optimized algorithms accelerate encryption 1 2 orders magnitude. assess feasibility low-power devices without accelerators quantify its overhead terms energy, computation, latency. With thorough evaluation prototype implementation, show practical can provide high level reasonable overhead. envision an enabler secure applications.

参考文章(53)
Brian King, Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF(2^n). International Journal of Network Security. ,vol. 8, pp. 169- 176 ,(2009)
Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu, Private database queries using somewhat homomorphic encryption applied cryptography and network security. pp. 102- 118 ,(2013) , 10.1007/978-3-642-38980-1_7
Dan Boneh, Craig Gentry, A fully homomorphic encryption scheme Stanford University. ,(2009)
Tahmineh Sanamrad, Lucas Braun, Donald Kossmann, Ramarathnam Venkatesan, Randomly Partitioned Encryption for Cloud Databases Lecture Notes in Computer Science. pp. 307- 323 ,(2014) , 10.1007/978-3-662-43936-4_20
Wen Hu, Peter Corke, Wen Chan Shih, Leslie Overs, secFleck: A Public Key Technology Platform for Wireless Sensor Networks international conference on embedded wireless systems and networks. pp. 296- 311 ,(2009) , 10.1007/978-3-642-00224-3_19
Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman, Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation theory and application of cryptographic techniques. pp. 563- 594 ,(2015) , 10.1007/978-3-662-46803-6_19
Mihir Bellare, Alexandra Boldyreva, Adam O’Neill, Deterministic and Efficiently Searchable Encryption Advances in Cryptology - CRYPTO 2007. pp. 535- 552 ,(2007) , 10.1007/978-3-540-74143-5_30
Piotr Szczechowiak, Leonardo B. Oliveira, Michael Scott, Martin Collier, Ricardo Dahab, NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks Lecture Notes in Computer Science. pp. 305- 320 ,(2008) , 10.1007/978-3-540-77690-1_19
Bruce Schneier, Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) fast software encryption. pp. 191- 204 ,(1993) , 10.1007/3-540-58108-1_24
Nickolai Zeldovich, Raluca Ada Popa, Hari Balakrishnan, Steven Valdez, Jonas Helfer, Emily Stark, M. Frans Kaashoek, Building web applications on top of encrypted data using Mylar networked systems design and implementation. pp. 157- 172 ,(2014) , 10.5555/2616448.2616464