Filters








827 Hits in 4.5 sec

Personal database security and trusted execution environments

Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, lulian Sandu Popa, Guillaume Scerri
2019 Proceedings of the VLDB Endowment  
data management solutions relevant to the personal context; (3) discuss new challenges at the intersection of PDMS security and TEE-based data management.  ...  Smart disclosure initiatives and new regulations such as GDPR in the EU increase the interest for Personal Data Management Systems (PDMS) being provided to individuals to preserve their entire digital  ...  Conclusions drawn from Parts 1 and 2 allow us to define an abstract architecture for an extensive and secure PDMS, and sketch important open research issues.  ... 
doi:10.14778/3352063.3352118 fatcat:7vb3vx5lqfd3zedwpdw7gdltee

Secure Data Processing in the Cloud [chapter]

Zoltán Ádám Mann, Eliot Salant, Mike Surridge, Dhouha Ayed, John Boyle, Maritta Heisel, Andreas Metzger, Paul Mundt
2018 Communications in Computer and Information Science  
with a combination of innovative security solutions, data lifecycle management techniques, run-time adaptation, and automated risk management.  ...  This paper gives an overview about the project's goals and current status.  ...  The research leading to these results has received funding from the European Community's Horizon 2020 research and innovation programme under grant agreement n° 731678.  ... 
doi:10.1007/978-3-319-79090-9_10 fatcat:awy36ivx6vgvff5vrsi4h7ncgy

Secure Software Defined Networks Controller Storage using Intel Software Guard Extensions

Qasmaoui Youssef, Maleh Yassine, Abdelkrim Haqiq
2020 International Journal of Advanced Computer Science and Applications  
This paper introduces an SGX enabled SDN controller.  ...  Intel's Software Guard Extension (SGX) offers a sloid layer of security applied to applications by creating a Trusted execution environment.  ...  SDN Enabled SGX Architecture SDN enabled SGX model operates as an intermediate system.  ... 
doi:10.14569/ijacsa.2020.0111060 fatcat:ro2ztj673fbzbnfndeidb4mefi

Achieving Data Dissemination with Security using FIWARE and Intel Software Guard Extensions (SGX) [article]

Dalton Cézane Gomes Valadares, Matteus Sthefano Leite da Silva, Andrey Elísio Monteiro Brito, Ewerton Monteiro Salvador
2018 arXiv   pre-print
We propose a new component for key management that, together with other FIWARE components, can be used to provide privacy, confidentiality, and integrity guarantees for IoT data.  ...  We present a solution that considers the security components of FIWARE and the Intel SGX capabilities.  ...  First, we use the Intel TEE technology, named Software Guard Extensions (SGX). We propose a component responsible for key generation, storage and management, named Key Vault.  ... 
arXiv:1806.01906v1 fatcat:zxrfeiik3vc7tpj7amoywxkbu4

LogSafe: Secure and Scalable Data Logger for IoT Devices

Hung Nguyen, Radoslav Ivanov, Linh T.X. Phan, Oleg Sokolsky, James Weimer, Insup Lee
2018 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)  
Using the security guarantees of SGX, LogSafe is designed to run on an untrusted cloud infrastructure and satisfies Confidentiality, Integrity, and Availability (CIA) security properties.  ...  Using the security guarantees of SGX, LogSafe is designed to run on an untrusted cloud infrastructure and satisfies Confidentiality, Integrity, and Availability (CIA) security properties.  ...  ACKNOWLEDGMENT This work was supported in part by NSF CNS-1505799 and the Intel-NSF Partnership for Cyber-Physical Systems Security and Privacy and by ONR N000141712012  ... 
doi:10.1109/iotdi.2018.00023 dblp:conf/iotdi/NguyenIPSWL18 fatcat:x2cmi4236rcdxhw2btw5wl5pwq

Using innovative instructions to create trustworthy software solutions

Matthew Hoekstra, Reshma Lal, Pradeep Pappachan, Vinay Phegade, Juan Del Cuvillo
2013 Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy - HASP '13  
Intel is developing innovative security technology that allows software developers control of the security of sensitive code and data by creating trusted domains within applications to protect critical  ...  This paper will show how protection of private information, including enterprise rights management, video chat, trusted financial transactions, among others, has been demonstrated using this technology  ...  Finally we wish to recognize the support of the United States Department of Homeland Security and the United States Air Force Academy in the design and prototyping of the ERM and Secure Video Conferencing  ... 
doi:10.1145/2487726.2488370 dblp:conf/isca/HoekstraLPPC13 fatcat:jbfsmq5c4feczbfmbjkdacvvnq

SecFL: Confidential Federated Learning using TEEs [article]

Do Le Quoc, Christof Fetzer
2021 arXiv   pre-print
FL helps reduce data privacy risks. Unfortunately, FL still exist several issues regarding privacy and security.  ...  Thus, all malicious clients can be detected using the remote attestation mechanisms.  ...  In SecFL, the input training data and code are encrypted using the file system shield of SCONE, and then decrypted and processed inside SGX enclaves which cannot be accessed even by strong attackers with  ... 
arXiv:2110.00981v2 fatcat:72tntbjskrakfntsztmbm2kjvy

A Distributed Access Control System for Cloud Federations

Shorouq Alansari, Federica Paci, Vladimiro Sassone
2017 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)  
The system also guarantees the integrity of the policy evaluation process by using blockchain technology and Intel SGX trusted hardware.  ...  We propose a novel identity and access management system for cloud federations.  ...  In this paper we present an identity and access management system for secure data sharing in cloud federations.  ... 
doi:10.1109/icdcs.2017.241 dblp:conf/icdcs/AlansariPS17 fatcat:pvgu2ui6kjfhzgsgfsz546s2s4

A comparison study of intel SGX and AMD memory encryption technology

Saeid Mofrad, Fengwei Zhang, Shiyong Lu, Weidong Shi
2018 Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy - HASP '18  
Recently, Intel Software Guard eXtensions (SGX) and AMD Memory Encryption Technology have been introduced.  ...  CCS CONCEPTS • Security and privacy → Security in hardware; Systems security; Hardware security implementation; KEYWORDS Intel SGX, AMD SEV, hardware-supported security ACM Reference Format: Saeid Mofrad  ...  CICI-1738929 and IIS-1724227. Weidong Shi is supported by NATO Science for Peace and Security Programme (G4919) and National Science Foundation DGE 1433817.  ... 
doi:10.1145/3214292.3214301 dblp:conf/isca/MofradZLS18 fatcat:f6w3qugembdl3kcdn7vug6f5u4

Leveraging Intel SGX to Create a Nondisclosure Cryptographic library [article]

Mohammad Hasanzadeh Mofrad, Adam Lee
2018 arXiv   pre-print
Intel Software Guard Extension (Intel SGX) is an Intel technology for developers who are looking to protect their software binaries from plausible attacks using hardware instructions.  ...  In this project we leverage the Intel SGX to produce a secure cryptographic library which keeps the generated keys inside an enclave restricting use and dissemination of confidential cryptographic keys  ...  On the other hand, combining TXT with Intel Virtual Machine Extension (VMX) allows system developers to create secure operating systems.  ... 
arXiv:1705.04706v3 fatcat:nkxwc3u2cbfkvnk4llqieh6j2y

Secure IoT Data Analytics in Cloud via Intel SGX [article]

Md Shihabul Islam, Mustafa Safa Ozdayi, Latifur Khan, Murat Kantarcioglu
2020 arXiv   pre-print
We evaluate the framework by executing rule-based programs in the SGX securely with both simulated and real IoT device data.  ...  The growing adoption of IoT devices in our daily life is engendering a data deluge, mostly private information that needs careful maintenance and secure storage system to ensure data integrity and protection  ...  supported in part by NIH award 1R01HG006844, NSF awards CICI-1547324, IIS-1633331, CNS-1837627, OAC-1828467, DMS-1737978, DGE-2039542, MRI-1828467, ARO award W911NF-17-1-0356, FAIN award number 1906630, and  ... 
arXiv:2008.05286v1 fatcat:43bc5a24tneazipvhrfysypaqu

Performance Principles for Trusted Computing with Intel SGX [chapter]

Anders T. Gjerdrum, Robert Pettersen, Håvard D. Johansen, Dag Johansen
2018 Communications in Computer and Information Science  
This paper investigates and demonstrates the added cost of using SGX, and further argues that great care must be taken when designing system software in order to avoid the performance penalty incurred  ...  Personal data is often accompanied by strict privacy and security policies, requiring data processing to be governed by nontrivial enforcement mechanisms.  ...  We would like to thank Robbert van Renesse for his insights and discussions, and anonymous reviewers for their useful insights and comments.  ... 
doi:10.1007/978-3-319-94959-8_1 fatcat:ulk2ugzopzgqjfur2x6jbiuezy

D4.3 - Interoperability of ITEEs in the context of eHealth systems

RISE Research Institutes Of Sweden AB, University Of Westminster
2020 Zenodo  
This deliverable contains a framework of components and enablers to facilitate the development of applications that are portable across ITEEs from different vendors and effectively address the security  ...  needs specific to the context of eHealth systems.  ...  users benefit from greater simplicity, convenience, security and privacy for their digital services and personal data.  ... 
doi:10.5281/zenodo.4022371 fatcat:3jzz7scyqbfszokkbte4lc7mlu

On the Trade-Offs of Combining Multiple Secure Processing Primitives for Data Analytics [chapter]

Hugo Carvalho, Daniel Cruz, Rogério Pontes, João Paulo, Rui Oliveira
2020 Lecture Notes in Computer Science  
SafeSpark is modular and extensible therefore adapting to data analytics applications with different performance, security and functionality requirements.  ...  To this end, different secure analytics techniques and systems have recently emerged.  ...  The research leading to these results has received funding from the European Union's Horizon 2020 -The EU Framework Programme for Research and Innovation 2014-2020, under grant agreement No. 857237 and  ... 
doi:10.1007/978-3-030-50323-9_1 fatcat:rbzfhfnrk5hobkfw26kfswgrs4

Building and Maintaining a Third-Party Library Supply Chain for Productive and Secure SGX Enclave Development [article]

Pei Wang, Yu Ding, Mingshen Sun, Huibo Wang, Tongxin Li, Rundong Zhou, Zhaofeng Chen, Yiming Jing
2020 arXiv   pre-print
Our work can effectively reduce the engineering cost of developing SGX enclaves for privacy-preserving data processing and exchange.  ...  Our supply chain accepts upstream patches in a timely manner with SGX-specific security auditing.  ...  The societal and economical benefits of analyzing large volumes of real-world data have led to personal data being collected and transferred at an unprecedented scale.  ... 
arXiv:2005.04367v1 fatcat:qsshclabdfannipde426joqcni
« Previous Showing results 1 — 15 out of 827 results