Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT

As an important application of the Internet of Things, many remote monitoring systems adopt a device-to-cloud network paradigm. In a remote patient monitoring case, various resource-constrained devices are used to measure the health conditions of a target patient in a distant non-clinical environmen...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2019-07, Vol.14 (7), p.1830-1842
Hauptverfasser: Chen, Yaxing, Sun, Wenhai, Zhang, Ning, Zheng, Qinghua, Lou, Wenjing, Hou, Y. Thomas
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1842
container_issue 7
container_start_page 1830
container_title IEEE transactions on information forensics and security
container_volume 14
creator Chen, Yaxing
Sun, Wenhai
Zhang, Ning
Zheng, Qinghua
Lou, Wenjing
Hou, Y. Thomas
description As an important application of the Internet of Things, many remote monitoring systems adopt a device-to-cloud network paradigm. In a remote patient monitoring case, various resource-constrained devices are used to measure the health conditions of a target patient in a distant non-clinical environment and the collected data are sent to the cloud backend of an authorized health care service for processing and decision making. As the measurements involve private patient information, access control and trustworthy processing of the confidential data become very important. Software-based solutions that adopt advanced cryptographic tools, such as attribute-based encryption and fully homomorphic encryption, can address the problem, but they also impose substantial computation overhead on both client and server sides. In this paper, we deviate from the conventional software-based solutions and propose a secure and efficient remote monitoring framework, called SRM, using the latest hardware-based trustworthy computing technology, such as Intel SGX. In addition, we present a robust and lightweight "heartbeat" protocol to handle notoriously difficult key revocation problem. We implemented a prototype of the framework for SRM and show that SRM can protect user data privacy against unauthorized parties, with minimum performance cost compared to existing software-based solutions.
doi_str_mv 10.1109/TIFS.2018.2885287
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_8566004</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8566004</ieee_id><sourcerecordid>2210021971</sourcerecordid><originalsourceid>FETCH-LOGICAL-c402t-ec7a6f178a8fe4d8d2e4069d79fd11493fbf663a22f941fed593935f511f43b53</originalsourceid><addsrcrecordid>eNo9kMFKAzEQhhdRsFYfQLwEPG_NZJNscizV1kJFset5STeJprSbmqSWvr27VDz9w_D9M_Bl2S3gEQCWD9V8uhwRDGJEhGBElGfZABjjOccEzv9nKC6zqxjXGFMKXAyyWPmDCjqiJ2td40yb0NS1Jp8F1YVG46YxMaKJb1PwG6Rajaqwj-ngQ_o6okeVFHoLvodc-4msD-jdbH0y6MW3LvnQb5cm_LgOQa5Fc19dZxdWbaK5-cth9jF9qibP-eJ1Np-MF3lDMUm5aUrFLZRCCWuoFpoYirnUpbQagMrCriznhSLESgrWaCYLWTDLACwtVqwYZvenu7vgv_cmpnrt96HtXtaEAO7EyBI6Ck5UE3yMwdh6F9xWhWMNuO7d1r3bundb_7ntOnenjjPG_POCcd6JLX4BCRV2PA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2210021971</pqid></control><display><type>article</type><title>Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT</title><source>IEEE Electronic Library (IEL)</source><creator>Chen, Yaxing ; Sun, Wenhai ; Zhang, Ning ; Zheng, Qinghua ; Lou, Wenjing ; Hou, Y. Thomas</creator><creatorcontrib>Chen, Yaxing ; Sun, Wenhai ; Zhang, Ning ; Zheng, Qinghua ; Lou, Wenjing ; Hou, Y. Thomas</creatorcontrib><description>As an important application of the Internet of Things, many remote monitoring systems adopt a device-to-cloud network paradigm. In a remote patient monitoring case, various resource-constrained devices are used to measure the health conditions of a target patient in a distant non-clinical environment and the collected data are sent to the cloud backend of an authorized health care service for processing and decision making. As the measurements involve private patient information, access control and trustworthy processing of the confidential data become very important. Software-based solutions that adopt advanced cryptographic tools, such as attribute-based encryption and fully homomorphic encryption, can address the problem, but they also impose substantial computation overhead on both client and server sides. In this paper, we deviate from the conventional software-based solutions and propose a secure and efficient remote monitoring framework, called SRM, using the latest hardware-based trustworthy computing technology, such as Intel SGX. In addition, we present a robust and lightweight "heartbeat" protocol to handle notoriously difficult key revocation problem. We implemented a prototype of the framework for SRM and show that SRM can protect user data privacy against unauthorized parties, with minimum performance cost compared to existing software-based solutions.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2018.2885287</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Access control ; Cloud computing ; Cryptography ; Data processing ; Decision making ; Encryption ; fine-grained access control ; Hardware ; Internet of Things ; Internet-of-Things (IoT) ; Patient monitoring ; Remote monitoring ; Remote patient monitoring ; secure hardware ; Software ; trusted computing ; Trustworthiness</subject><ispartof>IEEE transactions on information forensics and security, 2019-07, Vol.14 (7), p.1830-1842</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c402t-ec7a6f178a8fe4d8d2e4069d79fd11493fbf663a22f941fed593935f511f43b53</citedby><cites>FETCH-LOGICAL-c402t-ec7a6f178a8fe4d8d2e4069d79fd11493fbf663a22f941fed593935f511f43b53</cites><orcidid>0000-0003-3945-8468 ; 0000-0003-0670-2161 ; 0000-0003-3716-5768 ; 0000-0003-0458-0092</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8566004$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>315,781,785,797,27926,27927,54760</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8566004$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chen, Yaxing</creatorcontrib><creatorcontrib>Sun, Wenhai</creatorcontrib><creatorcontrib>Zhang, Ning</creatorcontrib><creatorcontrib>Zheng, Qinghua</creatorcontrib><creatorcontrib>Lou, Wenjing</creatorcontrib><creatorcontrib>Hou, Y. Thomas</creatorcontrib><title>Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>As an important application of the Internet of Things, many remote monitoring systems adopt a device-to-cloud network paradigm. In a remote patient monitoring case, various resource-constrained devices are used to measure the health conditions of a target patient in a distant non-clinical environment and the collected data are sent to the cloud backend of an authorized health care service for processing and decision making. As the measurements involve private patient information, access control and trustworthy processing of the confidential data become very important. Software-based solutions that adopt advanced cryptographic tools, such as attribute-based encryption and fully homomorphic encryption, can address the problem, but they also impose substantial computation overhead on both client and server sides. In this paper, we deviate from the conventional software-based solutions and propose a secure and efficient remote monitoring framework, called SRM, using the latest hardware-based trustworthy computing technology, such as Intel SGX. In addition, we present a robust and lightweight "heartbeat" protocol to handle notoriously difficult key revocation problem. We implemented a prototype of the framework for SRM and show that SRM can protect user data privacy against unauthorized parties, with minimum performance cost compared to existing software-based solutions.</description><subject>Access control</subject><subject>Cloud computing</subject><subject>Cryptography</subject><subject>Data processing</subject><subject>Decision making</subject><subject>Encryption</subject><subject>fine-grained access control</subject><subject>Hardware</subject><subject>Internet of Things</subject><subject>Internet-of-Things (IoT)</subject><subject>Patient monitoring</subject><subject>Remote monitoring</subject><subject>Remote patient monitoring</subject><subject>secure hardware</subject><subject>Software</subject><subject>trusted computing</subject><subject>Trustworthiness</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kMFKAzEQhhdRsFYfQLwEPG_NZJNscizV1kJFset5STeJprSbmqSWvr27VDz9w_D9M_Bl2S3gEQCWD9V8uhwRDGJEhGBElGfZABjjOccEzv9nKC6zqxjXGFMKXAyyWPmDCjqiJ2td40yb0NS1Jp8F1YVG46YxMaKJb1PwG6Rajaqwj-ngQ_o6okeVFHoLvodc-4msD-jdbH0y6MW3LvnQb5cm_LgOQa5Fc19dZxdWbaK5-cth9jF9qibP-eJ1Np-MF3lDMUm5aUrFLZRCCWuoFpoYirnUpbQagMrCriznhSLESgrWaCYLWTDLACwtVqwYZvenu7vgv_cmpnrt96HtXtaEAO7EyBI6Ck5UE3yMwdh6F9xWhWMNuO7d1r3bundb_7ntOnenjjPG_POCcd6JLX4BCRV2PA</recordid><startdate>20190701</startdate><enddate>20190701</enddate><creator>Chen, Yaxing</creator><creator>Sun, Wenhai</creator><creator>Zhang, Ning</creator><creator>Zheng, Qinghua</creator><creator>Lou, Wenjing</creator><creator>Hou, Y. Thomas</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-3945-8468</orcidid><orcidid>https://orcid.org/0000-0003-0670-2161</orcidid><orcidid>https://orcid.org/0000-0003-3716-5768</orcidid><orcidid>https://orcid.org/0000-0003-0458-0092</orcidid></search><sort><creationdate>20190701</creationdate><title>Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT</title><author>Chen, Yaxing ; Sun, Wenhai ; Zhang, Ning ; Zheng, Qinghua ; Lou, Wenjing ; Hou, Y. Thomas</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c402t-ec7a6f178a8fe4d8d2e4069d79fd11493fbf663a22f941fed593935f511f43b53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Access control</topic><topic>Cloud computing</topic><topic>Cryptography</topic><topic>Data processing</topic><topic>Decision making</topic><topic>Encryption</topic><topic>fine-grained access control</topic><topic>Hardware</topic><topic>Internet of Things</topic><topic>Internet-of-Things (IoT)</topic><topic>Patient monitoring</topic><topic>Remote monitoring</topic><topic>Remote patient monitoring</topic><topic>secure hardware</topic><topic>Software</topic><topic>trusted computing</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chen, Yaxing</creatorcontrib><creatorcontrib>Sun, Wenhai</creatorcontrib><creatorcontrib>Zhang, Ning</creatorcontrib><creatorcontrib>Zheng, Qinghua</creatorcontrib><creatorcontrib>Lou, Wenjing</creatorcontrib><creatorcontrib>Hou, Y. Thomas</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chen, Yaxing</au><au>Sun, Wenhai</au><au>Zhang, Ning</au><au>Zheng, Qinghua</au><au>Lou, Wenjing</au><au>Hou, Y. Thomas</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2019-07-01</date><risdate>2019</risdate><volume>14</volume><issue>7</issue><spage>1830</spage><epage>1842</epage><pages>1830-1842</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>As an important application of the Internet of Things, many remote monitoring systems adopt a device-to-cloud network paradigm. In a remote patient monitoring case, various resource-constrained devices are used to measure the health conditions of a target patient in a distant non-clinical environment and the collected data are sent to the cloud backend of an authorized health care service for processing and decision making. As the measurements involve private patient information, access control and trustworthy processing of the confidential data become very important. Software-based solutions that adopt advanced cryptographic tools, such as attribute-based encryption and fully homomorphic encryption, can address the problem, but they also impose substantial computation overhead on both client and server sides. In this paper, we deviate from the conventional software-based solutions and propose a secure and efficient remote monitoring framework, called SRM, using the latest hardware-based trustworthy computing technology, such as Intel SGX. In addition, we present a robust and lightweight "heartbeat" protocol to handle notoriously difficult key revocation problem. We implemented a prototype of the framework for SRM and show that SRM can protect user data privacy against unauthorized parties, with minimum performance cost compared to existing software-based solutions.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2018.2885287</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0003-3945-8468</orcidid><orcidid>https://orcid.org/0000-0003-0670-2161</orcidid><orcidid>https://orcid.org/0000-0003-3716-5768</orcidid><orcidid>https://orcid.org/0000-0003-0458-0092</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2019-07, Vol.14 (7), p.1830-1842
issn 1556-6013
1556-6021
language eng
recordid cdi_ieee_primary_8566004
source IEEE Electronic Library (IEL)
subjects Access control
Cloud computing
Cryptography
Data processing
Decision making
Encryption
fine-grained access control
Hardware
Internet of Things
Internet-of-Things (IoT)
Patient monitoring
Remote monitoring
Remote patient monitoring
secure hardware
Software
trusted computing
Trustworthiness
title Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T11%3A00%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Towards%20Efficient%20Fine-Grained%20Access%20Control%20and%20Trustworthy%20Data%20Processing%20for%20Remote%20Monitoring%20Services%20in%20IoT&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Chen,%20Yaxing&rft.date=2019-07-01&rft.volume=14&rft.issue=7&rft.spage=1830&rft.epage=1842&rft.pages=1830-1842&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2018.2885287&rft_dat=%3Cproquest_RIE%3E2210021971%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2210021971&rft_id=info:pmid/&rft_ieee_id=8566004&rfr_iscdi=true