Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT
As an important application of the Internet of Things, many remote monitoring systems adopt a device-to-cloud network paradigm. In a remote patient monitoring case, various resource-constrained devices are used to measure the health conditions of a target patient in a distant non-clinical environmen...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2019-07, Vol.14 (7), p.1830-1842 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1842 |
---|---|
container_issue | 7 |
container_start_page | 1830 |
container_title | IEEE transactions on information forensics and security |
container_volume | 14 |
creator | Chen, Yaxing Sun, Wenhai Zhang, Ning Zheng, Qinghua Lou, Wenjing Hou, Y. Thomas |
description | As an important application of the Internet of Things, many remote monitoring systems adopt a device-to-cloud network paradigm. In a remote patient monitoring case, various resource-constrained devices are used to measure the health conditions of a target patient in a distant non-clinical environment and the collected data are sent to the cloud backend of an authorized health care service for processing and decision making. As the measurements involve private patient information, access control and trustworthy processing of the confidential data become very important. Software-based solutions that adopt advanced cryptographic tools, such as attribute-based encryption and fully homomorphic encryption, can address the problem, but they also impose substantial computation overhead on both client and server sides. In this paper, we deviate from the conventional software-based solutions and propose a secure and efficient remote monitoring framework, called SRM, using the latest hardware-based trustworthy computing technology, such as Intel SGX. In addition, we present a robust and lightweight "heartbeat" protocol to handle notoriously difficult key revocation problem. We implemented a prototype of the framework for SRM and show that SRM can protect user data privacy against unauthorized parties, with minimum performance cost compared to existing software-based solutions. |
doi_str_mv | 10.1109/TIFS.2018.2885287 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_8566004</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8566004</ieee_id><sourcerecordid>2210021971</sourcerecordid><originalsourceid>FETCH-LOGICAL-c402t-ec7a6f178a8fe4d8d2e4069d79fd11493fbf663a22f941fed593935f511f43b53</originalsourceid><addsrcrecordid>eNo9kMFKAzEQhhdRsFYfQLwEPG_NZJNscizV1kJFset5STeJprSbmqSWvr27VDz9w_D9M_Bl2S3gEQCWD9V8uhwRDGJEhGBElGfZABjjOccEzv9nKC6zqxjXGFMKXAyyWPmDCjqiJ2td40yb0NS1Jp8F1YVG46YxMaKJb1PwG6Rajaqwj-ngQ_o6okeVFHoLvodc-4msD-jdbH0y6MW3LvnQb5cm_LgOQa5Fc19dZxdWbaK5-cth9jF9qibP-eJ1Np-MF3lDMUm5aUrFLZRCCWuoFpoYirnUpbQagMrCriznhSLESgrWaCYLWTDLACwtVqwYZvenu7vgv_cmpnrt96HtXtaEAO7EyBI6Ck5UE3yMwdh6F9xWhWMNuO7d1r3bundb_7ntOnenjjPG_POCcd6JLX4BCRV2PA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2210021971</pqid></control><display><type>article</type><title>Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT</title><source>IEEE Electronic Library (IEL)</source><creator>Chen, Yaxing ; Sun, Wenhai ; Zhang, Ning ; Zheng, Qinghua ; Lou, Wenjing ; Hou, Y. Thomas</creator><creatorcontrib>Chen, Yaxing ; Sun, Wenhai ; Zhang, Ning ; Zheng, Qinghua ; Lou, Wenjing ; Hou, Y. Thomas</creatorcontrib><description>As an important application of the Internet of Things, many remote monitoring systems adopt a device-to-cloud network paradigm. In a remote patient monitoring case, various resource-constrained devices are used to measure the health conditions of a target patient in a distant non-clinical environment and the collected data are sent to the cloud backend of an authorized health care service for processing and decision making. As the measurements involve private patient information, access control and trustworthy processing of the confidential data become very important. Software-based solutions that adopt advanced cryptographic tools, such as attribute-based encryption and fully homomorphic encryption, can address the problem, but they also impose substantial computation overhead on both client and server sides. In this paper, we deviate from the conventional software-based solutions and propose a secure and efficient remote monitoring framework, called SRM, using the latest hardware-based trustworthy computing technology, such as Intel SGX. In addition, we present a robust and lightweight "heartbeat" protocol to handle notoriously difficult key revocation problem. We implemented a prototype of the framework for SRM and show that SRM can protect user data privacy against unauthorized parties, with minimum performance cost compared to existing software-based solutions.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2018.2885287</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Access control ; Cloud computing ; Cryptography ; Data processing ; Decision making ; Encryption ; fine-grained access control ; Hardware ; Internet of Things ; Internet-of-Things (IoT) ; Patient monitoring ; Remote monitoring ; Remote patient monitoring ; secure hardware ; Software ; trusted computing ; Trustworthiness</subject><ispartof>IEEE transactions on information forensics and security, 2019-07, Vol.14 (7), p.1830-1842</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c402t-ec7a6f178a8fe4d8d2e4069d79fd11493fbf663a22f941fed593935f511f43b53</citedby><cites>FETCH-LOGICAL-c402t-ec7a6f178a8fe4d8d2e4069d79fd11493fbf663a22f941fed593935f511f43b53</cites><orcidid>0000-0003-3945-8468 ; 0000-0003-0670-2161 ; 0000-0003-3716-5768 ; 0000-0003-0458-0092</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8566004$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>315,781,785,797,27926,27927,54760</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8566004$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chen, Yaxing</creatorcontrib><creatorcontrib>Sun, Wenhai</creatorcontrib><creatorcontrib>Zhang, Ning</creatorcontrib><creatorcontrib>Zheng, Qinghua</creatorcontrib><creatorcontrib>Lou, Wenjing</creatorcontrib><creatorcontrib>Hou, Y. Thomas</creatorcontrib><title>Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>As an important application of the Internet of Things, many remote monitoring systems adopt a device-to-cloud network paradigm. In a remote patient monitoring case, various resource-constrained devices are used to measure the health conditions of a target patient in a distant non-clinical environment and the collected data are sent to the cloud backend of an authorized health care service for processing and decision making. As the measurements involve private patient information, access control and trustworthy processing of the confidential data become very important. Software-based solutions that adopt advanced cryptographic tools, such as attribute-based encryption and fully homomorphic encryption, can address the problem, but they also impose substantial computation overhead on both client and server sides. In this paper, we deviate from the conventional software-based solutions and propose a secure and efficient remote monitoring framework, called SRM, using the latest hardware-based trustworthy computing technology, such as Intel SGX. In addition, we present a robust and lightweight "heartbeat" protocol to handle notoriously difficult key revocation problem. We implemented a prototype of the framework for SRM and show that SRM can protect user data privacy against unauthorized parties, with minimum performance cost compared to existing software-based solutions.</description><subject>Access control</subject><subject>Cloud computing</subject><subject>Cryptography</subject><subject>Data processing</subject><subject>Decision making</subject><subject>Encryption</subject><subject>fine-grained access control</subject><subject>Hardware</subject><subject>Internet of Things</subject><subject>Internet-of-Things (IoT)</subject><subject>Patient monitoring</subject><subject>Remote monitoring</subject><subject>Remote patient monitoring</subject><subject>secure hardware</subject><subject>Software</subject><subject>trusted computing</subject><subject>Trustworthiness</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kMFKAzEQhhdRsFYfQLwEPG_NZJNscizV1kJFset5STeJprSbmqSWvr27VDz9w_D9M_Bl2S3gEQCWD9V8uhwRDGJEhGBElGfZABjjOccEzv9nKC6zqxjXGFMKXAyyWPmDCjqiJ2td40yb0NS1Jp8F1YVG46YxMaKJb1PwG6Rajaqwj-ngQ_o6okeVFHoLvodc-4msD-jdbH0y6MW3LvnQb5cm_LgOQa5Fc19dZxdWbaK5-cth9jF9qibP-eJ1Np-MF3lDMUm5aUrFLZRCCWuoFpoYirnUpbQagMrCriznhSLESgrWaCYLWTDLACwtVqwYZvenu7vgv_cmpnrt96HtXtaEAO7EyBI6Ck5UE3yMwdh6F9xWhWMNuO7d1r3bundb_7ntOnenjjPG_POCcd6JLX4BCRV2PA</recordid><startdate>20190701</startdate><enddate>20190701</enddate><creator>Chen, Yaxing</creator><creator>Sun, Wenhai</creator><creator>Zhang, Ning</creator><creator>Zheng, Qinghua</creator><creator>Lou, Wenjing</creator><creator>Hou, Y. Thomas</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-3945-8468</orcidid><orcidid>https://orcid.org/0000-0003-0670-2161</orcidid><orcidid>https://orcid.org/0000-0003-3716-5768</orcidid><orcidid>https://orcid.org/0000-0003-0458-0092</orcidid></search><sort><creationdate>20190701</creationdate><title>Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT</title><author>Chen, Yaxing ; Sun, Wenhai ; Zhang, Ning ; Zheng, Qinghua ; Lou, Wenjing ; Hou, Y. Thomas</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c402t-ec7a6f178a8fe4d8d2e4069d79fd11493fbf663a22f941fed593935f511f43b53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Access control</topic><topic>Cloud computing</topic><topic>Cryptography</topic><topic>Data processing</topic><topic>Decision making</topic><topic>Encryption</topic><topic>fine-grained access control</topic><topic>Hardware</topic><topic>Internet of Things</topic><topic>Internet-of-Things (IoT)</topic><topic>Patient monitoring</topic><topic>Remote monitoring</topic><topic>Remote patient monitoring</topic><topic>secure hardware</topic><topic>Software</topic><topic>trusted computing</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chen, Yaxing</creatorcontrib><creatorcontrib>Sun, Wenhai</creatorcontrib><creatorcontrib>Zhang, Ning</creatorcontrib><creatorcontrib>Zheng, Qinghua</creatorcontrib><creatorcontrib>Lou, Wenjing</creatorcontrib><creatorcontrib>Hou, Y. Thomas</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chen, Yaxing</au><au>Sun, Wenhai</au><au>Zhang, Ning</au><au>Zheng, Qinghua</au><au>Lou, Wenjing</au><au>Hou, Y. Thomas</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2019-07-01</date><risdate>2019</risdate><volume>14</volume><issue>7</issue><spage>1830</spage><epage>1842</epage><pages>1830-1842</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>As an important application of the Internet of Things, many remote monitoring systems adopt a device-to-cloud network paradigm. In a remote patient monitoring case, various resource-constrained devices are used to measure the health conditions of a target patient in a distant non-clinical environment and the collected data are sent to the cloud backend of an authorized health care service for processing and decision making. As the measurements involve private patient information, access control and trustworthy processing of the confidential data become very important. Software-based solutions that adopt advanced cryptographic tools, such as attribute-based encryption and fully homomorphic encryption, can address the problem, but they also impose substantial computation overhead on both client and server sides. In this paper, we deviate from the conventional software-based solutions and propose a secure and efficient remote monitoring framework, called SRM, using the latest hardware-based trustworthy computing technology, such as Intel SGX. In addition, we present a robust and lightweight "heartbeat" protocol to handle notoriously difficult key revocation problem. We implemented a prototype of the framework for SRM and show that SRM can protect user data privacy against unauthorized parties, with minimum performance cost compared to existing software-based solutions.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2018.2885287</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0003-3945-8468</orcidid><orcidid>https://orcid.org/0000-0003-0670-2161</orcidid><orcidid>https://orcid.org/0000-0003-3716-5768</orcidid><orcidid>https://orcid.org/0000-0003-0458-0092</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2019-07, Vol.14 (7), p.1830-1842 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_ieee_primary_8566004 |
source | IEEE Electronic Library (IEL) |
subjects | Access control Cloud computing Cryptography Data processing Decision making Encryption fine-grained access control Hardware Internet of Things Internet-of-Things (IoT) Patient monitoring Remote monitoring Remote patient monitoring secure hardware Software trusted computing Trustworthiness |
title | Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T11%3A00%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Towards%20Efficient%20Fine-Grained%20Access%20Control%20and%20Trustworthy%20Data%20Processing%20for%20Remote%20Monitoring%20Services%20in%20IoT&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Chen,%20Yaxing&rft.date=2019-07-01&rft.volume=14&rft.issue=7&rft.spage=1830&rft.epage=1842&rft.pages=1830-1842&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2018.2885287&rft_dat=%3Cproquest_RIE%3E2210021971%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2210021971&rft_id=info:pmid/&rft_ieee_id=8566004&rfr_iscdi=true |