Blockchain-Assisted Distributed Fog Computing Control Flow Attestation

The control flow hijacking attack poses a serious threat to the integrity of the software. The attacker exploits the loophole to hijack the control flow of the running program to achieve the purpose of the attack. Remote control flow attestation is a method for embedded devices to ensure the integri...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2022-08, Vol.2022, p.1-17
Hauptverfasser: Li, Hongchao, Shen, Tao, Bai, Fenhua, Gong, Bei
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 17
container_issue
container_start_page 1
container_title Security and communication networks
container_volume 2022
creator Li, Hongchao
Shen, Tao
Bai, Fenhua
Gong, Bei
description The control flow hijacking attack poses a serious threat to the integrity of the software. The attacker exploits the loophole to hijack the control flow of the running program to achieve the purpose of the attack. Remote control flow attestation is a method for embedded devices to ensure the integrity of the software. With the continuous development of Internet of Things (IoT) technology, embedded devices have exploded. None of the existing control flow attestation schemes can adapt to the real-time attestation requests of such massive embedded devices. This paper proposes a blockchain-assisted distributed fog computing control flow attestation scheme BDFCFA to deal with this scenario. The scheme uses a simplified control flow representation model, which can effectively represent the control flow of the program and reduce the runtime overhead of the prover in the attestation process. We use SGX technology to protect the integrity and confidentiality of verifier and prover data during the attestation process. Our proposed bidirectional control flow attestation protocol based on the elliptic curve can greatly protect the communication security between verifiers and provers without incurring excessive performance overhead and communication cost. We evaluate the performance of BDFCFA through the SNU real-time benchmark and demonstrate that BDFCFA has better performance. Finally, compared to the existing remote control flow attestation scheme, the results show that BDFCFA has the highest security.
doi_str_mv 10.1155/2022/6128155
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2709596999</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2709596999</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-5bbae1348573db35fecab5720ea220b20f3076405cb6b96ef074a34b0b5a2bfb3</originalsourceid><addsrcrecordid>eNp9kM9LwzAYhoMoOKc3_4CCR6378qtZjnNaFQZe9BySLnWZXTOTlOF_b0uHR0_v-8HD98KD0DWGe4w5nxEgZFZgMu-PEzTBksocMCGnfx2zc3QR4xagwEywCSofGl99VRvt2nwRo4vJrrPHPoIz3dBL_5kt_W7fJdcOrU3BN1nZ-EO2SMnGpJPz7SU6q3UT7dUxp-ijfHpfvuSrt-fX5WKVV5SKlHNjtMWUzbmga0N5bSttuCBgNSFgCNQURMGAV6YwsrA1CKYpM2C4JqY2dIpuxr_74L-7fl1tfRfaflIRAZLLQkrZU3cjVQUfY7C12ge30-FHYVCDKTWYUkdTPX474hvXrvXB_U__AkYzZ90</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2709596999</pqid></control><display><type>article</type><title>Blockchain-Assisted Distributed Fog Computing Control Flow Attestation</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Wiley Online Library (Open Access Collection)</source><source>Alma/SFX Local Collection</source><creator>Li, Hongchao ; Shen, Tao ; Bai, Fenhua ; Gong, Bei</creator><contributor>Fu, AnMin ; AnMin Fu</contributor><creatorcontrib>Li, Hongchao ; Shen, Tao ; Bai, Fenhua ; Gong, Bei ; Fu, AnMin ; AnMin Fu</creatorcontrib><description>The control flow hijacking attack poses a serious threat to the integrity of the software. The attacker exploits the loophole to hijack the control flow of the running program to achieve the purpose of the attack. Remote control flow attestation is a method for embedded devices to ensure the integrity of the software. With the continuous development of Internet of Things (IoT) technology, embedded devices have exploded. None of the existing control flow attestation schemes can adapt to the real-time attestation requests of such massive embedded devices. This paper proposes a blockchain-assisted distributed fog computing control flow attestation scheme BDFCFA to deal with this scenario. The scheme uses a simplified control flow representation model, which can effectively represent the control flow of the program and reduce the runtime overhead of the prover in the attestation process. We use SGX technology to protect the integrity and confidentiality of verifier and prover data during the attestation process. Our proposed bidirectional control flow attestation protocol based on the elliptic curve can greatly protect the communication security between verifiers and provers without incurring excessive performance overhead and communication cost. We evaluate the performance of BDFCFA through the SNU real-time benchmark and demonstrate that BDFCFA has better performance. Finally, compared to the existing remote control flow attestation scheme, the results show that BDFCFA has the highest security.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2022/6128155</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Blockchain ; Cloud computing ; Code reuse ; Communication ; Computer program integrity ; Cryptography ; Curves ; Cybersecurity ; Dynamic link libraries ; Electronic devices ; Embedded systems ; Internet of Things ; Performance evaluation ; Real time ; Remote control ; Run time (computers) ; Software</subject><ispartof>Security and communication networks, 2022-08, Vol.2022, p.1-17</ispartof><rights>Copyright © 2022 Hongchao Li et al.</rights><rights>Copyright © 2022 Hongchao Li et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-5bbae1348573db35fecab5720ea220b20f3076405cb6b96ef074a34b0b5a2bfb3</citedby><cites>FETCH-LOGICAL-c337t-5bbae1348573db35fecab5720ea220b20f3076405cb6b96ef074a34b0b5a2bfb3</cites><orcidid>0000-0002-0077-1345 ; 0000-0003-1273-7950 ; 0000-0002-2505-0288</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Fu, AnMin</contributor><contributor>AnMin Fu</contributor><creatorcontrib>Li, Hongchao</creatorcontrib><creatorcontrib>Shen, Tao</creatorcontrib><creatorcontrib>Bai, Fenhua</creatorcontrib><creatorcontrib>Gong, Bei</creatorcontrib><title>Blockchain-Assisted Distributed Fog Computing Control Flow Attestation</title><title>Security and communication networks</title><description>The control flow hijacking attack poses a serious threat to the integrity of the software. The attacker exploits the loophole to hijack the control flow of the running program to achieve the purpose of the attack. Remote control flow attestation is a method for embedded devices to ensure the integrity of the software. With the continuous development of Internet of Things (IoT) technology, embedded devices have exploded. None of the existing control flow attestation schemes can adapt to the real-time attestation requests of such massive embedded devices. This paper proposes a blockchain-assisted distributed fog computing control flow attestation scheme BDFCFA to deal with this scenario. The scheme uses a simplified control flow representation model, which can effectively represent the control flow of the program and reduce the runtime overhead of the prover in the attestation process. We use SGX technology to protect the integrity and confidentiality of verifier and prover data during the attestation process. Our proposed bidirectional control flow attestation protocol based on the elliptic curve can greatly protect the communication security between verifiers and provers without incurring excessive performance overhead and communication cost. We evaluate the performance of BDFCFA through the SNU real-time benchmark and demonstrate that BDFCFA has better performance. Finally, compared to the existing remote control flow attestation scheme, the results show that BDFCFA has the highest security.</description><subject>Blockchain</subject><subject>Cloud computing</subject><subject>Code reuse</subject><subject>Communication</subject><subject>Computer program integrity</subject><subject>Cryptography</subject><subject>Curves</subject><subject>Cybersecurity</subject><subject>Dynamic link libraries</subject><subject>Electronic devices</subject><subject>Embedded systems</subject><subject>Internet of Things</subject><subject>Performance evaluation</subject><subject>Real time</subject><subject>Remote control</subject><subject>Run time (computers)</subject><subject>Software</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kM9LwzAYhoMoOKc3_4CCR6378qtZjnNaFQZe9BySLnWZXTOTlOF_b0uHR0_v-8HD98KD0DWGe4w5nxEgZFZgMu-PEzTBksocMCGnfx2zc3QR4xagwEywCSofGl99VRvt2nwRo4vJrrPHPoIz3dBL_5kt_W7fJdcOrU3BN1nZ-EO2SMnGpJPz7SU6q3UT7dUxp-ijfHpfvuSrt-fX5WKVV5SKlHNjtMWUzbmga0N5bSttuCBgNSFgCNQURMGAV6YwsrA1CKYpM2C4JqY2dIpuxr_74L-7fl1tfRfaflIRAZLLQkrZU3cjVQUfY7C12ge30-FHYVCDKTWYUkdTPX474hvXrvXB_U__AkYzZ90</recordid><startdate>20220828</startdate><enddate>20220828</enddate><creator>Li, Hongchao</creator><creator>Shen, Tao</creator><creator>Bai, Fenhua</creator><creator>Gong, Bei</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-0077-1345</orcidid><orcidid>https://orcid.org/0000-0003-1273-7950</orcidid><orcidid>https://orcid.org/0000-0002-2505-0288</orcidid></search><sort><creationdate>20220828</creationdate><title>Blockchain-Assisted Distributed Fog Computing Control Flow Attestation</title><author>Li, Hongchao ; Shen, Tao ; Bai, Fenhua ; Gong, Bei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-5bbae1348573db35fecab5720ea220b20f3076405cb6b96ef074a34b0b5a2bfb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Blockchain</topic><topic>Cloud computing</topic><topic>Code reuse</topic><topic>Communication</topic><topic>Computer program integrity</topic><topic>Cryptography</topic><topic>Curves</topic><topic>Cybersecurity</topic><topic>Dynamic link libraries</topic><topic>Electronic devices</topic><topic>Embedded systems</topic><topic>Internet of Things</topic><topic>Performance evaluation</topic><topic>Real time</topic><topic>Remote control</topic><topic>Run time (computers)</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Hongchao</creatorcontrib><creatorcontrib>Shen, Tao</creatorcontrib><creatorcontrib>Bai, Fenhua</creatorcontrib><creatorcontrib>Gong, Bei</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Hongchao</au><au>Shen, Tao</au><au>Bai, Fenhua</au><au>Gong, Bei</au><au>Fu, AnMin</au><au>AnMin Fu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Blockchain-Assisted Distributed Fog Computing Control Flow Attestation</atitle><jtitle>Security and communication networks</jtitle><date>2022-08-28</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>17</epage><pages>1-17</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>The control flow hijacking attack poses a serious threat to the integrity of the software. The attacker exploits the loophole to hijack the control flow of the running program to achieve the purpose of the attack. Remote control flow attestation is a method for embedded devices to ensure the integrity of the software. With the continuous development of Internet of Things (IoT) technology, embedded devices have exploded. None of the existing control flow attestation schemes can adapt to the real-time attestation requests of such massive embedded devices. This paper proposes a blockchain-assisted distributed fog computing control flow attestation scheme BDFCFA to deal with this scenario. The scheme uses a simplified control flow representation model, which can effectively represent the control flow of the program and reduce the runtime overhead of the prover in the attestation process. We use SGX technology to protect the integrity and confidentiality of verifier and prover data during the attestation process. Our proposed bidirectional control flow attestation protocol based on the elliptic curve can greatly protect the communication security between verifiers and provers without incurring excessive performance overhead and communication cost. We evaluate the performance of BDFCFA through the SNU real-time benchmark and demonstrate that BDFCFA has better performance. Finally, compared to the existing remote control flow attestation scheme, the results show that BDFCFA has the highest security.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2022/6128155</doi><tpages>17</tpages><orcidid>https://orcid.org/0000-0002-0077-1345</orcidid><orcidid>https://orcid.org/0000-0003-1273-7950</orcidid><orcidid>https://orcid.org/0000-0002-2505-0288</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2022-08, Vol.2022, p.1-17
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2709596999
source EZB-FREE-00999 freely available EZB journals; Wiley Online Library (Open Access Collection); Alma/SFX Local Collection
subjects Blockchain
Cloud computing
Code reuse
Communication
Computer program integrity
Cryptography
Curves
Cybersecurity
Dynamic link libraries
Electronic devices
Embedded systems
Internet of Things
Performance evaluation
Real time
Remote control
Run time (computers)
Software
title Blockchain-Assisted Distributed Fog Computing Control Flow Attestation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T13%3A29%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Blockchain-Assisted%20Distributed%20Fog%20Computing%20Control%20Flow%20Attestation&rft.jtitle=Security%20and%20communication%20networks&rft.au=Li,%20Hongchao&rft.date=2022-08-28&rft.volume=2022&rft.spage=1&rft.epage=17&rft.pages=1-17&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2022/6128155&rft_dat=%3Cproquest_cross%3E2709596999%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2709596999&rft_id=info:pmid/&rfr_iscdi=true