Blockchain-Assisted Distributed Fog Computing Control Flow Attestation
The control flow hijacking attack poses a serious threat to the integrity of the software. The attacker exploits the loophole to hijack the control flow of the running program to achieve the purpose of the attack. Remote control flow attestation is a method for embedded devices to ensure the integri...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2022-08, Vol.2022, p.1-17 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 17 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2022 |
creator | Li, Hongchao Shen, Tao Bai, Fenhua Gong, Bei |
description | The control flow hijacking attack poses a serious threat to the integrity of the software. The attacker exploits the loophole to hijack the control flow of the running program to achieve the purpose of the attack. Remote control flow attestation is a method for embedded devices to ensure the integrity of the software. With the continuous development of Internet of Things (IoT) technology, embedded devices have exploded. None of the existing control flow attestation schemes can adapt to the real-time attestation requests of such massive embedded devices. This paper proposes a blockchain-assisted distributed fog computing control flow attestation scheme BDFCFA to deal with this scenario. The scheme uses a simplified control flow representation model, which can effectively represent the control flow of the program and reduce the runtime overhead of the prover in the attestation process. We use SGX technology to protect the integrity and confidentiality of verifier and prover data during the attestation process. Our proposed bidirectional control flow attestation protocol based on the elliptic curve can greatly protect the communication security between verifiers and provers without incurring excessive performance overhead and communication cost. We evaluate the performance of BDFCFA through the SNU real-time benchmark and demonstrate that BDFCFA has better performance. Finally, compared to the existing remote control flow attestation scheme, the results show that BDFCFA has the highest security. |
doi_str_mv | 10.1155/2022/6128155 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2709596999</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2709596999</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-5bbae1348573db35fecab5720ea220b20f3076405cb6b96ef074a34b0b5a2bfb3</originalsourceid><addsrcrecordid>eNp9kM9LwzAYhoMoOKc3_4CCR6378qtZjnNaFQZe9BySLnWZXTOTlOF_b0uHR0_v-8HD98KD0DWGe4w5nxEgZFZgMu-PEzTBksocMCGnfx2zc3QR4xagwEywCSofGl99VRvt2nwRo4vJrrPHPoIz3dBL_5kt_W7fJdcOrU3BN1nZ-EO2SMnGpJPz7SU6q3UT7dUxp-ijfHpfvuSrt-fX5WKVV5SKlHNjtMWUzbmga0N5bSttuCBgNSFgCNQURMGAV6YwsrA1CKYpM2C4JqY2dIpuxr_74L-7fl1tfRfaflIRAZLLQkrZU3cjVQUfY7C12ge30-FHYVCDKTWYUkdTPX474hvXrvXB_U__AkYzZ90</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2709596999</pqid></control><display><type>article</type><title>Blockchain-Assisted Distributed Fog Computing Control Flow Attestation</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Wiley Online Library (Open Access Collection)</source><source>Alma/SFX Local Collection</source><creator>Li, Hongchao ; Shen, Tao ; Bai, Fenhua ; Gong, Bei</creator><contributor>Fu, AnMin ; AnMin Fu</contributor><creatorcontrib>Li, Hongchao ; Shen, Tao ; Bai, Fenhua ; Gong, Bei ; Fu, AnMin ; AnMin Fu</creatorcontrib><description>The control flow hijacking attack poses a serious threat to the integrity of the software. The attacker exploits the loophole to hijack the control flow of the running program to achieve the purpose of the attack. Remote control flow attestation is a method for embedded devices to ensure the integrity of the software. With the continuous development of Internet of Things (IoT) technology, embedded devices have exploded. None of the existing control flow attestation schemes can adapt to the real-time attestation requests of such massive embedded devices. This paper proposes a blockchain-assisted distributed fog computing control flow attestation scheme BDFCFA to deal with this scenario. The scheme uses a simplified control flow representation model, which can effectively represent the control flow of the program and reduce the runtime overhead of the prover in the attestation process. We use SGX technology to protect the integrity and confidentiality of verifier and prover data during the attestation process. Our proposed bidirectional control flow attestation protocol based on the elliptic curve can greatly protect the communication security between verifiers and provers without incurring excessive performance overhead and communication cost. We evaluate the performance of BDFCFA through the SNU real-time benchmark and demonstrate that BDFCFA has better performance. Finally, compared to the existing remote control flow attestation scheme, the results show that BDFCFA has the highest security.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2022/6128155</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Blockchain ; Cloud computing ; Code reuse ; Communication ; Computer program integrity ; Cryptography ; Curves ; Cybersecurity ; Dynamic link libraries ; Electronic devices ; Embedded systems ; Internet of Things ; Performance evaluation ; Real time ; Remote control ; Run time (computers) ; Software</subject><ispartof>Security and communication networks, 2022-08, Vol.2022, p.1-17</ispartof><rights>Copyright © 2022 Hongchao Li et al.</rights><rights>Copyright © 2022 Hongchao Li et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-5bbae1348573db35fecab5720ea220b20f3076405cb6b96ef074a34b0b5a2bfb3</citedby><cites>FETCH-LOGICAL-c337t-5bbae1348573db35fecab5720ea220b20f3076405cb6b96ef074a34b0b5a2bfb3</cites><orcidid>0000-0002-0077-1345 ; 0000-0003-1273-7950 ; 0000-0002-2505-0288</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Fu, AnMin</contributor><contributor>AnMin Fu</contributor><creatorcontrib>Li, Hongchao</creatorcontrib><creatorcontrib>Shen, Tao</creatorcontrib><creatorcontrib>Bai, Fenhua</creatorcontrib><creatorcontrib>Gong, Bei</creatorcontrib><title>Blockchain-Assisted Distributed Fog Computing Control Flow Attestation</title><title>Security and communication networks</title><description>The control flow hijacking attack poses a serious threat to the integrity of the software. The attacker exploits the loophole to hijack the control flow of the running program to achieve the purpose of the attack. Remote control flow attestation is a method for embedded devices to ensure the integrity of the software. With the continuous development of Internet of Things (IoT) technology, embedded devices have exploded. None of the existing control flow attestation schemes can adapt to the real-time attestation requests of such massive embedded devices. This paper proposes a blockchain-assisted distributed fog computing control flow attestation scheme BDFCFA to deal with this scenario. The scheme uses a simplified control flow representation model, which can effectively represent the control flow of the program and reduce the runtime overhead of the prover in the attestation process. We use SGX technology to protect the integrity and confidentiality of verifier and prover data during the attestation process. Our proposed bidirectional control flow attestation protocol based on the elliptic curve can greatly protect the communication security between verifiers and provers without incurring excessive performance overhead and communication cost. We evaluate the performance of BDFCFA through the SNU real-time benchmark and demonstrate that BDFCFA has better performance. Finally, compared to the existing remote control flow attestation scheme, the results show that BDFCFA has the highest security.</description><subject>Blockchain</subject><subject>Cloud computing</subject><subject>Code reuse</subject><subject>Communication</subject><subject>Computer program integrity</subject><subject>Cryptography</subject><subject>Curves</subject><subject>Cybersecurity</subject><subject>Dynamic link libraries</subject><subject>Electronic devices</subject><subject>Embedded systems</subject><subject>Internet of Things</subject><subject>Performance evaluation</subject><subject>Real time</subject><subject>Remote control</subject><subject>Run time (computers)</subject><subject>Software</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kM9LwzAYhoMoOKc3_4CCR6378qtZjnNaFQZe9BySLnWZXTOTlOF_b0uHR0_v-8HD98KD0DWGe4w5nxEgZFZgMu-PEzTBksocMCGnfx2zc3QR4xagwEywCSofGl99VRvt2nwRo4vJrrPHPoIz3dBL_5kt_W7fJdcOrU3BN1nZ-EO2SMnGpJPz7SU6q3UT7dUxp-ijfHpfvuSrt-fX5WKVV5SKlHNjtMWUzbmga0N5bSttuCBgNSFgCNQURMGAV6YwsrA1CKYpM2C4JqY2dIpuxr_74L-7fl1tfRfaflIRAZLLQkrZU3cjVQUfY7C12ge30-FHYVCDKTWYUkdTPX474hvXrvXB_U__AkYzZ90</recordid><startdate>20220828</startdate><enddate>20220828</enddate><creator>Li, Hongchao</creator><creator>Shen, Tao</creator><creator>Bai, Fenhua</creator><creator>Gong, Bei</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-0077-1345</orcidid><orcidid>https://orcid.org/0000-0003-1273-7950</orcidid><orcidid>https://orcid.org/0000-0002-2505-0288</orcidid></search><sort><creationdate>20220828</creationdate><title>Blockchain-Assisted Distributed Fog Computing Control Flow Attestation</title><author>Li, Hongchao ; Shen, Tao ; Bai, Fenhua ; Gong, Bei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-5bbae1348573db35fecab5720ea220b20f3076405cb6b96ef074a34b0b5a2bfb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Blockchain</topic><topic>Cloud computing</topic><topic>Code reuse</topic><topic>Communication</topic><topic>Computer program integrity</topic><topic>Cryptography</topic><topic>Curves</topic><topic>Cybersecurity</topic><topic>Dynamic link libraries</topic><topic>Electronic devices</topic><topic>Embedded systems</topic><topic>Internet of Things</topic><topic>Performance evaluation</topic><topic>Real time</topic><topic>Remote control</topic><topic>Run time (computers)</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Hongchao</creatorcontrib><creatorcontrib>Shen, Tao</creatorcontrib><creatorcontrib>Bai, Fenhua</creatorcontrib><creatorcontrib>Gong, Bei</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Hongchao</au><au>Shen, Tao</au><au>Bai, Fenhua</au><au>Gong, Bei</au><au>Fu, AnMin</au><au>AnMin Fu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Blockchain-Assisted Distributed Fog Computing Control Flow Attestation</atitle><jtitle>Security and communication networks</jtitle><date>2022-08-28</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>17</epage><pages>1-17</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>The control flow hijacking attack poses a serious threat to the integrity of the software. The attacker exploits the loophole to hijack the control flow of the running program to achieve the purpose of the attack. Remote control flow attestation is a method for embedded devices to ensure the integrity of the software. With the continuous development of Internet of Things (IoT) technology, embedded devices have exploded. None of the existing control flow attestation schemes can adapt to the real-time attestation requests of such massive embedded devices. This paper proposes a blockchain-assisted distributed fog computing control flow attestation scheme BDFCFA to deal with this scenario. The scheme uses a simplified control flow representation model, which can effectively represent the control flow of the program and reduce the runtime overhead of the prover in the attestation process. We use SGX technology to protect the integrity and confidentiality of verifier and prover data during the attestation process. Our proposed bidirectional control flow attestation protocol based on the elliptic curve can greatly protect the communication security between verifiers and provers without incurring excessive performance overhead and communication cost. We evaluate the performance of BDFCFA through the SNU real-time benchmark and demonstrate that BDFCFA has better performance. Finally, compared to the existing remote control flow attestation scheme, the results show that BDFCFA has the highest security.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2022/6128155</doi><tpages>17</tpages><orcidid>https://orcid.org/0000-0002-0077-1345</orcidid><orcidid>https://orcid.org/0000-0003-1273-7950</orcidid><orcidid>https://orcid.org/0000-0002-2505-0288</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2022-08, Vol.2022, p.1-17 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2709596999 |
source | EZB-FREE-00999 freely available EZB journals; Wiley Online Library (Open Access Collection); Alma/SFX Local Collection |
subjects | Blockchain Cloud computing Code reuse Communication Computer program integrity Cryptography Curves Cybersecurity Dynamic link libraries Electronic devices Embedded systems Internet of Things Performance evaluation Real time Remote control Run time (computers) Software |
title | Blockchain-Assisted Distributed Fog Computing Control Flow Attestation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T13%3A29%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Blockchain-Assisted%20Distributed%20Fog%20Computing%20Control%20Flow%20Attestation&rft.jtitle=Security%20and%20communication%20networks&rft.au=Li,%20Hongchao&rft.date=2022-08-28&rft.volume=2022&rft.spage=1&rft.epage=17&rft.pages=1-17&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2022/6128155&rft_dat=%3Cproquest_cross%3E2709596999%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2709596999&rft_id=info:pmid/&rfr_iscdi=true |