IoT Notary: Attestable Sensor Data Capture in IoT Environments
PanwarNisha,SharmaShantanu,WangGuoxi,MehrotraSharad,VenkatasubramanianNalini,H DialloMamadou,SaniArdalan Amiri +6 more
- Vol. 3, Iss: 1, pp 1-30
Reads0
Chats0
TLDR
In this article, the authors argue that end-users need to trust data-capturing rules published by the systems, and that such a trust is misplaced in the context of smart buildings.Abstract:
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced—IoT systems...read more
Citations
More filters
Journal ArticleDOI
Data Station: Delegated, Trustworthy, and Auditable Computation to Enable Data-Sharing Consortia with a Data Escrow
Siyuan Xia,Zhirui Zhu,Chris Zhu,Jinjin Zhao,Kyle Chard,Aaron J. Elmore,Ian Foster,Michael,Franklin,Sanjay Krishnan,Raul Fernandez +10 more
TL;DR: Data Station is introduced, a data escrow designed to enable the formation of data-sharing consortia with a Data Escrow that outperforms federated learning baselines in accuracy and runtime for the machine learning application and is orders of magnitude faster than alternative secure data- sharing frameworks.
Journal ArticleDOI
Data station
TL;DR: Data Station as discussed by the authors is a data escrow designed to enable the formation of data-sharing consortia, where data owners share data with the escrow knowing it will not be released without their consent.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
Internet of Things (IoT): A vision, architectural elements, and future directions
TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Posted Content
Intel SGX Explained.
Victor Costan,Srinivas Devadas +1 more
TL;DR: In this article, the authors present a detailed and structured presentation of the publicly available information on SGX, a series of intelligent guesses about some important but undocumented aspects of SGX.
Journal ArticleDOI
Securing the Internet of Things: A Standardization Perspective
TL;DR: An in-depth review of the communication security solutions for IoT, specifically the standard security protocols to be used in conjunction with the Constrained Application Protocol (CoAP), an application protocol specifically tailored to the needs of adapting to the constraints of IoT devices.
Journal ArticleDOI
Preserving privacy in environments with location-based applications
TL;DR: A mechanism that lets users automate control of their location information, thereby minimizing the extent to which the system intrudes on their lives is proposed.