Secure IoT Stream Data Management and Analytics with Intel SGX
Abstract
Index Terms
- Secure IoT Stream Data Management and Analytics with Intel SGX
Recommendations
SGX-PySpark: Secure Distributed Data Analytics
WWW '19: The World Wide Web ConferenceData analytics is central to modern online services, particularly those data-driven. Often this entails the processing of large-scale datasets which may contain private, personal and sensitive information relating to individuals and organisations. ...
Cache Attacks on Intel SGX
EuroSec'17: Proceedings of the 10th European Workshop on Systems SecurityFor the first time, we practically demonstrate that Intel SGX enclaves are vulnerable against cache-timing attacks. As a case study, we present an access-driven cache-timing attack on AES when running inside an Intel SGX enclave. Using Neve and Seifert'...
A secure, privacy-preserving IoT middleware using intel SGX
IoT '17: Proceedings of the Seventh International Conference on the Internet of ThingsWith Internet of Things (IoT) middleware solutions moving towards cloud computing, the problems of trust in cloud platforms and data privacy need to be solved. The emergence of Trusted Execution Environments (TEEs) opens new perspectives to increase ...
Comments
Information & Contributors
Information
Published In

- General Chairs:
- Nicholas J. Multari,
- Anoop Singhal,
- Program Chair:
- Erin Miler
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Invited-talk
Funding Sources
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 346Total Downloads
- Downloads (Last 12 months)67
- Downloads (Last 6 weeks)10
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in