Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms

Author(s):  
Jingwen Fan ◽  
Yi He ◽  
Bo Tang ◽  
Qi Li ◽  
Ravi Sandhu
Keyword(s):  
Author(s):  
Gianmarco Cerutti ◽  
Rahul Prasad ◽  
Alessio Brutti ◽  
Elisabetta Farella

2021 ◽  
Vol 117 ◽  
pp. 111113
Author(s):  
G. Gnanamoorthy ◽  
Virendra Kumar Yadav ◽  
Daoud Ali ◽  
V. Narayanan ◽  
Khadijah Mohammed Saleh Katubi ◽  
...  

2021 ◽  
pp. 108040
Author(s):  
Leonardo Babun ◽  
Kyle Denney ◽  
Z. Berkay Celik ◽  
Patrick McDaniel ◽  
A. Selcuk Uluagac

2021 ◽  
Vol 13 (1) ◽  
pp. 12
Author(s):  
Juan Wang ◽  
Yang Yu ◽  
Yi Li ◽  
Chengyang Fan ◽  
Shirong Hao

Network function virtualization (NFV) provides flexible and scalable network function for the emerging platform, such as the cloud computing, edge computing, and IoT platforms, while it faces more security challenges, such as tampering with network policies and leaking sensitive processing states, due to running in a shared open environment and lacking the protection of proprietary hardware. Currently, Intel® Software Guard Extensions (SGX) provides a promising way to build a secure and trusted VNF (virtual network function) by isolating VNF or sensitive data into an enclave. However, directly placing multiple VNFs in a single enclave will lose the scalability advantage of NFV. This paper combines SGX and click technology to design the virtual security function architecture based on multiple enclaves. In our design, the sensitive modules of a VNF are put into different enclaves and communicate by local attestation. The system can freely combine these modules according to user requirements, and increase the scalability of the system while protecting its running state security. In addition, we design a new hot-swapping scheme to enable the system to dynamically modify the configuration function at runtime, so that the original VNFs do not need to stop when the function of VNFs is modified. We implement an IDS (intrusion detection system) based on our architecture to verify the feasibility of our system and evaluate its performance. The results show that the overhead introduced by the system architecture is within an acceptable range.


2016 ◽  
Vol 54 (7) ◽  
pp. 48-54 ◽  
Author(s):  
Jaeho Kim ◽  
Jaeseok Yun ◽  
Sung-Chan Choi ◽  
Dale N. Seed ◽  
Guang Lu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document