LogSafe: Secure and Scalable Data Logger for IoT Devices

Hung Nguyen1, Radoslav Ivanov1, Linh T.X. Phan2, Oleg Sokolsky2, James Weimer2, Insup Lee2
1University of Pennsylvania, Philadelphia, PA, US
2Dept. of Computer and Information Science, University of Pennsylvania, PA, U.S.A

Tóm tắt

As devices in the Internet of Things (IoT) increase in number and integrate with everyday lives, large amounts of personal information will be generated. With multiple discovered vulnerabilities in current IoT networks, a malicious attacker might be able to get access to and misuse this personal data. Thus, a logger that stores this information securely would make it possible to perform forensic analysis in case of such attacks that target valuable data. In this paper, we propose LogSafe, a scalable, fault-tolerant logger that leverages the use of Intel Software Guard Extensions (SGX) to store logs from IoT devices efficiently and securely. Using the security guarantees of SGX, LogSafe is designed to run on an untrusted cloud infrastructure and satisfies Confidentiality, Integrity, and Availability (CIA) security properties. Finally, we provide an exhaustive evaluation of LogSafe in order to demonstrate that it is capable of handling logs from a large number of IoT devices and at a very high data transmission rate.

Từ khóa

#cloud based #secure logger #intel software guard extensions #iot logger

Tài liệu tham khảo

matetic, 2017, Rote Rollback protection for trusted execution

10.1145/964723.383071

10.1145/2735960.2735984

10.1016/j.future.2013.01.010

10.17487/rfc5246

10.1109/COMST.2014.2320099

10.1109/TII.2013.2243743

10.1109/TDSC.2010.45

10.1007/978-3-319-66402-6_21

schneier, 1998, Cryptographic support for secure logs on untrusted machines., Usenix Security

10.1007/s00453-003-1076-8

10.1145/1323293.1294279

crosby, 2009, Efficient data structures for tamper-evident logging, USENIX Security Symposium, 317

10.1145/1179474.1179485

10.1145/1357010.1352625

kotla, 2012, Pasture: Secure offline data access using commodity trusted hardware, Presented as part of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12), 321

2003, Trusted Computing Group TPM v1 2 specification changes

10.1145/3052973.3053034

lee, 2016, Inferring fine-grained control flow inside sgx enclaves with branch shadowing

caltum, 2016, Exploitation of iot devices for launching mass-scale attack campaigns

10.1109/SP.2015.45

2016, Hacked Cameras DVRs Powered Todays Massive Internet Outage

2015, Online cheating site ashley madison hacked

10.1007/978-3-319-45744-4_22

2016, Yahoo says at least 500 million accounts breached in attack

maniatis, 2002, Secure history preservation through timeline entanglement

2017, Equifax announces cybersecurity firm has concluded forensic investigation of cybersecurity incident

2016, Princeton researchers find security flaws in iot devices

2016, Nest thermostat leaked user data over wifi

10.1109/CHASE.2016.48

10.1145/2799647

tsai, 2017, Graphene-sgx: A practical library os for unmodified applications on sgx, 2017 USENIX Annual Technical Conference (USENIX ATC 17)

arnautov, 2016, Scone: Secure linux containers with intel sgx., OSDI, 689

10.1109/SP.2015.10

10.14722/ndss.2017.23500

costan, 2016, Intel sgx explained, Cryptology ePrint Archive Report

fisch, 0, Iron Functional encryption using intel sgx