Loading...
Please wait, while we are loading the content...
Similar Documents
Poster: Secure Logging Infrastructure Employing Heterogeneous Trusted Execution Environments
| Content Provider | Semantic Scholar |
|---|---|
| Author | Lee, Seungho Choi, Wonsuk Lee, Dong Hoon |
| Copyright Year | 2020 |
| Abstract | In this present hyper-connected era, interconnected heterogeneous devices send logs to a distributed cloud storage in real-time, and transmitted logs must be accessible only to authorized users. These logs are referred to as fine-grained accesscontrolled logs. For the fine-grained access control to logs, we propose a secure logging infrastructure employing heterogeneous trusted execution environments that allows a logging infrastructure administrator to operate the system robustly without significant risk of key exposure, malicious activity, or abnormal behavior. In our method, embedded devices based on ARM architecture encrypt their own logs using a key-policy attributebased encryption scheme in ARM TrustZone, which are then sent to the distributed cloud storage. After this, service providers based on Intel architecture download the logs from the distributed cloud storage and decrypt them with a decryption key that is delivered through a secure channel established in Intel software guard extensions. At this point, access control to logs is possible since the decryption key includes a policy related to log access permissions. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | https://www.ndss-symposium.org/wp-content/uploads/2020/02/NDSS2020posters_paper_8.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Poster |