Proceedings of the First International Workshop on Human-Centered Sensing, Networking, and Systems 2017
DOI: 10.1145/3144730.3144739
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Location-Based Services by using Intel SGX

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…Protection for flow tracking application [59] Trusted framework to develop IoT applications [36] Protection for health data [73] Secure architecture for P2P scenarios [24] Protection for edge computing [63] Comparison between TEE and secure multi-party computation application [62] Protection for video application [46], [69] Secure logger [13], [76] Protection for system analyser [49] Societal model for IoT security [68] Protection for location-based services [60] Trusted auditor [47] Protection for data dissemination [61] Data encryption mechanism [56] Protection for data management [14] Data protection (app) [71] Protection for data aggregation (app) [75] Checker for Industrial gateway communications [52] Lightweithg anonymous authentication [25] Remote attestation mechanism [38] Device snapshot authentication system [32] Control-flow attestation [37] Authentication scheme [58] Remote attestation and channel protection [44] Secure authentication and key distribution [67] Boot attestation [53] Protection for data through authentication [50] Protection and attestation for remote terminal [65] Device private keys protection architecture [28] Remote attestation [64] Keys derivation from device characteristics [31] Authenticity detection service [40] Keys protection against cold boot attacks [55] Cache rootkit exploiting TrustZone [35] vendors, e.g., ARM and Intel, already present many of the general advantages, such as hardware isolation (normal world and the secure world) and mem...…”
Section: Tee Advantages and Disadvantagesmentioning
confidence: 99%
See 1 more Smart Citation
“…Protection for flow tracking application [59] Trusted framework to develop IoT applications [36] Protection for health data [73] Secure architecture for P2P scenarios [24] Protection for edge computing [63] Comparison between TEE and secure multi-party computation application [62] Protection for video application [46], [69] Secure logger [13], [76] Protection for system analyser [49] Societal model for IoT security [68] Protection for location-based services [60] Trusted auditor [47] Protection for data dissemination [61] Data encryption mechanism [56] Protection for data management [14] Data protection (app) [71] Protection for data aggregation (app) [75] Checker for Industrial gateway communications [52] Lightweithg anonymous authentication [25] Remote attestation mechanism [38] Device snapshot authentication system [32] Control-flow attestation [37] Authentication scheme [58] Remote attestation and channel protection [44] Secure authentication and key distribution [67] Boot attestation [53] Protection for data through authentication [50] Protection and attestation for remote terminal [65] Device private keys protection architecture [28] Remote attestation [64] Keys derivation from device characteristics [31] Authenticity detection service [40] Keys protection against cold boot attacks [55] Cache rootkit exploiting TrustZone [35] vendors, e.g., ARM and Intel, already present many of the general advantages, such as hardware isolation (normal world and the secure world) and mem...…”
Section: Tee Advantages and Disadvantagesmentioning
confidence: 99%
“…Qin et al [52] recommended adding security enforcement policy for their industrial gateway communications checker. Kulkarni et al [60] proposed to evaluate their solution, a protection system for location-based services, and compare it with other approaches.…”
Section: Suggested Future Workmentioning
confidence: 99%
“…The data is encrypted using Paillier cryptosystem [82] and then put into statistical tests within a secure enclave. Besides these works, more SGX-based schemes are popular in cloud computing and applied in practical fields, like healthcare [83], machine learning [84], [85], data analysis [86], location-based services [87], and many others.…”
Section: Software Guard Extensionsmentioning
confidence: 99%
“…Here, we consider three parameters for evaluation: (1) Max dist , (2) Min time , and (3) Min visit . We do not take service utility in to account as we assume a system based on a trusted computing environment, which does not compromise on service utility [20]. However, in case of techniques such as obfuscations or anonymization, pseudo-locations are used for the last hop, in which case the accuracy depends on the amount of distortion added to the user's true location.…”
Section: Privacy Analysismentioning
confidence: 99%
“…This model reverses the client/server relationship by enforcing the service providers to query for the required data from the model present on the user smartphone. Finally, the query response can be processed in a trusted computing environment as illustrated in our previous work [20]. Judicious scheduling in such systems ensures that learning occurs only when the device is completely idle [23].…”
Section: Introductionmentioning
confidence: 99%