{"title":"TEDA:基于可信执行环境和区块链的物联网数据保护架构","authors":"","doi":"10.1007/s00607-023-01253-y","DOIUrl":null,"url":null,"abstract":"<h3>Abstract</h3> <p>With the popularity of the Internet of Things (IoT), massive amounts of data are generated every second. By analyzing this data, attackers can launch kinds of attacks for their own profits, such as data tampering, malicious data injection, identity deception etc. To solve these problems, in this paper, we propose a Trusted Execution Environment-and-Blockchain-based data protection architecture (TEDA). In TEDA, edge devices in different IoTs maintain a consortium blockchain to achieve the secure read/write operations and verification of data together with cloud. Besides, to secure the local data processing in edge devices and manage internal light-weight devices, an Intel SGX-based module is designed. Furthermore, a new transaction structure is introduced to protect user’s access pattern. The experimental results show that the space occupancy rates of write and read of TEDA with SGX are 0.84<span> <span>\\(\\times \\)</span> </span> and 1.07<span> <span>\\(\\times \\)</span> </span> than that of TEDA without SGX, and the time occupancy rates of write and read of TEDA with SGX are 0.94<span> <span>\\(\\times \\)</span> </span> and 0.90<span> <span>\\(\\times \\)</span> </span> than that of TEDA without SGX, which indicate TEDA has a good performance. </p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"65 1","pages":""},"PeriodicalIF":3.3000,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things\",\"authors\":\"\",\"doi\":\"10.1007/s00607-023-01253-y\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<h3>Abstract</h3> <p>With the popularity of the Internet of Things (IoT), massive amounts of data are generated every second. By analyzing this data, attackers can launch kinds of attacks for their own profits, such as data tampering, malicious data injection, identity deception etc. To solve these problems, in this paper, we propose a Trusted Execution Environment-and-Blockchain-based data protection architecture (TEDA). In TEDA, edge devices in different IoTs maintain a consortium blockchain to achieve the secure read/write operations and verification of data together with cloud. Besides, to secure the local data processing in edge devices and manage internal light-weight devices, an Intel SGX-based module is designed. Furthermore, a new transaction structure is introduced to protect user’s access pattern. The experimental results show that the space occupancy rates of write and read of TEDA with SGX are 0.84<span> <span>\\\\(\\\\times \\\\)</span> </span> and 1.07<span> <span>\\\\(\\\\times \\\\)</span> </span> than that of TEDA without SGX, and the time occupancy rates of write and read of TEDA with SGX are 0.94<span> <span>\\\\(\\\\times \\\\)</span> </span> and 0.90<span> <span>\\\\(\\\\times \\\\)</span> </span> than that of TEDA without SGX, which indicate TEDA has a good performance. </p>\",\"PeriodicalId\":10718,\"journal\":{\"name\":\"Computing\",\"volume\":\"65 1\",\"pages\":\"\"},\"PeriodicalIF\":3.3000,\"publicationDate\":\"2024-01-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s00607-023-01253-y\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computing","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s00607-023-01253-y","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
摘要
摘要 随着物联网(IoT)的普及,每秒钟都会产生大量数据。通过分析这些数据,攻击者可以发起各种攻击以谋取利益,如数据篡改、恶意数据注入、身份欺骗等。为了解决这些问题,本文提出了基于可信执行环境和区块链的数据保护架构(TEDA)。在 TEDA 中,不同物联网的边缘设备维护一个联盟区块链,与云端一起实现数据的安全读写操作和验证。此外,为了确保边缘设备本地数据处理的安全,并管理内部轻量级设备,设计了基于英特尔 SGX 的模块。此外,还引入了一种新的事务结构来保护用户的访问模式。实验结果表明,与不带SGX的TEDA相比,带SGX的TEDA写入和读取的空间占用率分别为0.84(次)和1.07(次);与不带SGX的TEDA相比,带SGX的TEDA写入和读取的时间占用率分别为0.94(次)和0.90(次),这表明TEDA具有良好的性能。
TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things
Abstract
With the popularity of the Internet of Things (IoT), massive amounts of data are generated every second. By analyzing this data, attackers can launch kinds of attacks for their own profits, such as data tampering, malicious data injection, identity deception etc. To solve these problems, in this paper, we propose a Trusted Execution Environment-and-Blockchain-based data protection architecture (TEDA). In TEDA, edge devices in different IoTs maintain a consortium blockchain to achieve the secure read/write operations and verification of data together with cloud. Besides, to secure the local data processing in edge devices and manage internal light-weight devices, an Intel SGX-based module is designed. Furthermore, a new transaction structure is introduced to protect user’s access pattern. The experimental results show that the space occupancy rates of write and read of TEDA with SGX are 0.84\(\times \) and 1.07\(\times \) than that of TEDA without SGX, and the time occupancy rates of write and read of TEDA with SGX are 0.94\(\times \) and 0.90\(\times \) than that of TEDA without SGX, which indicate TEDA has a good performance.
期刊介绍:
Computing publishes original papers, short communications and surveys on all fields of computing. The contributions should be written in English and may be of theoretical or applied nature, the essential criteria are computational relevance and systematic foundation of results.