Skip to main content
Top
Published in: Computing 3/2024

26-01-2024 | Regular Paper

TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things

Authors: Hui Xie, Jun Zheng, Zhengyuan Zhang, Shengjun Wei, Changzhen Hu

Published in: Computing | Issue 3/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the popularity of the Internet of Things (IoT), massive amounts of data are generated every second. By analyzing this data, attackers can launch kinds of attacks for their own profits, such as data tampering, malicious data injection, identity deception etc. To solve these problems, in this paper, we propose a Trusted Execution Environment-and-Blockchain-based data protection architecture (TEDA). In TEDA, edge devices in different IoTs maintain a consortium blockchain to achieve the secure read/write operations and verification of data together with cloud. Besides, to secure the local data processing in edge devices and manage internal light-weight devices, an Intel SGX-based module is designed. Furthermore, a new transaction structure is introduced to protect user’s access pattern. The experimental results show that the space occupancy rates of write and read of TEDA with SGX are 0.84\(\times \) and 1.07\(\times \) than that of TEDA without SGX, and the time occupancy rates of write and read of TEDA with SGX are 0.94\(\times \) and 0.90\(\times \) than that of TEDA without SGX, which indicate TEDA has a good performance.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference He W, Golla M, Padhi R, Ofek J, Durmuth M, Fernandes E, Ur B (2018) Rethinking access control and authentication for the home internet of things (iot). USENIX, 255–272 He W, Golla M, Padhi R, Ofek J, Durmuth M, Fernandes E, Ur B (2018) Rethinking access control and authentication for the home internet of things (iot). USENIX, 255–272
2.
go back to reference Zhang S, Rong J, Wang B (2020) A privacy protection scheme of smart meter for decentralized smart home environment based on consortium blockchain. Electr Power Energy Syste 1–10 Zhang S, Rong J, Wang B (2020) A privacy protection scheme of smart meter for decentralized smart home environment based on consortium blockchain. Electr Power Energy Syste 1–10
3.
go back to reference Zhang B, Mor N, Kolb J, Chan DS, Goyal N (2015) The cloud is not enough: saving iot from the cloud. In: Proceedings of the 7th USENIX Conference on Hot Topics in Cloud ComputingJuly Zhang B, Mor N, Kolb J, Chan DS, Goyal N (2015) The cloud is not enough: saving iot from the cloud. In: Proceedings of the 7th USENIX Conference on Hot Topics in Cloud ComputingJuly
4.
go back to reference Orenbach M, Lifshits P, Minkin M, Silberstein M (2017) Eleos: exitless os services for sgx enclaves. The Twelfth European Conference, pp 238–253 Orenbach M, Lifshits P, Minkin M, Silberstein M (2017) Eleos: exitless os services for sgx enclaves. The Twelfth European Conference, pp 238–253
5.
go back to reference Arnautov S, Trach B, Gregor F, Knauth T, Martin A, Priebe C, Lind J, Muthukumaran D, O’Keeffe D, Stillwell ML, Goltzsche D, Eyers D, Kapitza R, Pietzuch P, Fetzer C (2016) Scone: secure linux containers with intel sgx. USENIX, pp 689–703 Arnautov S, Trach B, Gregor F, Knauth T, Martin A, Priebe C, Lind J, Muthukumaran D, O’Keeffe D, Stillwell ML, Goltzsche D, Eyers D, Kapitza R, Pietzuch P, Fetzer C (2016) Scone: secure linux containers with intel sgx. USENIX, pp 689–703
6.
go back to reference Kim T, Park J, Woo J, Jeon S, Huh J (2019) Shieldstore: shielded in-memory key-value storage with sgx. In: Proceedings of the 14th EuroSys Conference 2019 Kim T, Park J, Woo J, Jeon S, Huh J (2019) Shieldstore: shielded in-memory key-value storage with sgx. In: Proceedings of the 14th EuroSys Conference 2019
7.
go back to reference Bailleu M, Thalheim J, Bhatotia P, Fetzer C, Honda M, Vaswani K (2019) Speicher: securing lsm-based key-value stores using shielded execution. In: 17th USENIX Conference on File and Storage Technologies (FAST ’19), pp 173–190 Bailleu M, Thalheim J, Bhatotia P, Fetzer C, Honda M, Vaswani K (2019) Speicher: securing lsm-based key-value stores using shielded execution. In: 17th USENIX Conference on File and Storage Technologies (FAST ’19), pp 173–190
8.
go back to reference Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial iot. IEEE J Sel Areas Commun 942–954 Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial iot. IEEE J Sel Areas Commun 942–954
9.
go back to reference Hu Y, Kumar S, Popa RA (2020) Ghostor: toward a secure data-sharing system from decentralized trust. In: 17th USENIX symposium on networked systems design and implementation (NSDI ’20), pp 851–877 Hu Y, Kumar S, Popa RA (2020) Ghostor: toward a secure data-sharing system from decentralized trust. In: 17th USENIX symposium on networked systems design and implementation (NSDI ’20), pp 851–877
10.
go back to reference Jangirala S, Das AK, Vasilakos AV (2019) Designing secure lightweight blockchain-enabled rfid-based authentication protocol for supply chains in 5g mobile edge computing environment. IEEE Trans Ind Inform 1–13 Jangirala S, Das AK, Vasilakos AV (2019) Designing secure lightweight blockchain-enabled rfid-based authentication protocol for supply chains in 5g mobile edge computing environment. IEEE Trans Ind Inform 1–13
11.
go back to reference Yang H, Liang Y, Yuan J, Yao Q, Yu A, Zhang J (2020) Distributed blockchain-based trusted multi-domain collaboration for mobile edge computing in 5g and beyond. IEEE Trans Ind Inform 7094–7104 Yang H, Liang Y, Yuan J, Yao Q, Yu A, Zhang J (2020) Distributed blockchain-based trusted multi-domain collaboration for mobile edge computing in 5g and beyond. IEEE Trans Ind Inform 7094–7104
12.
go back to reference Chen Y, Xie H, Lv K, Wei S, Hu C (2019) Deplest: a blockchain-based privacy-preserving distributed database toward user behaviors in social networks. Inf Sci 100–117 Chen Y, Xie H, Lv K, Wei S, Hu C (2019) Deplest: a blockchain-based privacy-preserving distributed database toward user behaviors in social networks. Inf Sci 100–117
13.
go back to reference Si H, Sun C, Li Y, Qiao H, Shi L (2019) Iot information sharing security mechanism based on blockchain technology. Future Gener Compute Syst 1028–1040 Si H, Sun C, Li Y, Qiao H, Shi L (2019) Iot information sharing security mechanism based on blockchain technology. Future Gener Compute Syst 1028–1040
14.
go back to reference Kochovski P, Gec S, Stankovski V, Bajec M, Drobintsev PD (2019) Trust management in a blockchain based fog computing platform with trustless smart oracles. Future Gener Comput Syst 747–759 Kochovski P, Gec S, Stankovski V, Bajec M, Drobintsev PD (2019) Trust management in a blockchain based fog computing platform with trustless smart oracles. Future Gener Comput Syst 747–759
15.
go back to reference Ali M, Nelson J, Shea R, Freedman MJ (2016) Blockstack: a global naming and storage system secured by blockchains. In: 2016 USENIX annual technical conference (USENIX ATC ’16), pp 181–194 Ali M, Nelson J, Shea R, Freedman MJ (2016) Blockstack: a global naming and storage system secured by blockchains. In: 2016 USENIX annual technical conference (USENIX ATC ’16), pp 181–194
16.
go back to reference Narula N, Vasquez W, Virza M (2018) zkledger: privacy-preserving auditing for distributed ledgers. USENIX, pp 65–80 Narula N, Vasquez W, Virza M (2018) zkledger: privacy-preserving auditing for distributed ledgers. USENIX, pp 65–80
17.
go back to reference Fan K, Bao Z, Liu M, Vasilakos AV, Shi W (2020) Dredas: decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial iot. Future Gener Comput Syst Int J Esci 665–674 Fan K, Bao Z, Liu M, Vasilakos AV, Shi W (2020) Dredas: decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial iot. Future Gener Comput Syst Int J Esci 665–674
18.
go back to reference Li L, Liua J, Changa X, Liu T, Liu J (2020) Toward conditionally anonymous bitcoin transactions: a lightweight-script approach. Inf Sci 290–303 Li L, Liua J, Changa X, Liu T, Liu J (2020) Toward conditionally anonymous bitcoin transactions: a lightweight-script approach. Inf Sci 290–303
19.
go back to reference Zhou Z, Wang B, Dong M, Ota K (2019) Secure and efficient vehicle-to-grid energy trading in cyber physical systems: integration of blockchain and edge computing. IEEE Trans Syst Man Cybern Syst 1–15 Zhou Z, Wang B, Dong M, Ota K (2019) Secure and efficient vehicle-to-grid energy trading in cyber physical systems: integration of blockchain and edge computing. IEEE Trans Syst Man Cybern Syst 1–15
20.
go back to reference He S, Tang Q, Wu CQ, Shen X (2020) Decentralizing iot management systems using blockchain for censorship resistance. IEEE Trans Ind Inform 715–727 He S, Tang Q, Wu CQ, Shen X (2020) Decentralizing iot management systems using blockchain for censorship resistance. IEEE Trans Ind Inform 715–727
22.
go back to reference Matetic S, Wust K, Schneider M, Kostiainen K, Karame G, Capkun S (2019) Bite: bitcoin lightweight client privacy using trusted execution. In: 28th USENIX Security Symposium, pp 783–800 Matetic S, Wust K, Schneider M, Kostiainen K, Karame G, Capkun S (2019) Bite: bitcoin lightweight client privacy using trusted execution. In: 28th USENIX Security Symposium, pp 783–800
23.
go back to reference Oleksenko O, Trach B, Krahn R, Martin A, Fetzer C, Silberstein M (2018) Varys: protecting sgx enclaves from practical side-channel attacks. In: 2018 USENIX annual technical conference (USENIX ATC ’18), pp 227–239 Oleksenko O, Trach B, Krahn R, Martin A, Fetzer C, Silberstein M (2018) Varys: protecting sgx enclaves from practical side-channel attacks. In: 2018 USENIX annual technical conference (USENIX ATC ’18), pp 227–239
24.
go back to reference Dave A, Leung C, Popa RA, Gonzalez JE, Stoica I (2020) Oblivious coopetitive analytics using hardware enclaves. In: EuroSys ’20: proceedings of the fifteenth European conference on computer systems Dave A, Leung C, Popa RA, Gonzalez JE, Stoica I (2020) Oblivious coopetitive analytics using hardware enclaves. In: EuroSys ’20: proceedings of the fifteenth European conference on computer systems
25.
go back to reference Zhao W, Lu K, Qi Y, Qi S (2020) Mptee: bringing flexible and efficient memory protection to intel sgx. In: EuroSys ’20: proceedings of the fifteenth European conference on computer systems, pp 1–15 Zhao W, Lu K, Qi Y, Qi S (2020) Mptee: bringing flexible and efficient memory protection to intel sgx. In: EuroSys ’20: proceedings of the fifteenth European conference on computer systems, pp 1–15
26.
go back to reference Anati I, Gueron S, Johnson S (2013) Innovative technology for cpu based attestation and sealing. In: In Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy Anati I, Gueron S, Johnson S (2013) Innovative technology for cpu based attestation and sealing. In: In Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy
27.
go back to reference Corporation I (2014) Intel®software guard extensions programming reference. In: 329298-002us Edition Corporation I (2014) Intel®software guard extensions programming reference. In: 329298-002us Edition
28.
go back to reference Zcash. https://z.cash (2017) Zcash. https://​z.​cash (2017)
Metadata
Title
TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things
Authors
Hui Xie
Jun Zheng
Zhengyuan Zhang
Shengjun Wei
Changzhen Hu
Publication date
26-01-2024
Publisher
Springer Vienna
Published in
Computing / Issue 3/2024
Print ISSN: 0010-485X
Electronic ISSN: 1436-5057
DOI
https://doi.org/10.1007/s00607-023-01253-y

Other articles of this Issue 3/2024

Computing 3/2024 Go to the issue

Premium Partner