Show simple item record

dc.contributor.author
Shafagh, Hossein
dc.contributor.supervisor
Mattern, Friedemann
dc.contributor.supervisor
Capkun, Srdjan
dc.contributor.supervisor
Levis, Philip
dc.date.accessioned
2018-08-15T11:16:26Z
dc.date.available
2018-08-13T10:34:10Z
dc.date.available
2018-08-13T10:57:52Z
dc.date.available
2018-08-13T11:00:39Z
dc.date.available
2018-08-14T08:56:36Z
dc.date.available
2018-08-15T11:16:26Z
dc.date.issued
2018
dc.identifier.uri
http://hdl.handle.net/20.500.11850/282188
dc.identifier.doi
10.3929/ethz-b-000282188
dc.description.abstract
As Internet of Things (IoT) systems further emerge, we face unprecedented security and privacy challenges, especially with regards to the collected data. This data typically consists of sensor readings, tagged with metadata. For scalability, ubiquitous access, and sharing possibilities, the data is most often stored in the cloud. Securing date while in transit and in particular when being stored in the cloud is of utmost importance, as the data can be used to infer privacy-sensitive information. Moreover, transparent and secure data sharing (e.g., sharing with friends or domain experts) is considered a key requirement for the practicality and success of typical IoT systems. In today’s cloud-centric designs, users have no choice but to trust centralized parties. The increased number of security and privacy incidents, such as system compromises or unauthorized trade with users data, show that this trust is not always justified. Despite varying levels of privacy-awareness among users of different age and geopolitical groups, and even societal shifts towards privacy pragmatism and indifference, the security and privacy threats do usually have far-reaching implications, demanding adequate mechanisms and measures to address them. In this dissertation, we investigate building secure IoT systems that protect data confidentiality and retain data ownership. We build secure systems that allow reducing the trust end-users are required to put into third parties within the IoT ecosystem, specifically towards the cloud storage and service providers. More importantly, we take a new approach on empowering the user with ownership and fine-grained access control for IoT data without sacrificing performance or security. In particular, we present three approaches to enabling a secure IoT ecosystem: (i) Talos: Talos is a system that stores IoT data securely in a cloud database while still allowing query processing over the encrypted data. Talos protects data even if the server is compromised. We enable this by encrypting IoT data with a set of cryptographic schemes such as order- preserving and partially homomorphic encryption. We tailor Talos to accommodate for the resource asymmetry of the IoT, particularly towards constrained IoT devices. We assess the feasibility of Talos on low-power devices with and without cryptographic hardware accelerators and quantify its overhead concerning energy consumption, computation time, and latency. With a thorough evaluation of our prototype implementation, we show that Talos is a practical system that can provide a high level of security with reasonable overhead. (ii) Pilatus: Storage of data on cloud services naturally facilitates data sharing with third-party services and other users, but bears privacy risks. We present Pilatus, a data protection platform that extends Talos where the cloud stores only encrypted data, yet is still able to process a defined set of database queries (e.g., range or sum). Pilatus features a novel encrypted data sharing scheme based on re-encryption, with revocation capabilities and in situ key-update. Our solution includes a suite of novel techniques that enable efficient partially homomorphic encryption, decryption, and sharing. We present performance optimizations that render these cryptographic tools practical for mobile platforms. We implement a prototype of Pilatus and evaluate it thoroughly. Our optimizations achieve a performance gain within one order of magnitude compared to state-of-the-art realizations. (iii) Droplet: Droplet is a secure data management system that we designed from the ground up to accommodate for the distributed nature of the IoT and revive the IoT from the current vertical design paradigm. The consequent myriad of isolated data silos of classical vertical architectures is hard to manage and prevent heterogeneous applications from interacting with our IoT data. To address this challenge, we leverage the blockchain technology to bootstrap trust for a distributed, secure, and resilient access control and data management scheme. Droplet handles time series data, enables reliable sharing among heterogeneous applications without intermediate trust entities, and features a cryptographically-protected fine-grained and scalable access control mechanism to data streams. We leverage a hash-chain-based key management mechanism to enable interval sharing and compact key distribution. The built-in cryptocurrency feature of blockchains allows the integration of economic incentives into our system. These properties enable a variety of applications that are presently not easily realizable using existing systems. The systems proposed and discussed in this dissertation demonstrate that end-to-end encryption with secure sharing can be achieved in IoT ecosystems with a modest overhead, while maintaining a consistent user- experience.
en_US
dc.format
application/pdf
en_US
dc.language.iso
en
en_US
dc.publisher
ETH Zurich
en_US
dc.rights.uri
http://rightsstatements.org/page/InC-NC/1.0/
dc.subject
internet of things
en_US
dc.subject
Security
en_US
dc.subject
Privacy
en_US
dc.subject
Database
en_US
dc.subject
Encrypted Data Processing
en_US
dc.subject
Homomorphic Encryption
en_US
dc.subject
Authorization
en_US
dc.subject
Access Control
en_US
dc.subject
Authentication
en_US
dc.subject
IoT
en_US
dc.title
Retaining Data Ownership in the Internet of Things
en_US
dc.type
Doctoral Thesis
dc.rights.license
In Copyright - Non-Commercial Use Permitted
dc.date.published
2018-08-15
ethz.size
159 p.
en_US
ethz.code.ddc
DDC - DDC::0 - Computer science, information & general works::004 - Data processing, computer science
ethz.identifier.diss
25075
en_US
ethz.publication.place
Zurich
en_US
ethz.publication.status
published
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02658 - Inst. Intelligente interaktive Systeme / Inst. Intelligent Interactive Systems::03528 - Mattern, Friedemann (emeritus) / Mattern, Friedemann (emeritus)
en_US
ethz.leitzahl.certified
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02658 - Inst. Intelligente interaktive Systeme / Inst. Intelligent Interactive Systems::03528 - Mattern, Friedemann (emeritus) / Mattern, Friedemann (emeritus)
en_US
ethz.date.deposited
2018-08-13T10:34:11Z
ethz.source
FORM
ethz.eth
yes
en_US
ethz.availability
Open access
en_US
ethz.rosetta.installDate
2018-08-13T10:58:02Z
ethz.rosetta.lastUpdated
2021-02-15T01:17:04Z
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=Retaining%20Data%20Ownership%20in%20the%20Internet%20of%20Things&rft.date=2018&rft.au=Shafagh,%20Hossein&rft.genre=unknown&rft.btitle=Retaining%20Data%20Ownership%20in%20the%20Internet%20of%20Things
 Search print copy at ETH Library

Files in this item

Thumbnail

Publication type

Show simple item record