Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3302505.3310074acmconferencesArticle/Chapter ViewAbstractPublication PagesiotdiConference Proceedingsconference-collections
research-article
Open access

VERID: towards verifiable IoT data management

Published: 15 April 2019 Publication History

Abstract

Ensuring the authenticity and integrity of the sensing data that are stored in a third-party cloud is a crucial task for the correctness and safety of many IoT applications. Although verifiable data outsourcing has been studied for over a decade, current solutions are not fully suitable for IoT systems, due to the hardware constraints, deployment features, and application requirements of IoT. This paper presents VERID, a verifiable data management system designed for IoT applications. VERID enables important ranged selection and aggregate queries of sensing data while imposing minimal overhead for resource-constraint IoT devices. Our important innovation is a computational and space-efficient authentication data structure called PrefixMHT which fits into resource-constrained IoT devices and supports both range and aggregate queries. We design a new signature aggregation scheme called Condensed Bilinear Pairing to further improve the efficiency. The experiments using real IoT datasets show that VERID is able to provide authenticity, integrity, and completeness of data queries while achieving substantial advantages in computation, memory, and communication efficiency than possible methods.

References

[1]
2004. Intel Lab Data. http://db.csail.mit.edu/labdata/labdata.html.
[2]
2015. https://github.com/herumi/ate-pairing.
[3]
2015. The 10 Biggest Cloud Outages Of 2015. http://www.crn.com/slide-shows/cloud/300077635/the-10-biggest-cloud-outages-of-2015-so-far.htm/pgno/0/2.
[4]
2015. Secure Hash Standard. http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf.
[5]
2018. https://www.opensensors.io/.
[6]
2018. Intel SGX. https://software.intel.com/en-us/sgx.
[7]
2018. Introducing JSON. https://www.json.org/.
[8]
2018. libsnark. https://github.com/scipr-lab/libsnark.
[9]
2018. M3 Open Node. https://www.iot-lab.info/hardware/m3/.
[10]
2018. Navigating a Cloudy Sky: Practical Guidance and the State of Cloud Security. https://www.mcafee.com/enterprise/en-us/assets/executive-summaries/es-navigating-cloudy-sky.pdf.
[11]
2018. OpenSSL. https://www.openssl.org/.
[12]
J. H. Ahn, D. Boneh, J. Camenisch, S. Hohenberger, A. Shelat, and B. Waters. 2015. Computing on authenticated data. Journal of Cryptology 28, 2 (2015).
[13]
Mohannad A. Alswailim, Hossam S. Hassanein, and Mohammad Zulkernine. 2015. CRAWDAD dataset queensu/crowd_temperature (v. 2015-11-20): derived from roma/taxi (v. 2014-07-17). Downloaded from https://crawdad.org/queensu/crowd_temperature/20151120.
[14]
M. Ambrosin, M. Conti, A. Ibrahim, G. Neven, A. Sadeghi, and M. Schunter. 2016. SANA: secure and scalable aggregate network attestation. In Proc. of ACM CCS.
[15]
S. Bajaj and R. Sion. 2013. CorrectDB: SQL engine with practical query authentication. Proc. of the VLDB Endowment.
[16]
M. Bellare and P. Rogaway. 1993. Random oracles are practical: A paradigm for designing efficient protocols. In Proc. of ACM CCS.
[17]
E. Ben-Sasson, A. Chiesa, D. Genkin, E. Tromer, and M. Virza. 2013. SNARKs for C: Verifying program executions succinctly and in zero knowledge. In CRYPTO.
[18]
J. Beuchat, J. González-Díaz, S. Mitsunari, E. Okamoto, F. Rodríguez-Henríquez, and T. Teruya. 2010. High-speed software implementation of the optimal ate pairing over Barreto-Naehrig curves. In International Conference on Pairing-Based Cryptography.
[19]
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. 2003. Aggregate and verifiably encrypted signatures from bilinear maps. In In Proc. of EUROCRYPT.
[20]
A. J. Brush, J. Jung, R. Mahajan, and F. Martinez. 2013. Digital neighborhood watch: Investigating the sharing of camera data amongst neighbors. In Proc. of ACM CSCW.
[21]
W. Cheng, H. Pang, and K. Tan. 2006. Authenticating multi-dimensional query results in data publishing. In IFIP Annual Conference on Data and Applications Security and Privacy.
[22]
Manuel C. Christian P., Kapil V. 2018. EnclaveDB: A Secure Database using SGX. In Proc. of IEEE S&P.
[23]
K. Chung, Y. T. Kalai, F. Liu, and R. Raz. 2011. Memory delegation. In Crypto.
[24]
E. F. Codd. 1970. A relational model of data for large shared data banks. CACM 13, 6 (1970).
[25]
G. Cormode, M. Mitzenmacher, and J. Thaler. 2012. Practical verified computation with streaming interactive proofs. In Proc. of ACM ITCS.
[26]
C. Costello, C. Fournet, J. Howell, M. Kohlweiss, B. Kreuter, M. Naehrig, B. Parno, and S. Zahur. 2015. Geppetto: Versatile verifiable computation. In Proc. of IEEE S&P.
[27]
K. Fan, S. Liu, and P. Sinha. 2006. Scalable data aggregation for dynamic events in sensor networks. In Proc. of the ACM SenSys.
[28]
J. Gao, L. Guibas, N. Milosavljevic, and J. Hershberger. 2007. Sparse data aggregation in sensor networks. In Proc. of ACM IPSN.
[29]
R. Gennaro, C. Gentry, and B. Parno. 2010. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Cryptology.
[30]
M. Gerla, E. Lee, G. Pau, and U. Lee. 2014. Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. In Proc. of IEEE WF-IoT.
[31]
S. Goldwasser, S. Micali, and R. L. Rivest. 1988. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 2 (1988).
[32]
M. T. Goodrich, R. Tamassia, and N. Triandopoulos. 2008. Super-efficient verification of dynamic outsourced databases. In CT-RSA.
[33]
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami. 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems 29, 7 (2013).
[34]
T. Gupta, R. P. Singh, A. Phanishayee, J. Jung, and R. Mahajan. 2014. Bolt: Data management for connected homes. In Proc. of USEIX NSDI.
[35]
J. Han, C. Qian, Y. Yang, G. Wang, H. Ding, X. Li, and K. Ren. 2018. Butterfly: Environment-Independent Physical-Layer Authentication for Passive RFID. In Proc. of ACM UbiCom.
[36]
C. Ho, R. Agrawal, N. Megiddo, and R. Srikant. 1997. Range queries in OLAP data cubes. In Proc. of ACM SIGMOD.
[37]
J. Jonsson, K. Moriarty, B. Kaliski, and A. Rusch. 2016. PKCS# 1: RSA Cryptography Specifications Version 2.2. https://tools.ietf.org/html/rfc8017. (2016).
[38]
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. 2006. Dynamic authenticated index structures for outsourced databases. In Proc ACM SIGMOD.
[39]
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. 2010. Authenticated index structures for aggregation queries. ACM TISSEC 13, 4 (2010), 32.
[40]
J. Li, L. Zhang, J. K. Liu, H. Qian, and Z. Dong. 2016. Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud. IEEE Transactions on Information Forensics and Security 11, 11 (2016).
[41]
X. Li, M. Wang, H. Wang, Y. Yu, and C. Qian. 2019. Toward Secure and Efficient Communication for the Internet of Things. IEEE/ACM ToN (2019).
[42]
Prince Mahajan, Srinath Setty, Sangmin Lee, Allen Clement, Lorenzo Alvisi, Mike Dahlin, and Michael Walfish. 2011. Depot: Cloud Storage with Minimal Trust. ACM Trans. Comput. Syst. 29, 4, Article 12 (Dec. 2011), 38 pages.
[43]
R. C. Merkle. 1987. A digital signature based on a conventional encryption function. In Proc. of CRYPTO.
[44]
B. Moon, H. V. Jagadish, C. Faloutsos, and J. H. Saltz. 2001. Analysis of the clustering properties of the Hilbert space-filling curve. IEEE TKDE 13, 1 (2001).
[45]
G. M. Morton. 1966. A computer oriented geodetic data base and a new technique in file sequencing. (1966).
[46]
S. Nishimura and H. Yokota. 2017. QUILTS: Multidimensional Data Partitioning Framework Based on Query-Aware and Skew-Tolerant Space-Filling Curves. In Proc. of ACM SIGMOD.
[47]
J. A. Orenstein and T. H. Merrett. 1984. A class of data structures for associative searching. In Proc. of ACM PODS.
[48]
H. Pang, J. Zhang, and K. Mouratidis. 2009. Scalable verification for outsourced dynamic databases. In Proc. of the VLDB Endowment.
[49]
D. Papadopoulos, S. Papadopoulos, and N. Triandopoulos. 2014. Taking authenticated range queries to arbitrary dimensions. In Proc. of ACM CCS.
[50]
C. Papamanthou, E. Shi, and R. Tamassia. 2013. Signatures of correct computation. In Theory of Cryptography.
[51]
R. Ada Popa, C. Redfield, N. Zeldovich, and H. Balakrishnan. 2011. CryptDB: protecting confidentiality with encrypted query processing. In Proc. of ACM SOSP.
[52]
L. Schabhüser, J. Buchmann, and P. Struck. 2017. A Linearly Homomorphic Signature Scheme from Weaker Assumptions. In IMA International Conference on Cryptography and Coding.
[53]
S. Setty, B. Braun, V. Vu, A. J. Blumberg, B. Parno, and M. Walfish. 2013. Resolving the conflict between generality and plausibility in verified computation. In Proc. of ACM Eurosys.
[54]
A. J. Smith. 1978. Sequentiality and prefetching in database systems. ACM TODS 3, 3 (1978).
[55]
C. Wang, Q. Wang, K. Ren, and W. Lou. 2009. Ensuring Data Storage Security in Cloud Computing. In Proc. of IEEE IWQoS.
[56]
C. Wang, Q. Wang, K. Ren, and W. Lou. 2010. Privacy-preserving public auditing for data storage security in cloud computing. In Proc. of IEEE INFOCOM.
[57]
G. Wang, H. Cai, C. Qian, J. Han, X. Li, H. Ding, and J. Zhao. 2018. Towards Replay-resilient RFID Authentication. In Proc. of ACM Mobicom.
[58]
G. Wang, J. Han, C. Qian, W. Xi, H. Ding, Z. Jiang, and J. Zhao. 2018. Verifiable smart packaging with passive RFID. IEEE TMC (2018).
[59]
H. Wang, X. Li, Y. Zhao, Y. Yu, H. Yang, and C. Qian. 2016. SICS: Secure In-Cloud Service Function Chaining. arXiv preprint arXiv:1606.07079 (2016).
[60]
M Wang, X. Li, S. Shi, and C. Qian. 2019. Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching. In Proc. of IEEE INFOCOM.
[61]
Z. Xia, X. Wang, X. Sun, and Q. Wang. 2016. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE TPDS 27, 2 (2016).
[62]
Y. Yang, D. Papadias, S. Papadopoulos, and P. Kalnis. 2009. Authenticated join processing in outsourced databases. In Proc. of ACM SIGMOD.
[63]
Y. Zhang, L. Duan, and J. L. Chen. 2014. Event-driven soa for iot services. In Proc. of IEEE SCC.
[64]
Y. Zhang, J. Katz, D. Genkin, D. Papadopoulos, and C. Papamanthou. 2017. vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases. In Proc. of IEEE S&P.
[65]
Y. Zhang, J. Katz, and C. Papamanthou. 2015. IntegriDB: Verifiable SQL for outsourced databases. In ACM CCS.
[66]
Q. Zheng, S. Xu, and G. Ateniese. 2012. Efficient query integrity for outsourced dynamic databases. In Proc. of ACM CCSW.

Cited By

View all
  • (2023)A Generalized Method to Combat Multipaths for RFID SensingIEEE/ACM Transactions on Networking10.1109/TNET.2022.319086231:1(336-351)Online publication date: Feb-2023
  • (2020)A Universal Method to Combat Multipaths for RFID SensingIEEE INFOCOM 2020 - IEEE Conference on Computer Communications10.1109/INFOCOM41043.2020.9155240(277-286)Online publication date: Jul-2020

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IoTDI '19: Proceedings of the International Conference on Internet of Things Design and Implementation
April 2019
299 pages
ISBN:9781450362832
DOI:10.1145/3302505
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

  • IEEE CS

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 April 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. the internet of things
  2. verifiable data outsourcing

Qualifiers

  • Research-article

Funding Sources

Conference

IoTDI '19
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)121
  • Downloads (Last 6 weeks)12
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)A Generalized Method to Combat Multipaths for RFID SensingIEEE/ACM Transactions on Networking10.1109/TNET.2022.319086231:1(336-351)Online publication date: Feb-2023
  • (2020)A Universal Method to Combat Multipaths for RFID SensingIEEE INFOCOM 2020 - IEEE Conference on Computer Communications10.1109/INFOCOM41043.2020.9155240(277-286)Online publication date: Jul-2020

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media