Abstract
Sensor data is a core component of big data. The abundance of sensor data combined with advances in data integration and data mining entails a great opportunity to develop innovative applications. However, data about our movements, our energy consumption or our biometry are personal data that we should have full control over. Likewise, companies face a trade-off as the benefits of innovative services must be weighted against the risk of exposing data that reveal core internal processes. How to design a data platform that enables innovative data services and yet enforce access and usage control? The solutions proposed in the literature to this trade-off all involve some form of trusted execution environment, where data and processing is trusted and safe from corruption by users or attackers. The hardware that could support such trusted execution environments is however closed to the research community: OEMs disable security extensions from their development boards and the software handling these security extensions is not open. In this paper we present a framework that combines commercially available hardware and open source software. It can be used today by the research community as a trusted execution environment to investigate future big data platforms.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Ancieaux, N., Bonnet, P., Bouganim, L., Nguyen, B., Popa, L.S., Pucheral, P.: Trusted cells: A sea change for personal data services. In: CIDR (2013)
Amba®, A.: axitm and acetm protocol specification. Technical report, ARM (2013)
Abrahan, D.G., Dolan, G.M., Double, G.P., Stevens, J.V.: Transaction security system. IBM Systems Journal 30(2), 206–229 (1991)
Gantz, J., Reinsel, D., Lee, R.: The digital universe in 2020: Big data, bigger digi tal shadows, and biggest growth in the far east. In: IDC (February 2013)
ImObersteg, G.: Arm trustzone extension delivers hardware security for next generation, opensystem, armpowered solutions. Intelligence 2, 6–12 (2003)
Katzenbeisser, S., Kursawe, K., Preneel, B., Sadeghi, A.-R.: Privacy and security in smart energy grids (dagstuhl seminar 11511). Dagstuhl Reports 1(12), 62–68 (2011)
Park, J., Sandhu, R.: The uconabc usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128–174 (2004)
IEEE Computer Society. Data engineering. Bulleting of the Technical Committee on Data Engineering 35(4) (2012)
ARM Security Technology. Buiding a secure system using trustzone technology. Technical report, ARM (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this paper
Cite this paper
González, J., Bonnet, P. (2013). Towards an Open Framework Leveraging a Trusted Execution Environment. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds) Cyberspace Safety and Security. CSS 2013. Lecture Notes in Computer Science, vol 8300. Springer, Cham. https://doi.org/10.1007/978-3-319-03584-0_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-03584-0_35
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03583-3
Online ISBN: 978-3-319-03584-0
eBook Packages: Computer ScienceComputer Science (R0)