Presentation is loading. Please wait.

Presentation is loading. Please wait.

Methodologies for Data Preservation in IoT Platform

Similar presentations


Presentation on theme: "Methodologies for Data Preservation in IoT Platform"— Presentation transcript:

1 Methodologies for Data Preservation in IoT Platform
CSc 8320 Advanced Operating Systems Instructor: Prof. Yanqing Zhang Presented by Xu Zheng

2 IoT - Internet of Things
Integrate numerous applications. Involve dimensions of different contents. Support multiple service providers in a single platform. Extensible.

3 IoT - Supported by: Solutions from leading IT companies.
Low-cost devices for data acquisition. How do third-party servers request the data: Passively subscribing; Actively polling.

4 Privacy Issues Unique challenges for IoT : Diverse data sources, multiple service providers.

5 Existing methods Access Control Label-based Information Flow Control
Taint Tracking Static Analysis Computation on Opacified Data

6 Access Control

7 Access Control Drawbacks: only a “gate keeper”, no preservation once authorized.

8 Label-based Information Flow Control

9 Label-based Information Flow Control
Drawbacks: Over-preservation from the source, Label derivation, Side channel.

10 Taint Tracking: flow control

11 Taint Tracking: Flow control
Drawbacks: Knowledge from apps, Inability to effectively handle implicit flows, Performance reduction

12 Static Analysis: Flow analysis

13 Static Analysis: Flow analysis
Drawbacks: Also knowledge from apps, Inability to effectively handle implicit flows.

14 Computation on Opacified Data

15 Computation on Opacified Data
Drawbacks: Domain specific, only useful for specific kinds of data.

16 Future Work: Function-based access; Function validation;
Correlated utility and privacy; Collusion among Apps.

17 Reference [1] Kassem Fawaz H F, Shin K G. Anatomization and Protection of Mobile Apps’ Location Privacy Threats[C]//Proceedings of the 24th USENIX Conference on Security Symposium, SEC. 15. [2] Jana S, Narayanan A, Shmatikov V. A Scanner Darkly: Protecting user privacy from perceptual applications[C]//Security and Privacy (SP), 2013 IEEE Symposium on. IEEE, 2013: [3] ROESNER, F., KOHNO, T., MOSHCHUK, A., PARNO, B., WANG, H. J., AND COWAN, C. User-driven access control: Re- thinking permission granting in modern operating systems. In IEEE S&P (2012). [4] STEFAN,D.,YANG,E.Z.,MARCHENKO,P.,RUSSO,A.,HER- MAN, D., KARP, B., AND MAZIE`RES, D. Protecting users by con ning javascript with cowl. In OSDI (2014). [5] ENCK, W., GILBERT, P., CHUN, B.-G., COX, L. P., JUNG, J., MCDANIEL, P., AND SHETH, A. N. Taintdroid: an information- ow tracking system for realtime privacy monitoring on smart- phones. In OSDI (2010). [6] WEI, F., ROY, S., OU, X., AND ROBBY. Amandroid: A pre- cise and general inter-component data ow analysis framework for security vetting of android apps. In ACM SIGSAC Conference on Computer and Communications Security (CCS) (2014).


Download ppt "Methodologies for Data Preservation in IoT Platform"

Similar presentations


Ads by Google