Download presentation
Presentation is loading. Please wait.
Published byJosephine Andrews Modified over 6 years ago
1
Methodologies for Data Preservation in IoT Platform
CSc 8320 Advanced Operating Systems Instructor: Prof. Yanqing Zhang Presented by Xu Zheng
2
IoT - Internet of Things
Integrate numerous applications. Involve dimensions of different contents. Support multiple service providers in a single platform. Extensible.
3
IoT - Supported by: Solutions from leading IT companies.
Low-cost devices for data acquisition. How do third-party servers request the data: Passively subscribing; Actively polling.
4
Privacy Issues Unique challenges for IoT : Diverse data sources, multiple service providers.
5
Existing methods Access Control Label-based Information Flow Control
Taint Tracking Static Analysis Computation on Opacified Data
6
Access Control
7
Access Control Drawbacks: only a “gate keeper”, no preservation once authorized.
8
Label-based Information Flow Control
9
Label-based Information Flow Control
Drawbacks: Over-preservation from the source, Label derivation, Side channel.
10
Taint Tracking: flow control
11
Taint Tracking: Flow control
Drawbacks: Knowledge from apps, Inability to effectively handle implicit flows, Performance reduction
12
Static Analysis: Flow analysis
13
Static Analysis: Flow analysis
Drawbacks: Also knowledge from apps, Inability to effectively handle implicit flows.
14
Computation on Opacified Data
15
Computation on Opacified Data
Drawbacks: Domain specific, only useful for specific kinds of data.
16
Future Work: Function-based access; Function validation;
Correlated utility and privacy; Collusion among Apps.
17
Reference [1] Kassem Fawaz H F, Shin K G. Anatomization and Protection of Mobile Apps’ Location Privacy Threats[C]//Proceedings of the 24th USENIX Conference on Security Symposium, SEC. 15. [2] Jana S, Narayanan A, Shmatikov V. A Scanner Darkly: Protecting user privacy from perceptual applications[C]//Security and Privacy (SP), 2013 IEEE Symposium on. IEEE, 2013: [3] ROESNER, F., KOHNO, T., MOSHCHUK, A., PARNO, B., WANG, H. J., AND COWAN, C. User-driven access control: Re- thinking permission granting in modern operating systems. In IEEE S&P (2012). [4] STEFAN,D.,YANG,E.Z.,MARCHENKO,P.,RUSSO,A.,HER- MAN, D., KARP, B., AND MAZIE`RES, D. Protecting users by con ning javascript with cowl. In OSDI (2014). [5] ENCK, W., GILBERT, P., CHUN, B.-G., COX, L. P., JUNG, J., MCDANIEL, P., AND SHETH, A. N. Taintdroid: an information- ow tracking system for realtime privacy monitoring on smart- phones. In OSDI (2010). [6] WEI, F., ROY, S., OU, X., AND ROBBY. Amandroid: A pre- cise and general inter-component data ow analysis framework for security vetting of android apps. In ACM SIGSAC Conference on Computer and Communications Security (CCS) (2014).
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.