Abstract

Leveraging low-cost public clouds for gathering and processing data from large numbers of devices is an appealing approach to unleash the potential of the Internet of Things (IoT). This combination of clouds with the IoT—dubbed Cloud of Things (CoT)—is, however, built on insecure foundations. Public clouds exhibit inherent security vulnerabilities due to multitenancy, and adding resource-constrained IoT devices deployed in the wild further complicates cyber trust. A promising avenue consists in intelligently utilizing partially homomorphic encryption to compute on data in an encrypted form in an untrusted cloud. We summarize experiences gathered while transitioning this vision for confidentiality-preserving CoT to practice for processing continuous queries on streams of sensitive data generated by IoT devices.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.