Skip to main content

Towards an Open Framework Leveraging a Trusted Execution Environment

  • Conference paper
Cyberspace Safety and Security (CSS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8300))

Included in the following conference series:

Abstract

Sensor data is a core component of big data. The abundance of sensor data combined with advances in data integration and data mining entails a great opportunity to develop innovative applications. However, data about our movements, our energy consumption or our biometry are personal data that we should have full control over. Likewise, companies face a trade-off as the benefits of innovative services must be weighted against the risk of exposing data that reveal core internal processes. How to design a data platform that enables innovative data services and yet enforce access and usage control? The solutions proposed in the literature to this trade-off all involve some form of trusted execution environment, where data and processing is trusted and safe from corruption by users or attackers. The hardware that could support such trusted execution environments is however closed to the research community: OEMs disable security extensions from their development boards and the software handling these security extensions is not open. In this paper we present a framework that combines commercially available hardware and open source software. It can be used today by the research community as a trusted execution environment to investigate future big data platforms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ancieaux, N., Bonnet, P., Bouganim, L., Nguyen, B., Popa, L.S., Pucheral, P.: Trusted cells: A sea change for personal data services. In: CIDR (2013)

    Google Scholar 

  2. Amba®, A.: axitm and acetm protocol specification. Technical report, ARM (2013)

    Google Scholar 

  3. Abrahan, D.G., Dolan, G.M., Double, G.P., Stevens, J.V.: Transaction security system. IBM Systems Journal 30(2), 206–229 (1991)

    Article  Google Scholar 

  4. Gantz, J., Reinsel, D., Lee, R.: The digital universe in 2020: Big data, bigger digi tal shadows, and biggest growth in the far east. In: IDC (February 2013)

    Google Scholar 

  5. ImObersteg, G.: Arm trustzone extension delivers hardware security for next generation, opensystem, armpowered solutions. Intelligence 2, 6–12 (2003)

    Google Scholar 

  6. Katzenbeisser, S., Kursawe, K., Preneel, B., Sadeghi, A.-R.: Privacy and security in smart energy grids (dagstuhl seminar 11511). Dagstuhl Reports 1(12), 62–68 (2011)

    Google Scholar 

  7. Park, J., Sandhu, R.: The uconabc usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128–174 (2004)

    Article  Google Scholar 

  8. IEEE Computer Society. Data engineering. Bulleting of the Technical Committee on Data Engineering 35(4) (2012)

    Google Scholar 

  9. ARM Security Technology. Buiding a secure system using trustzone technology. Technical report, ARM (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

González, J., Bonnet, P. (2013). Towards an Open Framework Leveraging a Trusted Execution Environment. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds) Cyberspace Safety and Security. CSS 2013. Lecture Notes in Computer Science, vol 8300. Springer, Cham. https://doi.org/10.1007/978-3-319-03584-0_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03584-0_35

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03583-3

  • Online ISBN: 978-3-319-03584-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics