{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:08:44Z","timestamp":1766066924061,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,11,14]],"date-time":"2018-11-14T00:00:00Z","timestamp":1542153600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,11,14]],"date-time":"2018-11-14T00:00:00Z","timestamp":1542153600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1054629"],"award-info":[{"award-number":["1054629"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"AFOSR","doi-asserted-by":"crossref","award":["FA9550-12-1-0077","FA9550-14-1-0173"],"award-info":[{"award-number":["FA9550-12-1-0077","FA9550-14-1-0173"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"crossref"}]},{"name":"NSA","award":["H98230-15-1-0271"],"award-info":[{"award-number":["H98230-15-1-0271"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11227-018-2686-x","type":"journal-article","created":{"date-parts":[[2018,11,14]],"date-time":"2018-11-14T07:19:32Z","timestamp":1542179972000},"page":"4684-4709","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Secure data processing for IoT middleware systems"],"prefix":"10.1007","volume":"75","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7567-876X","authenticated-orcid":false,"given":"Gbadebo","family":"Ayoade","sequence":"first","affiliation":[]},{"given":"Amir","family":"El-Ghamry","sequence":"additional","affiliation":[]},{"given":"Vishal","family":"Karande","sequence":"additional","affiliation":[]},{"given":"Latifur","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Alrahmawy","sequence":"additional","affiliation":[]},{"given":"Magdi Zakria","family":"Rashad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,14]]},"reference":[{"key":"2686_CR1","unstructured":"Intel software guard extensions remote attestation end-to-end example (2016)"},{"key":"2686_CR2","unstructured":"ARM A (2009) Security technology building a secure system using trustzone technology (white paper). ARM Limited"},{"key":"2686_CR3","unstructured":"Arnautov S, Trach B, Gregor F, Knauth T, Martin A, Priebe C, Lind J, Muthukumaran D, O\u2019Keeffe D, Stillwell ML, Goltzsche D, Eyers D, Kapitza R, Pietzuch P, Fetzer C (2016) Scone: secure linux containers with intel sgx. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), pp 689\u2013703. USENIX Association, GA. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/arnautov"},{"key":"2686_CR4","doi-asserted-by":"publisher","unstructured":"Bagci IE, Roedig U, Martinovic I, Schulz M, Hollick M (2015) Using channel state information for tamper detection in the internet of things. In: Proceedings of the 31st Annual Computer Security Applications Conference, ACSAC 2015, pp 131\u2013140. ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/2818000.2818028","DOI":"10.1145\/2818000.2818028"},{"key":"2686_CR5","doi-asserted-by":"crossref","unstructured":"Bajaj S, Sion R (2011) a trusted hardware based database with privacy and dataconfidentiality. In: Proceedings of the 2011 ACM SIGMODInternational Conference on Management of data, ACM, pp 205\u2013216","DOI":"10.1145\/1989323.1989346"},{"issue":"7","key":"2686_CR6","doi-asserted-by":"publisher","first-page":"529","DOI":"10.14778\/2536349.2536353","volume":"6","author":"S Bajaj","year":"2013","unstructured":"Bajaj S, Sion R (2013) Correctdb: Sql engine with practical query authentication. Proc VLDB Endow 6(7):529\u2013540","journal-title":"Proc VLDB Endow"},{"issue":"3","key":"2686_CR7","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/2799647","volume":"33","author":"A Baumann","year":"2015","unstructured":"Baumann A, Peinado M, Hunt G (2015) Shielding applications from an untrusted cloud with haven. ACM Trans Comput Syst (TOCS) 33(3):8","journal-title":"ACM Trans Comput Syst (TOCS)"},{"key":"2686_CR8","doi-asserted-by":"crossref","unstructured":"Bellare M, Canetti R, Krawczyk H (1996) Keying hash functions for message authentication. In: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO \u201996, Springer, London, pp 1\u201315. http:\/\/dl.acm.org\/citation.cfm?id=646761.706031","DOI":"10.1007\/3-540-68697-5_1"},{"key":"2686_CR9","doi-asserted-by":"crossref","unstructured":"Brenner S, Wulf C, Goltzsche D, Weichbrodt N, Lorenz M, Fetzer C, Pietzuch P, Kapitza R (2016) Securekeeper: Confidential zookeeper using intel sgx. In: Proceedings of the 16th Annual MiddlewareConference (Middleware)","DOI":"10.1145\/2988336.2988350"},{"key":"2686_CR10","doi-asserted-by":"crossref","unstructured":"Busold C, Heuser S, Rios J, Sadeghi AR, Asokan N (2015) Smart and secure cross-device apps for the internet of advanced things. In: International Conference on Financial Cryptography and DataSecurity. Springer, pp 272\u2013290","DOI":"10.1007\/978-3-662-47854-7_17"},{"key":"2686_CR11","doi-asserted-by":"crossref","unstructured":"Chandra S, Karande V, Lin Z, Khan L, Kantarcioglu M, Thuraisingham B (2017) Securing dataanalytics on sgx with randomization. In: Proceedings of the 2017 European Symposium on Researchin Computer Security (ESORICS), Oslo, Norway. (To appear)","DOI":"10.1007\/978-3-319-66402-6_21"},{"key":"2686_CR12","unstructured":"Costan V, Devadas S (2016) Intel SGX explained. IACR Cryptology ePrint Archive 2016, 86. http:\/\/eprint.iacr.org\/2016\/086"},{"key":"2686_CR13","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/2.955100","volume":"10","author":"JG Dyer","year":"2001","unstructured":"Dyer JG, Lindemann M, Perez R, Sailer R, Van Doorn L, Smith SW, Weingart S (2001) Building the ibm 4758 secure coprocessor. Computer 10:57\u201366","journal-title":"Computer"},{"key":"2686_CR14","doi-asserted-by":"crossref","unstructured":"Fernandes E, Jung J, Prakash A (2016) Security analysis of emerging smart home applications. In: 2016 IEEE Symposium on Security and Privacy (SP). IEEE, pp 636\u2013654","DOI":"10.1109\/SP.2016.44"},{"key":"2686_CR15","unstructured":"Fernandes E, Paupore J, Rahmati A, Simionato D, Conti M, Prakash A (2016) Flowfence: practical data protection for emerging iot application frameworks. In: 25th USENIX Security Symposium (USENIX Security 16), pp 531\u2013548. USENIX Association, Austin, TX. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/fernandes"},{"key":"2686_CR16","unstructured":"Fisher D (2015) Pair of bugs open honeywell home controllers up to easy hacks. https:\/\/threatpost.com\/pair-of-bugsopen-honeywell-home-controllers-up-to-easy-hacks\/113965\/"},{"key":"2686_CR17","unstructured":"Fouladi B, Ghanoun S (2013) Honey, i\u2019m home!!, hacking zwave home automation systems. Black Hat USA"},{"key":"2686_CR18","doi-asserted-by":"publisher","unstructured":"Gonzalez NM, Goya WA, de Fatima Pereira R, Langona K, Silva EA, de Brito Carvalho TCM, Miers CC, M\u00e5ngs JE, Sefidcon A (2016) Fog computing: data analytics and cloud distributedprocessing on the network edges. In: 2016 35th InternationalConference of the Chilean Computer Science Society (SCCC), pp 1\u20139. https:\/\/doi.org\/10.1109\/SCCC.2016.7836028","DOI":"10.1109\/SCCC.2016.7836028"},{"key":"2686_CR19","doi-asserted-by":"publisher","unstructured":"G\u00f6tzfried J, Eckert M, Schinzel S, M\u00fcller T (2017) Cache attacks on intel sgx. In: Proceedings of the 10th EuropeanWorkshop on Systems Security, EuroSec\u201917, pp 2:1\u20132:6. ACM, NewYork. https:\/\/doi.org\/10.1145\/3065913.3065915","DOI":"10.1145\/3065913.3065915"},{"key":"2686_CR20","unstructured":"Guide ACGS (2016) Amazon web services, nov"},{"key":"2686_CR21","unstructured":"Hesseldahl, A (2015) A hackers-eye view of the internet of things. Recode. net, Apr 7"},{"key":"2686_CR22","unstructured":"Hunt, T, Zhu, Z, Xu, Y, Peter, S, Witchel, E (2016) Ryoan: A distributed sandbox for untrusted computation on secret data. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), pp. 533\u2013549. USENIX Association, GA. URL https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/hunt"},{"key":"2686_CR23","unstructured":"Intel: Intel Software Guard Extensions Programming Reference ((rev1)) (2013):329298\u2013001US"},{"key":"2686_CR24","unstructured":"Intel: Intel Software Guard Extensions Programming Reference ((rev2)) (2014):329298\u2013002US"},{"key":"2686_CR25","doi-asserted-by":"publisher","unstructured":"Karande V, Bauman E, Lin Z, Khan L (2017) Sgx-log: Securing system logs with sgx. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS \u201917, pp. 19\u201330. ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/3052973.3053034","DOI":"10.1145\/3052973.3053034"},{"key":"2686_CR26","unstructured":"Kim S, Han J, Ha J, Kim T, Han D (2017) Enhancing security and privacy of tor\u2019s ecosystem by using trusted execution environments. In: 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), pp. 145\u2013161. USENIX Association, Boston, MA. URL https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/kim-seongmin"},{"key":"2686_CR27","doi-asserted-by":"publisher","unstructured":"Kim S, Shin Y, Ha J, Kim T, Han D (2015) A first step towards leveraging commodity trusted execution environments for network applications. In: Proceedings of the 14th ACM Workshop on Hot Topics in Networks, HotNets-XIV, pp 7:1\u20137:7. ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/2834050.2834100","DOI":"10.1145\/2834050.2834100"},{"key":"2686_CR28","doi-asserted-by":"publisher","unstructured":"Krawiecka K, Paverd A, Asokan N (2016) Protecting password databases using trusted hardware. In: Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX \u201916, pp. 9:1\u20139:6. ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/3007788.3007798","DOI":"10.1145\/3007788.3007798"},{"key":"2686_CR29","unstructured":"Lind J, Eyal I, Pietzuch P, Sirer EG (2016) Teechan: Payment channels using trusted execution environments. arXiv preprint arXiv:1612.07766"},{"key":"2686_CR30","unstructured":"Lomas N (2015) Critical flaw identified in zigbee smart home devices"},{"key":"2686_CR31","first-page":"48","volume":"2017","author":"S Matetic","year":"2017","unstructured":"Matetic S, Ahmed M, Kostiainen K, Dhar A, Sommer D, Gervais A, Juels A, Capkun S (2017) Rote: rollback protection for trusted execution. IACR Cryptol ePrint Arch 2017:48","journal-title":"IACR Cryptol ePrint Arch"},{"key":"2686_CR32","doi-asserted-by":"crossref","unstructured":"McCune JM, Parno BJ, Perrig A, Reiter MK, Isozaki H (2008) Flicker: an execution infrastructure for tcb minimization. In: ACM SIGOPS Operating Systems Review, vol 42. ACM, pp 315\u2013328","DOI":"10.1145\/1357010.1352625"},{"key":"2686_CR33","doi-asserted-by":"crossref","unstructured":"McKeen F, Alexandrovich I, Berenzon A, Rozas CV, Shafi H, Shanbhogue V, Savagaonkar UR (2013) Innovative instructions and software model for isolated execution. HASP@ ISCA 10","DOI":"10.1145\/2487726.2488368"},{"key":"2686_CR34","unstructured":"Module TP (2011) Main specification, level 2, version 1.2, revision 116"},{"key":"2686_CR35","doi-asserted-by":"crossref","unstructured":"Munir A, Kansakar P, Khan SU (2017) Ifciot: Integrated fog cloud iot architectural paradigm for future internet of things. CoRR arXiv:1701.08474","DOI":"10.1109\/MCE.2017.2684981"},{"key":"2686_CR36","unstructured":"Pa YMP, Suzuki S, Yoshioka K, Matsumoto T, Kasama T, Rossow C (2015) Iotpot: Analysing the rise of iot compromises. In: 9th USENIX Workshop on Offensive Technologies (WOOT 15). USENIX Association, Washington, D.C. URL https:\/\/www.usenix.org\/conference\/woot15\/workshop-program\/presentation\/pa"},{"key":"2686_CR37","unstructured":"Pattuk E, Kantarcioglu M, Lin Z, Ulusoy H (2014) Preventing cryptographic key leakage in cloud virtual machines. In: Proceedings of the 2014 USENIX Security Symposium. San Diego, CA"},{"issue":"1","key":"2686_CR38","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/JIOT.2015.2498900","volume":"3","author":"MA Razzaque","year":"2016","unstructured":"Razzaque MA, Milojevic-Jevric M, Palade A, Clarke S (2016) Middleware for internet of things: a survey. IEEE Internet Things J 3(1):70\u201395. https:\/\/doi.org\/10.1109\/JIOT.2015.2498900","journal-title":"IEEE Internet Things J"},{"key":"2686_CR39","doi-asserted-by":"crossref","unstructured":"Salowey J, Choudhury A, McGrew D (2008) Aes galois counter mode (gcm) cipher suites for tls. Tech. rep","DOI":"10.17487\/rfc5288"},{"issue":"1","key":"2686_CR40","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1145\/2654822.2541949","volume":"42","author":"N Santos","year":"2014","unstructured":"Santos N, Raj H, Saroiu S, Wolman A (2014) Using arm trustzone to build a trusted language runtime for mobile applications. ACM SIGARCH Comput Archit News 42(1):67\u201380","journal-title":"ACM SIGARCH Comput Archit News"},{"key":"2686_CR41","doi-asserted-by":"crossref","unstructured":"Schuster F, Costa M, Fournet C, Gkantsidis C, Peinado M, Mainar-Ruiz G, Russinovich M (2015) Vc3: Trustworthy data analytics in the cloud using sgx. In: 2015 IEEE Symposium on Security and Privacy (SP). IEEE, pp 38\u201354","DOI":"10.1109\/SP.2015.10"},{"key":"2686_CR42","doi-asserted-by":"crossref","unstructured":"Seo J, Lee B, Kim S.M, Shih MW, Shin I, Han D, Kim T (2017) Sgx-shield: enabling address space layout randomization for sgx programs. In: NDSS","DOI":"10.14722\/ndss.2017.23037"},{"key":"2686_CR43","doi-asserted-by":"publisher","unstructured":"Shi Y, Wei W, He Z, Fan H (2016) An ultra-lightweight white-box encryption scheme for securing resource-constrained iot devices. In: Proceedings of the 32Nd Annual Conference on Computer Security Applications, ACSAC \u201916. ACM, New York, pp. 16\u201329. https:\/\/doi.org\/10.1145\/2991079.2991086","DOI":"10.1145\/2991079.2991086"},{"key":"2686_CR44","doi-asserted-by":"crossref","unstructured":"Shinde S, Le Tien D, Tople S, Saxena P (2016) Panoply: Low-tcb linux applications with sgx enclaves. National University of Singapore, Tech. Rep","DOI":"10.14722\/ndss.2017.23500"},{"key":"2686_CR45","doi-asserted-by":"publisher","unstructured":"Yang L, Humayed A, Li F (2016) A multi-cloud based privacy-preserving data publishing scheme for the internet of things. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC \u201916. ACM, New York, pp 30\u201339. https:\/\/doi.org\/10.1145\/2991079.2991127","DOI":"10.1145\/2991079.2991127"},{"key":"2686_CR46","doi-asserted-by":"crossref","unstructured":"Zhang F, Cecchetti E, Croman K, Juels A, Shi, E.: Town, (2016) Towncrier: An authenticated data feed for smart contracts. In:Proceedings of the 2016 aCM sIGSAC Conference on Computer and Communications Security. ACM, pp 270\u2013282","DOI":"10.1145\/2976749.2978326"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2686-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-018-2686-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2686-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T23:08:42Z","timestamp":1662419322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-018-2686-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,14]]},"references-count":46,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["2686"],"URL":"https:\/\/doi.org\/10.1007\/s11227-018-2686-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2018,11,14]]},"assertion":[{"value":"14 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}