Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Poster: Towards cryptographic agility in end-to-end encryption systems for computer generated telemetry data
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.ORCID iD: 0000-0003-0183-3613
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.ORCID iD: 0000-0002-0518-6532
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.ORCID iD: 0000-0001-5629-5205
2024 (English)In: HOTMOBILE 2024 - Proceedings of the 2024 25th International Workshop on Mobile Computing Systems and Applications, Association for Computing Machinery (ACM), 2024, p. 144-Conference paper, Poster (with or without abstract) (Other academic)
Abstract [en]

The research presented focuses on cryptographic-agility for End-to-End Encryption systems (E2EE) that could be implemented for telemetry data encryption. The recent report 1 by Microsoft after a security incident, describes the consequences that lead to encryption key leakage from telemetry data of highly protected production system. Internet of Things (IoT) and mobile devices constantly produce telemetry data which contains sensitive information. The data partially belongs to vendor, but IoT consumer’s consent is needed to access such data for troubleshooting or forensic analysis. Goyal et al [2] proposed Attribute Based Encryption (ABE) as a solution for legitimately access the audit log contents by engineering team. © 2024 Copyright held by the owner/author(s).

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2024. p. 144-
Keywords [en]
Cryptography, Mobile telecommunication systems, Sensitive data, Telemetering equipment, Computer generated, CryptoGraphics, Data encryption, Encryption key, Encryption system, End-to-end encryption, MicroSoft, Production system, Security incident, Telemetry data, Internet of things
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:bth-26065DOI: 10.1145/3638550.3643624ISI: 001278360200032Scopus ID: 2-s2.0-85187203995ISBN: 9798400704970 (print)OAI: oai:DiVA.org:bth-26065DiVA, id: diva2:1847338
Conference
25th International Workshop on Mobile Computing Systems and Applications, HOTMOBILE 2024, San Diego, 28 February through 29 February 2024
Available from: 2024-03-27 Created: 2024-03-27 Last updated: 2024-09-11Bibliographically approved

Open Access in DiVA

fulltext(356 kB)165 downloads
File information
File name FULLTEXT01.pdfFile size 356 kBChecksum SHA-512
52308530f7c697af2ee93690b58d981cd821a0d67cab633eedda8c1786682265fcbbf0b3d49d6af32477043581769a5b408c38764520b625dc639c86887d3562
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Silonosov, AlexandrHenesey, LawrenceBaranovskyi, Oleksii

Search in DiVA

By author/editor
Silonosov, AlexandrHenesey, LawrenceBaranovskyi, Oleksii
By organisation
Department of Computer Science
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 165 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 292 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf