Towards blockchain-based auditable storage and sharing of IoT data

H Shafagh, L Burkhalter, A Hithnawi… - Proceedings of the 2017 …, 2017 - dl.acm.org
Today the cloud plays a central role in storing, processing, and distributing data. Despite
contributing to the rapid development of IoT applications, the current IoT cloud-centric …

The design and implementation of a wireless video surveillance system

T Zhang, A Chowdhery, P Bahl, K Jamieson… - Proceedings of the 21st …, 2015 - dl.acm.org
Internet-enabled cameras pervade daily life, generating a huge amount of data, but most of
the video they generate is transmitted over wires and analyzed offline with a human in the …

The cloud is not enough: Saving {IoT} from the cloud

B Zhang, N Mor, J Kolb, DS Chan, K Lutz… - 7th USENIX Workshop …, 2015 - usenix.org
The Internet of Things (IoT) represents a new class of applications that can benefit from
cloud infrastructure. However, the current approach of directly connecting smart devices to …

Time series management systems: A survey

SK Jensen, TB Pedersen… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The collection of time series data increases as more monitoring and automation are being
deployed. These deployments range in scale from an Internet of things (IoT) device located …

Trustworthy IoT data streaming using blockchain and IPFS

HR Hasan, K Salah, I Yaqoob, R Jayaraman… - IEEE …, 2022 - ieeexplore.ieee.org
Today's resource-constrained IoT streaming devices generate large amounts of data which
is stored, processed, analyzed for value creation, and accessed using centralized systems …

Log2: A {Cost-Aware} logging mechanism for performance diagnosis

R Ding, H Zhou, JG Lou, H Zhang, Q Lin, Q Fu… - 2015 USENIX annual …, 2015 - usenix.org
Logging has been a common practice for monitoring and diagnosing performance issues.
However, logging comes at a cost, especially for large-scale online service systems. First …

Droplet: Decentralized authorization and access control for encrypted data streams

H Shafagh, L Burkhalter, S Ratnasamy… - 29th USENIX Security …, 2020 - usenix.org
This paper presents Droplet, a decentralized data access control service. Droplet enables
data owners to securely and selectively share their encrypted data while guaranteeing data …

{TimeCrypt}: Encrypted data stream processing at scale with cryptographic access control

L Burkhalter, A Hithnawi, A Viand, H Shafagh… - … USENIX Symposium on …, 2020 - usenix.org
A growing number of devices and services collect detailed time series data that is stored in
the cloud. Protecting the confidentiality of this vast and continuously generated data is an …

Pinto: enabling video privacy for commodity iot cameras

H Yu, J Lim, K Kim, SB Lee - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
With various IoT cameras today, sharing of their video evidences, while benefiting the public,
threatens the privacy of individuals in the footage. However, protecting visual privacy without …

{WearDrive}: Fast and {Energy-Efficient} Storage for Wearables

J Huang, A Badam, R Chandra… - 2015 USENIX Annual …, 2015 - usenix.org
Size and weight constraints on wearables limit their battery capacity and restrict them from
providing rich functionality. The need for durable and secure storage for personal data …