ACKNOWLEDGEMENT
This research has received funding from the EU re-
search projects ASCLEPIOS (No. 826093) and CY-
BELE (No 825355).
REFERENCES
(2019). Edge computing vs. fog computing: Definitions and
enterprise uses.
Bakas, A. and Michalas, A. (2019a). Modern family: A re-
vocable hybrid encryption scheme based on attribute-
based encryption, symmetric searchable encryption
and sgx. In International Conference on Security and
Privacy in Communication Systems, pages 472–486.
Springer.
Bakas, A. and Michalas, A. (2019b). Multi-client symmet-
ric searchable encryption with forward privacy. IACR
Cryptology ePrint Archive, 2019:813.
Cao, M., Wang, L., Qin, Z., and Lou, C. (2019).
A lightweight fine-grained search scheme over en-
crypted data in cloud-assisted wireless body area net-
works. Wireless Communications and Mobile Com-
puting, 2019:1–12.
Costan, V. and Devadas, S. (2016). Intel sgx explained.
IACR Cryptology ePrint Archive, 2016(086):1–118.
Dimitriou, T. and Michalas, A. (2014). Multi-party trust
computation in decentralized environments in the
presence of malicious adversaries. Ad Hoc Networks,
15:53–66.
Dowsley, R., Michalas, A., and Nagel, M. (2016). A report
on design and implementation of protected searchable
data in iaas. Technical report, Swedish Institute of
Computer Science (SICS).
Dowsley, R., Michalas, A., Nagel, M., and Paladi, N.
(2017). A survey on design and implementation of
protected searchable data in the cloud. Computer Sci-
ence Review.
Etemad, M., K
¨
upc¸
¨
u, A., Papamanthou, C., and Evans, D.
(2018). Efficient dynamic searchable encryption with
forward privacy. Proceedings on Privacy Enhancing
Technologies, 2018(1):5–20.
Fan, Y., Zhao, G., Sun, X., Wang, J., Lei, X., Xia, F., and
Peng, C. (2019). A security scheme for fog computing
environment of iot. Proceedings of the 2nd Interna-
tional ACM Workshop on Security and Privacy for the
Internet-of-Things - IoT S and P19.
Fisch, B., Vinayagamurthy, D., Boneh, D., and Gorbunov,
S. (2017). Iron: functional encryption using intel
sgx. In Proceedings of the 2017 ACM SIGSAC Con-
ference on Computer and Communications Security,
pages 765–782. ACM.
IEEE (2018). Ieee standard for adoption of openfog refer-
ence architecture for fog computing.
Kalinin, M., Krundyshev, V., Zegzhda, P., and Belenko, V.
(2017). Network security architectures for vanet. Pro-
ceedings of the 10th International Conference on Se-
curity of Information and Networks - SIN 17.
Kurniawan, A. (2018). Practical Contiki-NG: Program-
ming for Wireless Sensor Networks. Apress.
Lee, S., Shih, M.-W., Gera, P., Kim, T., Kim, H., and
Peinado, M. (2017). Inferring fine-grained control
flow inside {SGX} enclaves with branch shadowing.
In 26th {USENIX} Security Symposium ({USENIX}
Security 17), pages 557–574.
Michalas, A. (2019). The lord of the shares: Combin-
ing attribute-based encryption and searchable encryp-
tion for flexible data sharing. In Proceedings of the
34th ACM/SIGAPP Symposium on Applied Comput-
ing, SAC ’19, pages 146–155, New York, NY, USA.
ACM.
Michalas, A., Bakas, A., Dang, H.-V., and Zalitko, A.
(2019a). Abstract: Access control in searchable en-
cryption with the use of attribute-based encryption
and sgx. In Proceedings of the 2019 ACM SIGSAC
Conference on Cloud Computing Security Workshop,
CCSW’19, page 183, New York, NY, USA. Associa-
tion for Computing Machinery.
Michalas, A., Bakas, A., Dang, H.-V., and Zaltiko, A.
(2019b). Microscope: Enabling access control in
searchable encryption with the use of attribute-based
encryption and sgx. In Nordic Conference on Secure
IT Systems, pages 254–270. Springer.
Mukherjee, M., Matem, R., Shu, L., Maglaras, L., Amine,
M., Choudhury, N., and Kumar, V. (2017). Security
and privacy in fog computing: Challenges. IEEE Ac-
cess.
Ni, J., Zhang, K., Lin, X., and Shen, X. (2018). Secur-
ing fog computing for internet of things applications:
Challenges and solutions. IEEE Communications Sur-
veys and Tutorials, 20(1):601–628.
Paladi, N., Gehrmann, C., and Michalas, A. (2017). Pro-
viding user security guarantees in public infrastruc-
ture clouds. IEEE Transactions on Cloud Computing,
5(3):405–419.
Taha, M. and Schaumont, P. (2014). Side-channel counter-
measure for SHA-3 at almost-zero area overhead.
Wood, M. (2019). Tinycrypt.
Xu, Y., Cui, W., and Peinado, M. (2015). Controlled-
channel attacks: Deterministic side channels for un-
trusted operating systems. In 2015 IEEE Symposium
on Security and Privacy, pages 640–656. IEEE.
Zheng, Q., Xu, S., and Ateniese, G. (2014). Vabks: Veri-
fiable attribute-based keyword search over outsourced
encrypted data. IEEE INFOCOM 2014 - IEEE Con-
ference on Computer Communications.
Do Not Tell Me What I Cannot Do! (The Constrained Device Shouted under the Cover of the Fog): Implementing Symmetric Searchable
Encryption on Constrained Devices
129