%0 Conference Proceedings %T Using Trusted Execution Environments for Secure Stream Processing of Medical Data %+ Centre Suisse d'Electronique et Microtechnique SA (CSEM) %+ Imperial College London %+ Université de Neuchâtel = University of Neuchatel (UNINE) %A Segarra, Carlos %A Delgado-Gonzalo, Ricard %A Lemay, Mathieu %A Aublin, Pierre-Louis %A Pietzuch, Peter %A Schiavoni, Valerio %< avec comité de lecture %( Lecture Notes in Computer Science %B 19th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS) %C Kongens Lyngby, Denmark %Y José Pereira %Y Laura Ricci %I Springer International Publishing %3 Distributed Applications and Interoperable Systems %V LNCS-11534 %P 91-107 %8 2019-06-17 %D 2019 %R 10.1007/978-3-030-22496-7_6 %K Spark %K Data streaming %K Intel SGX %K Medical data %K Case-study %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X Processing sensitive data, such as those produced by body sensors, on third-party untrusted clouds is particularly challenging without compromising the privacy of the users generating it. Typically, these sensors generate large quantities of continuous data in a streaming fashion. Such vast amount of data must be processed efficiently and securely, even under strong adversarial models. The recent introduction in the mass-market of consumer-grade processors with Trusted Execution Environments (TEEs), such as Intel SGX, paves the way to implement solutions that overcome less flexible approaches, such as those atop homomorphic encryption. We present a secure streaming processing system built on top of Intel SGX to showcase the viability of this approach with a system specifically fitted for medical data. We design and fully implement a prototype system that we evaluate with several realistic datasets. Our experimental results show that the proposed system achieves modest overhead compared to vanilla Spark while offering additional protection guarantees under powerful attackers and threat models. %G English %Z TC 6 %Z WG 6.1 %2 https://inria.hal.science/hal-02319566/document %2 https://inria.hal.science/hal-02319566/file/485766_1_En_6_Chapter.pdf %L hal-02319566 %U https://inria.hal.science/hal-02319566 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC6 %~ IFIP-WG6-1 %~ IFIP-DAIS %~ IFIP-DISCOTEC %~ IFIP-LNCS-11534