Efficient Data Tagging for Managing Privacy in the Internet of Things

被引:27
|
作者
Evans, David [1 ]
Eyers, David M. [2 ]
机构
[1] Univ Derby, Sch Comp & Math, Derby DE22 1GB, England
[2] Univ Otago, Dept Comp Sci, Dunedin, New Zealand
关键词
security; privacy; information flow control; embedded systems; sensors;
D O I
10.1109/GreenCom.2012.45
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things creates an environment where software systems are influenced and controlled by phenomena in the physical world. The goal is invisible and natural interactions with technology. However, if such systems are to provide a high-quality personalised service to individuals, they must by necessity gather information about those individuals. This leads to potential privacy invasion. Using techniques from Information Flow Control, data representing phenomena can be tagged with their privacy properties, allowing a trusted computing base to control access based on sensitivity and the system to reason about the flows of private data. For this to work well, tags must be assigned as soon as possible after phenomena are detected. Tagging within resource-constrained sensors raises worries that computing the tags may be too expensive and that useful tags are too large in relation to the data's size and the data's sensitivity. This paper assuages these worries, giving code templates for two small microcontrollers (PIC and AVR) that effect meaningful tagging.
引用
收藏
页码:244 / 248
页数:5
相关论文
共 50 条
  • [31] Internet of Things Security and Data Privacy Concerns in Smart Farming
    Gyamfi, Emmanuel Kojo
    Kropczynski, Jess
    Johnson, Joseph S.
    Yakubu, Mustapha A.
    [J]. 2024 IEEE 5TH ANNUAL WORLD AI IOT CONGRESS, AIIOT 2024, 2024, : 0575 - 0583
  • [32] A Secure Privacy Data Transmission Method for Medical Internet of Things
    Ye, Heping
    Yang, Jie
    Zhu, Junru
    Zhang, Ziyang
    Huang, Yakun
    Chen, Fulong
    [J]. INDUSTRIAL IOT TECHNOLOGIES AND APPLICATIONS, INDUSTRIAL IOT 2016, 2016, 173
  • [33] Aggregated Risk Modelling of Personal Data Privacy in Internet of Things
    Yang, Jinhong
    Kim, Chul-Soo
    Onik, Md Mehedi Hassan
    [J]. 2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 425 - 430
  • [34] Privacy Enhancing Techniques in the Internet of Things Using Data Anonymisation
    Ren, Wang
    Tong, Xin
    Du, Jing
    Wang, Na
    Li, Shancang
    Min, Geyong
    Zhao, Zhiwei
    [J]. INFORMATION SYSTEMS FRONTIERS, 2021,
  • [35] Privacy-Preserving Data Analytics in Internet of Medical Things
    Mudassar, Bakhtawar
    Tahir, Shahzaib
    Khan, Fawad
    Shah, Syed Aziz
    Shah, Syed Ikram
    Abbasi, Qammer Hussain
    [J]. Future Internet, 2024, 16 (11):
  • [36] Secure Data Aggregation Aided by Privacy Preserving in Internet of Things
    Liu, X.
    Wang, X.
    Yu, K.
    Yang, X.
    Ma, W.
    Li, G.
    Zhao, X.
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [37] Efficient and privacy-preserving certificateless data aggregation in Internet of things-enabled smart grid
    Sun, Aijing
    Wu, Axin
    Zheng, Xiaokun
    Ren, Fangyuan
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04)
  • [38] Security and Privacy in the Internet of Things
    Seitz, Ludwig
    [J]. ERCIM NEWS, 2015, (101): : 17 - 17
  • [39] Privacy Implications of the Internet of Things
    Gudymenko, Ivan
    Borcea-Pfitzmann, Katrin
    Tietze, Katja
    [J]. CONSTRUCTURING AMBIENT INTELLIGENCE, 2012, 277 : 280 - 286
  • [40] Security and privacy of the Internet of Things
    Strous, Leon
    von Solms, Sune
    Zuquete, Andre
    [J]. COMPUTERS & SECURITY, 2021, 102