Data provenance to audit compliance with privacy policy in the Internet of Things

被引:35
|
作者
Pasquier, Thomas [1 ]
Singh, Jatinder [2 ]
Powles, Julia [3 ]
Eyers, David [4 ]
Seltzer, Margo [1 ]
Bacon, Jean [2 ]
机构
[1] Harvard Univ, Ctr Res Computat & Soc, Cambridge, MA 02138 USA
[2] Univ Cambridge, Comp Lab, Cambridge, England
[3] Cornell Tech, Comp & Informat Sci, New York, NY USA
[4] Univ Otago, Dept Comp Sci, Dunedin, New Zealand
基金
英国工程与自然科学研究理事会; 美国国家科学基金会;
关键词
SECURITY; LANGUAGE;
D O I
10.1007/s00779-017-1067-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Managing privacy in the IoT presents a significant challenge. We make the case that information obtained by auditing the flows of data can assist in demonstrating that the systems handling personal data satisfy regulatory and user requirements. Thus, components handling personal data should be audited to demonstrate that their actions comply with all such policies and requirements. A valuable side-effect of this approach is that such an auditing process will highlight areas where technical enforcement has been incompletely or incorrectly specified. There is a clear role for technical assistance in aligning privacy policy enforcement mechanisms with data protection regulations. The first step necessary in producing technology to accomplish this alignment is to gather evidence of data flows. We describe our work producing, representing and querying audit data and discuss outstanding challenges.
引用
收藏
页码:333 / 344
页数:12
相关论文
共 50 条
  • [1] Data provenance to audit compliance with privacy policy in the Internet of Things
    Thomas Pasquier
    Jatinder Singh
    Julia Powles
    David Eyers
    Margo Seltzer
    Jean Bacon
    [J]. Personal and Ubiquitous Computing, 2018, 22 : 333 - 344
  • [2] A Framework for Privacy Policy Compliance in the Internet of Things
    Ioannou, Constantinos
    [J]. RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS 2020), 2020, 385 : 595 - 603
  • [3] Towards Privacy Preserving Data Provenance for the Internet of Things
    Canovas Sanchez, Jose Luis
    Bernal Bernabe, Jorge
    Skarmeta, Antonio F.
    [J]. 2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 41 - 46
  • [4] Data Provenance in the Internet of Things
    Elkhodr, Mahmoud
    Alsinglawi, Belal
    Alshehri, Mohammad
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 727 - 731
  • [5] Privacy Preserving Data Provenance Model Based on PUF for Secure Internet of Things
    Hamadeh, Hala
    Tyagi, Akhilesh
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2019), 2019, : 189 - 194
  • [6] Audit Outsourced Data in Internet of Things
    Hou, Gaopan
    Ma, Jianfeng
    Li, Jiayi
    Liang, Chen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] Data provenance and trust establishment in the Internet of Things
    Elkhodr, Mahmoud
    Alsinglawi, Belal
    [J]. SECURITY AND PRIVACY, 2020, 3 (03):
  • [8] An FPGA Implementation of Privacy Preserving Data Provenance Model Based on PUF for Secure Internet of Things
    Hamadeh H.
    Tyagi A.
    [J]. SN Computer Science, 2021, 2 (2)
  • [9] A Privacy Protection Policy Combined with Privacy Homomorphism in the Internet of Things
    Sun, Guozi
    Huang, Siqi
    Bao, Wan
    Yang, Yitao
    Wang, Zhiwei
    [J]. 2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [10] Systematic Literature Review on Data Provenance in Internet of Things
    Gultekin, Emrullah
    Aktas, Mehmet S.
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2022 WORKSHOPS, PART IV, 2022, 13380 : 31 - 46