Data provenance to audit compliance with privacy policy in the Internet of Things

被引:35
|
作者
Pasquier, Thomas [1 ]
Singh, Jatinder [2 ]
Powles, Julia [3 ]
Eyers, David [4 ]
Seltzer, Margo [1 ]
Bacon, Jean [2 ]
机构
[1] Harvard Univ, Ctr Res Computat & Soc, Cambridge, MA 02138 USA
[2] Univ Cambridge, Comp Lab, Cambridge, England
[3] Cornell Tech, Comp & Informat Sci, New York, NY USA
[4] Univ Otago, Dept Comp Sci, Dunedin, New Zealand
基金
英国工程与自然科学研究理事会; 美国国家科学基金会;
关键词
SECURITY; LANGUAGE;
D O I
10.1007/s00779-017-1067-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Managing privacy in the IoT presents a significant challenge. We make the case that information obtained by auditing the flows of data can assist in demonstrating that the systems handling personal data satisfy regulatory and user requirements. Thus, components handling personal data should be audited to demonstrate that their actions comply with all such policies and requirements. A valuable side-effect of this approach is that such an auditing process will highlight areas where technical enforcement has been incompletely or incorrectly specified. There is a clear role for technical assistance in aligning privacy policy enforcement mechanisms with data protection regulations. The first step necessary in producing technology to accomplish this alignment is to gather evidence of data flows. We describe our work producing, representing and querying audit data and discuss outstanding challenges.
引用
收藏
页码:333 / 344
页数:12
相关论文
共 50 条
  • [41] Privacy Preservation in the Internet of Things
    Berrehili, Fatima Zahra
    Belmekki, Abdelhamid
    [J]. ADVANCES IN UBIQUITOUS NETWORKING 2, 2017, 397 : 163 - 175
  • [42] The Quest for Privacy in the Internet of Things
    Porambage, Pawani
    Ylianttila, Mika
    Schmitt, Corinna
    Kumar, Pardeep
    Gurtov, Andrei
    Vasilakos, Athanasios V.
    [J]. IEEE CLOUD COMPUTING, 2016, 3 (02): : 36 - 45
  • [43] Security and privacy for the Internet of Things
    Rullo, Antonino
    Ianni, Michele
    Serra, Edoardo
    [J]. FRONTIERS IN COMPUTER SCIENCE, 2023, 5
  • [44] A Privacy Framework for the Internet of Things
    Corcoran, Peter M.
    [J]. 2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 13 - 18
  • [45] Security and Privacy in the Internet of Things
    Fawaz, Kassem
    Shin, Kang G.
    [J]. COMPUTER, 2019, 52 (04) : 40 - 49
  • [46] A Fog Based Middleware for Automated Compliance With OECD Privacy Principles in Internet of Healthcare Things
    Elmisery, Ahmed M.
    Rho, Seungmin
    Botvich, Dmitri
    [J]. IEEE ACCESS, 2016, 4 : 8418 - 8441
  • [47] Data encryption standard based protection method of privacy data on Internet of Things
    Cheng, Xiaohui
    Liang, Zhongning
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 1285 - 1291
  • [48] Practical and Privacy-Preserving Policy Compliance for Outsourced Data
    Di Crescenzo, Giovanni
    Feigenbaum, Joan
    Gupta, Debayan
    Panagos, Euthimios
    Perry, Jason
    Wright, Rebecca N.
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 : 181 - 194
  • [49] A secure and extensible blockchain-based data provenance framework for the Internet of Things
    Sigwart, Marten
    Borkowski, Michael
    Peise, Marco
    Schulte, Stefan
    Tai, Stefan
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2020, 28 (1) : 309 - 323
  • [50] A secure and extensible blockchain-based data provenance framework for the Internet of Things
    Marten Sigwart
    Michael Borkowski
    Marco Peise
    Stefan Schulte
    Stefan Tai
    [J]. Personal and Ubiquitous Computing, 2024, 28 : 309 - 323