Privacy Improvement Architecture for IoT

被引:1
|
作者
Kaku, Emmanuel [1 ]
Orji, Rita [2 ]
Pry, Joseph [3 ]
Sofranko, Kenneth [3 ]
Lomotey, Richard K. [3 ]
Deters, Ralph [1 ]
机构
[1] Univ Saskatchewan, Dept of Comp Sci, Saskatoon, SK, Canada
[2] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 4R2, Canada
[3] Penn State Univ Beaver, Informat Sci & Technol, Monaca, PA USA
关键词
Internet of Things (IoT); Sensors; Mobile devices; Middleware; Wearables; Provenance; Privacy; Blockchain; PROVENANCE; INTERNET; THINGS;
D O I
10.1109/ICIOT.2018.00028
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Internet of Things (IoT) is inspired by network interconnectedness of humans, objects, and cloud services to facilitate new use cases and new business models across multiple enterprise domains including healthcare. This creates the need for continuous data streaming in IoT architectures which are mainly designed following the broadcast model. As more devices communicate with each other via the Internet, it will be crucial to determine the origins of requests and responses. Being able to store records related to the life cycle of requests and responses in an immutable form will provide documentary evidence that will help to establish transparency and accountability within the IoT. Previous works employed provenance techniques to address this problem but focus on the request perspective. However, little or nothing has been done regarding the response perspective. Consequently, this paper proposes and develops a blockchain-based provenance system to trace bi-directionally the sources of requests and responses in the IoT. This is achieved through the investigation of historical communication records. Several empirical evaluations are conducted in a real-world IoT ecosystem to prove the superiority of the proposed work.
引用
下载
收藏
页码:148 / 155
页数:8
相关论文
共 50 条
  • [31] Social IoT Security and Privacy
    Maniveena
    Kalaiselvi
    2023 ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES FOR HIGH PERFORMANCE APPLICATIONS, ACCTHPA, 2023,
  • [32] IoT Security and Privacy Issues
    Assiri, Abeer
    Almagwashi, Haya
    2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [33] Is there a Room for security and Privacy in IoT?
    Tabane, Elias
    Zuva, Tranos
    2016 THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND ENGINEERING (ICACCE 2016), 2016, : 260 - 264
  • [34] SECURITY AND PRIVACY IN WIRELESS IOT
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    Zhu, Liehuang
    Li, Jiangli
    Chang, Zheng
    IEEE WIRELESS COMMUNICATIONS, 2018, 25 (06) : 10 - 11
  • [35] Security and Privacy Functionalities in IoT
    Fazeldehkordi, Elahe
    Owe, Olaf
    Noll, Josef
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 37 - 48
  • [36] IoT Security and Privacy Labels
    Shen, Yun
    Vervier, Pierre-Antoine
    PRIVACY TECHNOLOGIES AND POLICY, APF 2019, 2019, 11498 : 136 - 147
  • [37] Security and Privacy in IoT: A Survey
    Poornima M. Chanal
    Mahabaleshwar S. Kakkasageri
    Wireless Personal Communications, 2020, 115 : 1667 - 1693
  • [38] On the Activity Privacy of Blockchain for IoT
    Dorri, Ali
    Roulin, Clemence
    Jurdak, Raja
    Kanhere, Salil S.
    PROCEEDINGS OF THE IEEE LCN: 2019 44TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2019), 2019, : 258 - 261
  • [39] Security and privacy in IoT communication
    Li, Jin
    Liao, Xiaofeng
    Puech, Nicolas
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 373 - 374
  • [40] The Last Mile for IoT Privacy
    Chow, Richard
    IEEE SECURITY & PRIVACY, 2017, 15 (06) : 73 - 76