A Privacy-Preserving Architecture and Data-Sharing Model for Cloud-IoT Applications

被引:9
作者
Fernandez, Maribel [1 ]
Jaimunk, Jenjira [1 ]
Thuraisingham, Bhavani [2 ]
机构
[1] Kings Coll London, Dept Informat, London WC2B 4BG, England
[2] Univ Texas, Dept Comp Sci, Dallas, TX 75080 USA
关键词
Cloud architecture; Internet of Things (IoT); privacy preservation; data collection; access control; attribute-based policy; ACCESS-CONTROL; INTERNET; THINGS;
D O I
10.1109/TDSC.2022.3204720
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many service providers offer their services in exchange for users' private data. Despite new regulations created to protect users privacy, users are often given little choice over the way their data is collected and used. To address privacy concerns in cloud-IoT applications, we propose to use an architecture, called Data Bank, which gives users fine-grained control over their data. Data Bank uses a category-based data access (CBDA) model which covers the whole data life-cycle, from data collection from IoT devices to data sharing with services. We show how dynamic policies can be specified using a new attribute-based instance of CBDA, and describe the use of policy graphs to visualise and analyse policies.
引用
收藏
页码:3495 / 3507
页数:13
相关论文
共 37 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]   Access Control Models for Virtual Object Communication in Cloud-Enabled IoT [J].
Alshehri, Asma ;
Sandhu, Ravi .
2017 IEEE 18TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI 2017), 2017, :16-25
[3]  
Alshehri A, 2016, 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), P530, DOI [10.1109/CIC.2016.79, 10.1109/CIC.2016.081]
[4]   A graph-based framework for the analysis of access control policies [J].
Alves, Sandra ;
Fernandez, Maribel .
THEORETICAL COMPUTER SCIENCE, 2017, 685 :3-22
[5]  
Armando A, 2012, LECT NOTES COMPUT SC, V7371, P25, DOI 10.1007/978-3-642-31540-4_3
[6]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[7]  
Baarslag T., 2016, P 2016 CHI C EXTENDE, P2012, DOI DOI 10.1145/2851581.2892340
[8]  
Barker S, 2009, SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P187, DOI 10.1145/1542207.1542238
[9]   Analysis of privacy and security policies [J].
Bertino, E. ;
Brodie, C. ;
Calo, S. B. ;
Cranor, L. F. ;
Karat, C. ;
Karat, J. ;
Li, N. ;
Lin, D. ;
Lobo, J. ;
Ni, Q. ;
Rao, P. R. ;
Wang, X. .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
[10]   A metamodel of access control for distributed environments: Applications and properties [J].
Bertolissi, Clara ;
Fernandez, Maribel .
INFORMATION AND COMPUTATION, 2014, 238 :187-207