World of Empowered IoT Users

被引:72
作者
Hashemi, Sayed Hadi [1 ]
Faghri, Faraz [1 ]
Rausch, Paul [2 ]
Campbell, Roy H. [1 ]
机构
[1] Univ Illinois, Champaign, IL 61801 USA
[2] ExaByte Labs, Champaign, IL USA
来源
PROCEEDINGS 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION IOTDI 2016 | 2016年
关键词
INTERNET; AUTHENTICATION;
D O I
10.1109/IoTDI.2015.39
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a world deploying an Internet of Things, sensors and actuators are owned, accessed, and activated by a plethora of individuals and organizations. Access to the data produced by this world can both be beneficial and have drawbacks to society. This data potentially represents the activities of millions of individuals and their possessions collected by billions of "things'. Aggregations of this data can be analyzed through the Internet and Clouds. This raises possible privacy, security, moral and ethical challenges whose solutions will require flexible protection mechanisms. How do we "acquire" and "distribute" data at the IoT world scale while retaining the rights of individuals and organizations to protect, use, and share their data? Clearly a well-defined mechanism and control needs to regulate access to the data and its aggregations. Our paper describes a user-centric multi-level multiple granularity mechanism to share the data from these devices to people and organizations. Revisiting the fundamental mechanisms in security for providing protection, our solution uses capabilities, access lists, and access rights following well-understood formal notions for reasoning about access. Our contribution is to describe an auditable, transparent, distributed, decentralized, publication-subscription based, robust mechanism and automation of these ideas in the IoT realm that is well-matched to the current generation of clouds. It is based on well-tested principles and practices used in crypto currencies exploiting block chains of transactions. The scheme puts users (including organizational entities) in the center of control over the access to their collections of sensory data. In our paper, we describe a deployment of these ideas for health care, smart cities, and autonomous cars.
引用
收藏
页码:13 / 24
页数:12
相关论文
共 25 条
[1]   A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS [J].
ABADI, M ;
BURROWS, M ;
LAMPSON, B ;
PLOTKIN, G .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04) :706-734
[2]  
Aggarwal Charu C, 2008, A general survey of privacy-preserving data mining models and algorithms
[3]   Routing through the mist: Privacy preserving communication in ubiquitous computing environments [J].
Al-Muhtadi, J ;
Campbell, R ;
Kapadia, A ;
Mickunas, MD ;
Yi, S .
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, :74-83
[4]  
[Anonymous], 2016, Wired
[5]  
[Anonymous], 2014, Forbes
[6]  
[Anonymous], 2015, Reuters
[7]  
Blackhurst Michael, 2010, IEEE International Symposium on Sustainable Systems and Technology (ISSST 2010), DOI 10.1109/ISSST.2010.5507759
[8]  
Buterin V., 2014, NEXT GENERATION SMAR, DOI DOI 10.1145/2939672.2939785
[9]  
Campbell Russ., 2003, HERITAGE LANGUAGE J, V1, P91
[10]   Internet of Things (IoT): A vision, architectural elements, and future directions [J].
Gubbi, Jayavardhana ;
Buyya, Rajkumar ;
Marusic, Slaven ;
Palaniswami, Marimuthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1645-1660