Privacy Mediators: Helping IoT Cross the Chasm

被引:49
作者
Davies, Nigel [1 ]
Taft, Nina [2 ]
Satyanarayanan, Mahadev [3 ]
Clinch, Sarah [1 ]
Amos, Brandon [3 ]
机构
[1] Univ Lancaster, Lancaster LA1 4YW, England
[2] Google, Mountain View, CA USA
[3] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
来源
HOTMOBILE'16: PROCEEDINGS OF THE 17TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS | 2016年
基金
美国国家科学基金会;
关键词
D O I
10.1145/2873587.2873600
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unease over data privacy will retard consumer acceptance of IoT deployments. The primary source of discomfort is a lack of user control over raw data that is streamed directly from sensors to the cloud. This is a direct consequence of the over-centralization of today's cloud-based IoT hub designs. We propose a solution that interposes a locally-controlled software component called a privacy mediator on every raw sensor stream. Each mediator is in the same administrative domain as the sensors whose data is being collected, and dynamically enforces the current privacy policies of the owners of the sensors or mobile users within the domain. This solution necessitates a logical point of presence for mediators within the administrative boundaries of each organization. Such points of presence are provided by cloudlets, which are small locally-administered data centers at the edge of the Internet that can support code mobility. The use of cloudlet-based mediators aligns well with natural personal and organizational boundaries of trust and responsibility.
引用
收藏
页码:39 / 44
页数:6
相关论文
共 27 条
  • [1] Almuhimedi H., 2015, P ACM CHI
  • [2] Amos B., 2015, OPENFACE FREE OPEN S
  • [3] [Anonymous], 2013, NSF WORKSH FUT DIR W
  • [4] [Anonymous], 2015, TECHNICAL REPORT
  • [5] [Anonymous], DAILY TELEGRAPH
  • [6] [Anonymous], 2007, INT J SMART HOME
  • [7] Location privacy in pervasive computing
    Beresford, AR
    Stajano, F
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 46 - 55
  • [8] Clinch Sarah, 2016, PERVASIVE COMPUTING, V15
  • [9] Cornelius C, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P211
  • [10] Davies N., 2015, PERVASIVE COMPUTING, V14