Scalable Role-based Data Disclosure Control for the Internet of Things Smart Healthcare

被引:26
作者
Yavari, Ali [1 ,2 ]
Panah, Arezou Soltani [1 ]
Georgakopoulos, Dimitrios [2 ]
Jayaraman, Prem Prakash [2 ]
van Schyndel, Ron [1 ]
机构
[1] RMIT Univ, Melbourne, Vic, Australia
[2] Swinburne Univ Technol, Melbourne, Vic, Australia
来源
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017) | 2017年
关键词
SECURITY;
D O I
10.1109/ICDCS.2017.307
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) is the latest Internet evolution that interconnects billions of devices, such as cameras, sensors, RFIDs, smart phones, wearable devices, ODBII dongles, etc. Federations of such IoT devices (or things) provides the information needed to solve many important problems that have been too difficult to harness before. Despite these great benefits, privacy in IoT remains a great concern, in particular when the number of things increases. This presses the need for the development of highly scalable and computationally efficient mechanisms to prevent unauthorised access and disclosure of sensitive information generated by things. In this paper, we address this need by proposing a lightweight, yet highly scalable, data obfuscation technique. For this purpose, a digital watermarking technique is used to control perturbation of sensitive data that enables legitimate users to de-obfuscate perturbed data. To enhance the scalability of our solution, we also introduce a contextualisation service that achieve real-time aggregation and filtering of IoT data for large number of designated users. We, then, assess the effectiveness of the proposed technique by considering a health-care scenario that involves data streamed from various wearable and stationary sensors capturing health data, such as heart-rate and blood pressure. An analysis of the experimental results that illustrate the unconstrained scalability of our technique concludes the paper.
引用
收藏
页码:2226 / 2233
页数:8
相关论文
共 30 条
  • [1] Aggarwal CC, 2008, ADV DATABASE SYST, V34, P11
  • [2] [Anonymous], N TRIPLES IN PRESS
  • [3] [Anonymous], P 50 ANN HAW INT C S
  • [4] [Anonymous], 2017, DESIGNING DEVELOPING
  • [5] [Anonymous], 2001, 6 ACM S ACCESS CONTR
  • [6] [Anonymous], 2017, DESIGNING DEV FACILI, DOI DOI 10.1007/978-3-319-44924-1_6
  • [7] [Anonymous], 2017, FUTURE GENERATION CO
  • [8] [Anonymous], REMOTE HLTH CARE CYB
  • [9] Data obfuscation: Anonymity and desensitization of usable data sets
    Bakken, DE
    Parameswaran, R
    Blough, DM
    Franz, AA
    Palmer, TJ
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (06) : 34 - 41
  • [10] Bera A., 2017, INT C DATA ENG COMMU, P1