Securing Data Provenance in Internet of Things (IoT) Systems

被引:11
作者
Baracaldo, Nathalie [1 ]
Bathen, Luis Angel D. [1 ]
Ozugha, Roqeeb O. [2 ]
Engel, Robert [1 ]
Tata, Samir [1 ]
Ludwig, Heiko [1 ]
机构
[1] IBM Res, Almaden Res Ctr, San Jose, CA 95120 USA
[2] Dakota State Univ, 820 N Washington Ave, Madison, SD USA
来源
SERVICE-ORIENTED COMPUTING - ICSOC 2016 WORKSHOPS | 2017年 / 10380卷
关键词
IoT; Provenance; Security; Blockchain; Keyless signature; Access control;
D O I
10.1007/978-3-319-68136-8_9
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Internet of Things (IoT) promises to yield a plethora of new innovative applications based on highly interconnected devices. In order to enable IoT applications for critical and/or sensitive use cases, it is important to (i) foster their dependability by assuring and verifying the integrity and correctness of data processed in such applications, and (ii) adequately account for privacy and confidentiality concerns. For addressing these requirements, IoT systems can be equipped with data provenance mechanisms for maintaining information on the lineage and ownership of data. However, in order to provide secure and dependable IoT systems, provenance data needs to be sufficiently protected against tampering and unauthorized access. In this paper, we present a novel framework for cryptographic provenance data protection and access control based on blockchain technology and confidentiality policies.
引用
收藏
页码:92 / 98
页数:7
相关论文
共 17 条
[1]  
[Anonymous], 2016, GARTNER GARTNER SAYS
[2]  
Braun U., 2008, HOTSEC
[3]  
Buldas Ahto, 2014, Secure IT Systems 19th Nordic Conference, NordSec 2014. Proceedings: LNCS 8788, P149, DOI 10.1007/978-3-319-11599-3_9
[4]  
Buldas A, 2013, LECT NOTES COMPUT SC, V8208, P313, DOI 10.1007/978-3-642-41488-6_21
[5]  
Buneman P, 2001, LECT NOTES COMPUT SC, V1973, P316
[6]  
Gadelha Luiz M. R. Jr., 2008, 2008 IEEE Fourth International Conference on eScience, P597, DOI 10.1109/eScience.2008.161
[7]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[8]   Internet of Things (IoT): A vision, architectural elements, and future directions [J].
Gubbi, Jayavardhana ;
Buyya, Rajkumar ;
Marusic, Slaven ;
Palaniswami, Marimuthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1645-1660
[9]   Preventing history forgery with secure provenance [J].
Hasan, Ragib ;
Sion, Radu ;
Winslett, Marianne .
ACM Transactions on Storage, 2009, 5 (04)
[10]  
IBM, 2016, IBM BLUEM