A Privacy Negotiation Mechanism for IoT

被引:7
作者
Alanezi, Khaled [1 ]
Mishra, Shivakant [2 ]
机构
[1] PAAET, Coll Basic Educ, Comp Dept, Kuwait, Kuwait
[2] Univ Colorado, Comp Sci Dept, Boulder, CO 80309 USA
来源
2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH) | 2018年
关键词
INTERNET; THINGS;
D O I
10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00099
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a new privacy negotiation mechanism for an IoT environment that is both efficient and practical to cope with the IoT special need of seamlessness. This mechanism allows IoT users to express and enforce their personal privacy preferences in a seamless manner while interacting with IoT deployments. In addition, the proposed mechanism satisfies the privacy requirements of the IoT deployment owner. Finally, the proposed privacy mechanism is agnostic to the actual IoT architecture and can be used over a user-managed, edge-managed or a cloud-managed IoT architecture. Prototypes of the proposed mechanism have been implemented for each of these three architectures, and the results show the capability of the protocol to negotiate privacy while adding insignificant time overhead.
引用
收藏
页码:512 / 519
页数:8
相关论文
共 14 条
  • [1] Alanezi K., 2017, IMCOM
  • [2] [Anonymous], 2010, ARXIV10014459
  • [3] Cranor L.F., 2002, Web privacy with P3P
  • [4] Assisting Users in a World Full of Cameras A Privacy-aware Infrastructure for Computer Vision Applications
    Das, Anupam
    Degeling, Martin
    Wang, Xiaoyou
    Wang, Junjue
    Sadeh, Norman
    Satyanarayanan, Mahadev
    [J]. 2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2017, : 1387 - 1396
  • [5] Privacy Mediators: Helping IoT Cross the Chasm
    Davies, Nigel
    Taft, Nina
    Satyanarayanan, Mahadev
    Clinch, Sarah
    Amos, Brandon
    [J]. HOTMOBILE'16: PROCEEDINGS OF THE 17TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, 2016, : 39 - 44
  • [6] Dorri Ali, 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P618, DOI 10.1109/PERCOMW.2017.7917634
  • [7] User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things
    Henze, Martin
    Hermerschmidt, Lars
    Kerpen, Daniel
    Haeussling, Roger
    Rumpe, Bernhard
    Wehrle, Klaus
    [J]. 2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 191 - 196
  • [8] Naeini PE, 2017, SOUPS
  • [9] Pratama A R., P 2012 INT C SYSTEM, DOI [DOI 10.1109/ICSENGT.2012.6339316, 10.1109/ICSEngT.2012.6339316]
  • [10] Preibusch S, 2006, LECT NOTES COMPUT SC, V3841, P604