Data provenance and trust establishment in the Internet of Things

被引:14
作者
Elkhodr, Mahmoud [1 ]
Alsinglawi, Belal [2 ]
机构
[1] Cent Queensland Univ, Sch Engn & Technol, Sydney, NSW, Australia
[2] Western Sydney Univ, Sch Engn Comp & Math, Sydney, NSW, Australia
关键词
Internet of Things; data provenance; privacy; trust; MANAGEMENT; REPUTATION; IOT;
D O I
10.1002/spy2.99
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a network of heterogeneous networks encompassing various forms of communications form the current traditional communication models to ubiquitous and pervasive machine to machine communications. In such an ever expanding, dynamic, and complex environment, it becomes vital to know the origin or the source of data and whether this data can be trusted or no. This requires not only accurate, secure, and correct data collection processes; but also provisioning of data provenance throughout the life-cycle of an IoT device and the data it produces. To this end, this work introduces a provenance-based trust management solution, which provides a trust establishment mechanism amongst communicating devices in the IoT. It provides a way to quantitatively assess the trustworthiness of data supplied by a given IoT device. Thus, providing a novel solution to preserve data provenance of IoT devices. This IoT data provenance solution extends the capabilities of our previously proposed IoT platform known as the IoT-management platform, which aimed at preserving the privacy of users in the IoT.
引用
收藏
页数:11
相关论文
共 30 条
[21]   The Open Provenance Model core specification (v1.1) [J].
Moreau, Luc ;
Clifford, Ben ;
Freire, Juliana ;
Futrelle, Joe ;
Gil, Yolanda ;
Groth, Paul ;
Kwasnikowska, Natalia ;
Miles, Simon ;
Missier, Paolo ;
Myers, Jim ;
Plale, Beth ;
Simmhan, Yogesh ;
Stephan, Eric ;
Van den Bussche, Jan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2011, 27 (06) :743-756
[22]   Understanding and visualizing full systems with Data Flow Tomography [J].
Mysore, Shashidhar ;
Mazloom, Bita ;
Agrawal, Banit ;
Sherwood, Timothy .
ACM SIGPLAN NOTICES, 2008, 43 (03) :211-221
[23]   Trust establishment in pure ad-hoc networks [J].
Pirzada, A. A. ;
McDonald, C. .
WIRELESS PERSONAL COMMUNICATIONS, 2006, 37 (1-2) :139-163
[24]  
Probst MJ, 2007, INT C PAR DISTRIB SY, P504
[25]   Security, privacy and trust in Internet of Things: The road ahead [J].
Sicari, S. ;
Rizzardi, A. ;
Grieco, L. A. ;
Coen-Porisini, A. .
COMPUTER NETWORKS, 2015, 76 :146-164
[26]   Empowering integration processes with data provenance [J].
Tomazela, Bruno ;
Hara, Carmem Satie ;
Ciferri, Ricardo Rodrigues ;
de Aguiar Ciferri, Cristina Dutra .
DATA & KNOWLEDGE ENGINEERING, 2013, 86 :102-123
[27]  
Wang J.P., 2013, Applied Mechanics and Materials, V347, P2463
[28]   Supporting fine-grained data lineage in a database visualization environment [J].
Woodruff, A ;
Stonebraker, M .
13TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING - PROCEEDINGS, 1997, :91-102
[29]   A survey on trust management for Internet of Things [J].
Yan, Zheng ;
Zhang, Peng ;
Vasilakos, Athanasios V. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 42 :120-134
[30]  
Zhu W, 2008, 2008 IEEE 24 INT C D