Pushing Data Privacy Control to the Edge in IoT Using Policy Enforcement Fog Module

被引:8
作者
Al-Hasnawi, Abduljaleel [1 ]
Lilien, Leszek [1 ]
机构
[1] Western Michigan Univ, Dept Comp Sci, Kalamazoo, MI 49008 USA
来源
COMPANION PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC'17 COMPANION) | 2017年
关键词
Active data bundles; cloud computing; fog computing; Internet of Things; privacy; real-time processing; sensitive data; smart home;
D O I
10.1145/3147234.3148124
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Some IoT data are time-sensitive and cannot be processed in clouds, which are too far away from IoT devices. Fog computing, located as close as possible to data sources at the edge of IoT systems, deals with this problem. Some IoT data are sensitive and require privacy controls. The proposed Policy Enforcement Fog Module (PEFM), running within a single fog, operates close to data sources connected to their fog, and enforces privacy policies for all sensitive IoT data generated by these data sources. PEFM distinguishes two kinds of fog data processing. First, fog nodes process data for local IoT applications, running within the local fog. All real-time data processing must be local to satisfy real-time constraints. Second, fog nodes disseminate data to nodes beyond the local fog (including remote fogs and clouds) for remote (and non-real-time) IoT applications. PEFM has two components for these two kinds of fog data processing. First, Local Policy Enforcement Module (LPEM), performs direct privacy policy enforcement for sensitive data accessed by local IoT applications. Second, Remote Policy Enforcement Module (RPEM), sets up a mechanism for indirectly enforcing privacy policies for sensitive data sent to remote IoT applications. RPEM is based on creating and disseminating Active Data Bundles-software constructs bundling inseparably sensitive data, their privacy policies, and an execution engine able to enforce privacy policies. To prove effectiveness and efficiency of the solution, we developed a proof-of-concept scenario for a smart home IoT application. We investigate privacy threats for sensitive IoT data and show a framework for using PEFM to overcome these threats.
引用
收藏
页码:145 / 150
页数:6
相关论文
共 23 条
[1]  
Anderson A., 2003, EXTENSIBLE ACCESS CO
[2]  
[Anonymous], 2007, INT J SMART HOME
[3]  
Barker K, 2009, LECT NOTES COMPUT SC, V5588, P42, DOI 10.1007/978-3-642-02843-4_7
[4]  
Bonomi F, 2012, P 1 ED MCC WORKSH MO, P13, DOI [DOI 10.1145/2342509.2342513, 10.1145/2342509.2342513]
[5]  
Cisco, 2015, Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are
[6]   Privacy Mediators: Helping IoT Cross the Chasm [J].
Davies, Nigel ;
Taft, Nina ;
Satyanarayanan, Mahadev ;
Clinch, Sarah ;
Amos, Brandon .
HOTMOBILE'16: PROCEEDINGS OF THE 17TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, 2016, :39-44
[7]  
Deng M, 2010, THESIS
[8]  
Dsouza C, 2014, 2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), P16, DOI 10.1109/IRI.2014.7051866
[9]   Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC) [J].
Ferraiolo, David ;
Chandramouli, Ramaswamy ;
Kuhn, Rick ;
Hu, Vincent .
ABAC'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON ATTRIBUTE BASED ACCESS CONTROL, 2016, :13-24
[10]   iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments [J].
Gupta, Harshit ;
Dastjerdi, Amir Vahid ;
Ghosh, Soumya K. ;
Buyya, Rajkumar .
SOFTWARE-PRACTICE & EXPERIENCE, 2017, 47 (09) :1275-1296