PyFF: A Fog-Based Flexible Architecture for Enabling Privacy-by-Design IoT-Based Communal Smart Environments

被引:3
作者
Benhamida, Fatima Zohra [1 ,2 ]
Navarro, Joan [3 ]
Gomez-Carmona, Oihane [2 ]
Casado-Mansilla, Diego [2 ]
Lopez-de-Ipina, Diego [2 ]
Zaballos, Agustin [3 ]
机构
[1] Ecole Natl Super Informat, Lab Methodes Concept Syst, Algiers 16309, Algeria
[2] Univ Deusto, DeustoTech, Bilbao 48007, Spain
[3] La Salle Univ Ramon Llull, Grp Recerca Internet Technol & Storage GRITS, C Quatre Camins 30, Barcelona 08022, Spain
关键词
user involvement; fog computing; internet of things; privacy; flexibility; smart environments; DIGITAL TRANSFORMATION; SEDENTARY BEHAVIOR; THINGS; INTERNET; HEALTH; ENERGY; INTERVENTIONS; TECHNOLOGY; OPPORTUNITIES; MIDDLEWARE;
D O I
10.3390/s21113640
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The advent of the Internet of Things (IoT) and the massive growth of devices connected to the Internet are reshaping modern societies. However, human lifestyles are not evolving at the same pace as technology, which often derives into users' reluctance and aversion. Although it is essential to consider user involvement/privacy while deploying IoT devices in a human-centric environment, current IoT architecture standards tend to neglect the degree of trust that humans require to adopt these technologies on a daily basis. In this regard, this paper proposes an architecture to enable privacy-by-design with human-in-the-loop IoT environments. In this regard, it first distills two IoT use-cases with high human interaction to analyze the interactions between human beings and IoT devices in an environment which had not previously been subject to the Internet of People principles.. Leveraging the lessons learned in these use-cases, the Privacy-enabling Fog-based and Flexible (PyFF) human-centric and human-aware architecture is proposed which brings together distributed and intelligent systems are brought together. PyFF aims to maintain end-users' privacy by involving them in the whole data lifecycle, allowing them to decide which information can be monitored, where it can be computed and the appropriate feedback channels in accordance with human-in-the-loop principles.
引用
收藏
页数:27
相关论文
共 99 条
[1]   Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers [J].
Agaku, Israel T. ;
Adisa, Akinyele O. ;
Ayo-Yusuf, Olalekan A. ;
Connolly, Gregory N. .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2014, 21 (02) :374-378
[2]   The Digital Transformation of Healthcare: Current Status and the Road Ahead [J].
Agarwal, Ritu ;
Gao, Guodong ;
DesRoches, Catherine ;
Jha, Ashish K. .
INFORMATION SYSTEMS RESEARCH, 2010, 21 (04) :796-809
[3]   INTERNET-OF-THINGS-BASED SMART ENVIRONMENTS: STATE OF THE ART, TAXONOMY, AND OPEN RESEARCH CHALLENGES [J].
Ahmed, Ejaz ;
Yaqoob, Ibrar ;
Gani, Abdullah ;
Imran, Muhammad ;
Guizani, Mohsen .
IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) :10-16
[4]   Limitless Worker Surveillance [J].
Ajunwa, Ifeoma ;
Crawford, Kate ;
Schultz, Jason .
CALIFORNIA LAW REVIEW, 2017, 105 (03) :735-776
[5]   Novel Internet of Things Platform for In-Building Power Quality Submetering [J].
Alonso-Rosa, Manuel ;
Gil-de-Castro, Aurora ;
Medina-Gracia, Ricardo ;
Moreno-Munoz, Antonio ;
Canete-Carmona, Eduardo .
APPLIED SCIENCES-BASEL, 2018, 8 (08)
[6]   Power to the People: The Role of Humans in Interactive Machine Learning [J].
Amershi, Saleema ;
Cakmak, Maya ;
Knox, W. Bradley ;
Kulesza, Todd .
AI MAGAZINE, 2014, 35 (04) :105-120
[7]  
[Anonymous], GEN DATA PROTECTION
[8]  
[Anonymous], 2017, P 11 INT C INT HUM C
[9]  
[Anonymous], GREENSOUL PERSUASIVE
[10]  
[Anonymous], 2001, Ubicomp 2001: Ubiquitous Computing, DOI [10.1007/3-540-45427-6_23, 10.1007/3-540-45427-6_]