A survey on data provenance in IoT

被引:46
作者
Hu, Rui [1 ]
Yan, Zheng [1 ,2 ]
Ding, Wenxiu [1 ]
Yang, Laurence T. [3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab ISN, Xian 710071, Shaanxi, Peoples R China
[2] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
[3] Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
来源
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS | 2020年 / 23卷 / 02期
基金
中国国家自然科学基金; 芬兰科学院; 中国博士后科学基金;
关键词
cyberization; internet of things; distributed architecture; intelligent service; data provenance; BIG DATA PROVENANCE; INTERNET; ANALYTICS; SECURE; THINGS; MANAGEMENT; LINEAGE;
D O I
10.1007/s11280-019-00746-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT), as a typical representation of cyberization, enables the interconnection of physical things and the Internet, which provides intelligent and advanced services for industrial production and human lives. However, it also brings new challenges to IoT applications due to heterogeneity, complexity and dynamic nature of IoT. Especially, it is difficult to determine the sources of specified data, which is vulnerable to inserted attacks raised by different parties during data transmission and processing. In order to solve these issues, data provenance is introduced, which records data origins and the history of data generation and processing, thus possible to track the sources and reasons of any problems. Though some related researches have been proposed, the literature still lacks a comprehensive survey on data provenance in IoT. In this paper, we first propose a number of design requirements of data provenance in IoT by analyzing the features of IoT data and applications. Then, we provide a deep-insight review on existing schemes of IoT data provenance and employ the requirements to discuss their pros and cons. Finally, we summarize a number of open issues to direct future research.
引用
收藏
页码:1441 / 1463
页数:23
相关论文
共 66 条
[1]   Secure routing for internet of things: A survey [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :198-213
[2]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[3]   Secure Data Provenance in Cloud-centric Internet of Things via Blockchain Smart Contracts [J].
Ali, Saqib ;
Wang, Guojun ;
Bhuiyan, Md Zakirul Alam ;
Jiang, Hai .
2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, :991-998
[4]   IoT Data Provenance Implementation Challenges [J].
Alkhalil, Adel ;
Ramadan, Rabie A. .
8TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2017) AND THE 7TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT 2017), 2017, 109 :1134-1139
[5]  
Aman M.N., 2017, ACM IoTPTS, P11
[6]  
BARACALDO N, 2017, INT C SERV OR COMP, P92
[7]  
BATES A, 2013, P 3 ACM C DAT APPL S, P277
[8]  
BERAN S, 2014, P 5 WORKSH SEM SMART, P83
[9]  
Bertino E, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), P3, DOI 10.1109/BigData.2016.7840581
[10]  
Buneman P, 2001, LECT NOTES COMPUT SC, V1973, P316