A survey on data provenance in IoT

被引:46
作者
Hu, Rui [1 ]
Yan, Zheng [1 ,2 ]
Ding, Wenxiu [1 ]
Yang, Laurence T. [3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab ISN, Xian 710071, Shaanxi, Peoples R China
[2] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
[3] Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
来源
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS | 2020年 / 23卷 / 02期
基金
中国国家自然科学基金; 芬兰科学院; 中国博士后科学基金;
关键词
cyberization; internet of things; distributed architecture; intelligent service; data provenance; BIG DATA PROVENANCE; INTERNET; ANALYTICS; SECURE; THINGS; MANAGEMENT; LINEAGE;
D O I
10.1007/s11280-019-00746-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT), as a typical representation of cyberization, enables the interconnection of physical things and the Internet, which provides intelligent and advanced services for industrial production and human lives. However, it also brings new challenges to IoT applications due to heterogeneity, complexity and dynamic nature of IoT. Especially, it is difficult to determine the sources of specified data, which is vulnerable to inserted attacks raised by different parties during data transmission and processing. In order to solve these issues, data provenance is introduced, which records data origins and the history of data generation and processing, thus possible to track the sources and reasons of any problems. Though some related researches have been proposed, the literature still lacks a comprehensive survey on data provenance in IoT. In this paper, we first propose a number of design requirements of data provenance in IoT by analyzing the features of IoT data and applications. Then, we provide a deep-insight review on existing schemes of IoT data provenance and employ the requirements to discuss their pros and cons. Finally, we summarize a number of open issues to direct future research.
引用
收藏
页码:1441 / 1463
页数:23
相关论文
共 66 条
[51]   A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks [J].
Sultana, Salmin ;
Ghinita, Gabriel ;
Bertino, Elisa ;
Shehab, Mohamed .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (03) :256-269
[52]  
Tonjes Ralf, 2014, P EUR C NETW COMM
[53]  
WANG YR, 1990, VERY LARGE DATA BASES, P519
[54]  
Warekuromor T, 2017, INT C COMP SUPP COOP, P180, DOI 10.1109/CSCWD.2017.8066691
[55]   Supporting fine-grained data lineage in a database visualization environment [J].
Woodruff, A ;
Stonebraker, M .
13TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING - PROCEEDINGS, 1997, :91-102
[56]   Context-Aware Verifiable Cloud Computing [J].
Yan, Zheng ;
Yu, Xixun ;
Ding, Wenxiu .
IEEE ACCESS, 2017, 5 :2211-2227
[57]   A survey on trust management for Internet of Things [J].
Yan, Zheng ;
Zhang, Peng ;
Vasilakos, Athanasios V. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 42 :120-134
[58]  
YIN J, 2013, P 6 INT C INF MAN IN
[59]   Verifiable outsourced computation over encrypted data [J].
Yu, Xixun ;
Yan, Zheng ;
Zhang, Rui .
INFORMATION SCIENCES, 2019, 479 :372-385
[60]   A Survey of Verifiable Computation [J].
Yu, Xixun ;
Yan, Zheng ;
Vasilakos, Athanasios V. .
MOBILE NETWORKS & APPLICATIONS, 2017, 22 (03) :438-453