Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced -IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of individuals' privacy or service integrity. To address such concerns, we propose IOT NOTARY, a framework to ensure trust in IoT systems and applications. IOT NOTARY provides secure log sealing on live sensor data to produce a verifiable 'proof-of-integrity,' based on which a verifier can attest that captured sensor data adheres to the published data-capturing rules. IOT NOTARY is an integral part of TIPPERS, a smart space system that has been deployed at UCI to provide various real-time location-based services in the campus. IOT NOTARY imposes nominal overheads for verification, thereby users can verify their data of one day in less than two seconds. Use-case: University WiFi data collection. In our on-going project, entitled TIPPERS [1], we have developed a variety of location-based services based on WiFi connectivity dataset. At UC Irvine, more than 2000 WiFi access-points and four WLAN controllers (managed by the university IT department) provide campus-wide wireless network coverage. Whenever a device connects to the campus WiFi network (through an access-point), the access-point generates Simple Network Management Protocol (SNMP) trap for this association event. Each association event contains access-point-id, s i , user device MAC address, d j , and the time of the association, t k . All SNMP traps s i , d j , t k are sent to access-point's controllers in Accepted in IEEE International Symposium on Network Computing and Applications (NCA), 2019. For the final version, please refer to the conference proceeding.