2020
DOI: 10.3390/su12093885
|View full text |Cite
|
Sign up to set email alerts
|

Data Usage and Access Control in Industrial Data Spaces: Implementation Using FIWARE

Abstract: In recent years, a new business paradigm has emerged which revolves around effectively extracting value from data. In this scope, providing a secure ecosystem for data sharing that ensures data governance and traceability is of paramount importance as it holds the potential to create new applications and services. Protecting data goes beyond restricting who can access what resource (covered by identity and Access Control): it becomes necessary to control how data are treated once accessed, which is known as da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(30 citation statements)
references
References 39 publications
0
28
0
1
Order By: Relevance
“…As such, it considers the complete data lifecycle, from data acquisition through sensors and other IoT devices, to data processing using Big Data technologies and presentation to the end user. Our implementation relies on FIWARE GEs and commonly used open source technologies, a combination that has proven useful in the past for building other types of smart solutions such as digital twins [46], data usage controlled sharing environments [47,48], and enhanced authentication systems [49]. In this article, we show how, by combining these building blocks, we provide a robust, flexible, scalable, and secure way to provide context-aware data analytics in smart environments.…”
Section: Discussionmentioning
confidence: 99%
“…As such, it considers the complete data lifecycle, from data acquisition through sensors and other IoT devices, to data processing using Big Data technologies and presentation to the end user. Our implementation relies on FIWARE GEs and commonly used open source technologies, a combination that has proven useful in the past for building other types of smart solutions such as digital twins [46], data usage controlled sharing environments [47,48], and enhanced authentication systems [49]. In this article, we show how, by combining these building blocks, we provide a robust, flexible, scalable, and secure way to provide context-aware data analytics in smart environments.…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, several studies [5,28,38,45,67] highlight the need for policies that can specify rules with respect to contextual information, such as GPS information in the context of mobile and ubiquitous applications. [16,75,101]. Usage control can be applied in different application contexts (e.g., digital rights management (DRM) and data privacy) or different fields (e.g., ICT and IoT).…”
Section: Specificationmentioning
confidence: 99%
“…mx y = wtI y − wt left(y) I left(y)− wt right(y) I right(y) (1) where in Equation ( 1) the mx y is importance of node and I is Impurity and wt is weight of left and right with number of samples Figure 2 shows the Random Forest classifier diagram of how it works. Several tresses are used for the predictions, and the voting approach is used for the target output.…”
Section: Random Forestmentioning
confidence: 99%
“…The data stored on the internet is growing day by day particularly for threats that target sensitive or crucial data, and this has raised many security issues, such as malicious intrusions [1]. Targeted attacks and threats such as malware and botnets cause great damage to the community in different factors, such as financial loss or health loss.…”
Section: Introductionmentioning
confidence: 99%