Proceedings of the 2016 ACM Workshop on Cloud-Assisted Networking 2016
DOI: 10.1145/3010079.3010082
|View full text |Cite
|
Sign up to set email alerts
|

Personal Data Management with the Databox

Abstract: We are all increasingly the subjects of data collection and processing systems that use data generated both about and by us to provide and optimise a wide range of services. Means for others to collect and process data that concerns each of us -often referred to possessively as "your data"are only increasing with the long-heralded advent of the Internet of Things just the latest example. As a result, means to enable personal data management is generally recognised as a pressing societal issue.We have previousl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
35
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

4
4

Authors

Journals

citations
Cited by 55 publications
(35 citation statements)
references
References 19 publications
0
35
0
Order By: Relevance
“…It exists [1,21], albeit in nascent form and its source code is freely available for widespread use [5]. It enables data controllers and app developers working on their behalf to demonstrate compliance with the external data subject accountability requirement.…”
Section: Resultsmentioning
confidence: 99%
“…It exists [1,21], albeit in nascent form and its source code is freely available for widespread use [5]. It enables data controllers and app developers working on their behalf to demonstrate compliance with the external data subject accountability requirement.…”
Section: Resultsmentioning
confidence: 99%
“…from autonomous vehicles) from sensors to the cloud for central analytics mean conducting analytics locally and sending back results is increasingly attractive. 171 In reflecting on these issues and considering routes redressing the risks stemming from IoT, established practices in IT architecture design could be considered. Examples could include:…”
Section: Engineering the Industrial Iot: Appropriate Technical And Ormentioning
confidence: 99%
“…As mentioned above, local data storage and analytics would help organisations avoid a lot of these difficult compliance requirements and enable more controlled and sustainable security architecture too. Technologies like personal information management systems 164 are useful for protecting consumers' personal data, but they also have much to offer for industrial IoT too, in terms of providing confidentiality or limiting access to sensitive information. Hardware level trusted execution environments (i.e.…”
mentioning
confidence: 99%
“…Available Stores are registered in a HyperCat catalogue on installation, so they can be discovered by other Apps. 3 Each store provides a RESTful API supporting JSON, text and binary data across the Zest protocol. Underlying storage is implemented using the Irmin [5] system using a git-structured backend.…”
Section: Introductionmentioning
confidence: 99%
“…Other reasons we adopted ZeroMQ included its support for secure connections based on elliptic-curve cryptography and that it is well supported across a variety of platforms and programming languages. Zest forms the core protocol within the Databox project [3], which we envisage being instantiated in the form-factor of a set-top box or similar. All components are encapsulated as Docker containers.…”
mentioning
confidence: 99%