2015 International Conference on Recent Advances in Internet of Things (RIoT) 2015
DOI: 10.1109/riot.2015.7104903
|View full text |Cite
|
Sign up to set email alerts
|

Securing tags to control information flows within the Internet of Things

Abstract: To realise the full potential of the Internet of Things (IoT), IoT architectures are moving towards open and dynamic interoperability, as opposed to closed application silos. This is because functionality is realised through the interactions, i.e. the exchange of data, between a wide-range of 'things'.Data sharing requires management. Towards this, we are exploring distributed, decentralised Information Flow Control (IFC) to enable controlled data flows, end-to-end, according to policy. In this paper we make t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…This type of control can be realized using information flow control, which allows to track the usage of sensitive data throughout an application and has been implemented, for example, for Android phones [109]. Policies on information flow can be enforced, for example by trusted hardware [117].…”
Section: A Process-oriented Privacy Protectionmentioning
confidence: 99%
“…This type of control can be realized using information flow control, which allows to track the usage of sensitive data throughout an application and has been implemented, for example, for Android phones [109]. Policies on information flow can be enforced, for example by trusted hardware [117].…”
Section: A Process-oriented Privacy Protectionmentioning
confidence: 99%
“…Consent is an important element for both users who use smart devices such as smart sports equipment, smart health devices, smart toys, and individuals whose their information are collected by the smart objects in smart cities, smart homes, smart grid, etc [65]. Users of smart devices and individuals whose their information are collected by smart objects should agree with data collection, process, the period that the data will be kept and another process that relates to their data [66].…”
Section: Consent and Controlmentioning
confidence: 99%
“…throughout the cloud service. In [50] we proposed that the widely used and available X.509 certificates could be used. The approach relies on public key certificates and attribute certificates [51], to respectively identify the application associated with the CamFlow-MW instance and the tags associated with this application.…”
Section: Remote Interactionsmentioning
confidence: 99%
“…Similarly, IFC policy must also be verified to ensure data flows are authorised according to IFC policy. Attribute certificates provide cryptographic means to determine and verify the tags associated with the remote entity (see [50]), on which policy can be enforced. If tags do not accord, the connection will not be established.…”
Section: Remote Interactionsmentioning
confidence: 99%