2014 International Conference on Future Internet of Things and Cloud 2014
DOI: 10.1109/ficloud.2014.38
|View full text |Cite
|
Sign up to set email alerts
|

User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things

Abstract: Abstract-Internet of Things devices are envisioned to penetrate essentially all aspects of life, including homes and urban spaces, in use cases such as health care, assisted living, and smart cities. One often proposed solution for dealing with the massive amount of data collected by these devices and offering services on top of them is the federation of the Internet of Things and cloud computing. However, user acceptance of such systems is a critical factor that hinders the adoption of this promising approach… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(11 citation statements)
references
References 33 publications
0
11
0
Order By: Relevance
“…This data can be sent to remote locations for further analysis, processing, or retention on a variety of application and service platforms (e.g, cloud services). Every single device and platform in the IoT space might present a potential risk or threat [3][4][5]7] that could be exploited to harm consumers by (1) enabling unauthorized access and misuse of personal information; (2) Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored.…”
Section: Panel Summarymentioning
confidence: 99%
“…This data can be sent to remote locations for further analysis, processing, or retention on a variety of application and service platforms (e.g, cloud services). Every single device and platform in the IoT space might present a potential risk or threat [3][4][5]7] that could be exploited to harm consumers by (1) enabling unauthorized access and misuse of personal information; (2) Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored.…”
Section: Panel Summarymentioning
confidence: 99%
“…With respect to architectural approaches to technical/automated privacy enforcement, related literature includes Henze et al (2014) and Adams and Barbieri (2006). However, the work of Henze et al proposes an architecture for enforcing user privacy in a network of IoT devices (e.g., a body-area-network of health monitoring devices) connected to cloud-based services.…”
Section: Related Workmentioning
confidence: 99%
“…Henze et al [28] propose a policy negotiation mechanism enforced between a 'thing' and cloud storage provider. Much like an enforceable SLA, it considers a particular 'thing'-cloud interaction.…”
Section: Related Workmentioning
confidence: 99%