Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 21 von 1341
World of Empowered IoT Users
2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), 2016, p.13-24
2016
Volltextzugriff (PDF)

Details

Autor(en) / Beteiligte
Titel
World of Empowered IoT Users
Ist Teil von
  • 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), 2016, p.13-24
Ort / Verlag
IEEE
Erscheinungsjahr
2016
Quelle
IEEE Xplore
Beschreibungen/Notizen
  • In a world deploying an Internet of Things, sensors and actuators are owned, accessed, and activated by a plethora of individuals and organizations. Access to the data produced by this world can both be beneficial and have drawbacks to society. This data potentially represents the activities of millions of individuals and their possessions collected by billions of "things'. Aggregations of this data can be analyzed through the Internet and Clouds. This raises possible privacy, security, moral and ethical challenges whose solutions will require flexible protection mechanisms. How do we "acquire" and "distribute" data at the IoT world scale while retaining the rights of individuals and organizations to protect, use, and share their data? Clearly a well-defined mechanism and control needs to regulate access to the data and its aggregations. Our paper describes a user-centric multi-level multiple granularity mechanism to share the data from these devices to people and organizations. Revisiting the fundamental mechanisms in security for providing protection, our solution uses capabilities, access lists, and access rights following well-understood formal notions for reasoning about access. Our contribution is to describe an auditable, transparent, distributed, decentralized, publication-subscription based, robust mechanism and automation of these ideas in the IoT realm that is well-matched to the current generation of clouds. It is based on well-tested principles and practices used in crypto currencies exploiting block chains of transactions. The scheme puts users (including organizational entities) in the center of control over the access to their collections of sensory data. In our paper, we describe a deployment of these ideas for health care, smart cities, and autonomous cars.
Sprache
Englisch
Identifikatoren
DOI: 10.1109/IoTDI.2015.39
Titel-ID: cdi_ieee_primary_7471347

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX