A Reference Architecture for Improving Security and Privacy in Internet of Things Applications

作者: Ivor D Addo , Sheikh I Ahamed , Stephen S Yau , Arun Buduru , None

DOI: 10.1109/MOBSERV.2014.24

关键词:

摘要: As the promise of Internet Things (IoT) materializes in our everyday lives, we are often challenged with a number concerns regarding efficacy current data privacy solutions that support pervasive components at play IoT. The and security surrounding IoT manifests themselves as treat to end-user adoption negatively impacts trust among end-users these solutions. In this paper, present reference software architecture for building cloud-enabled applications collaborative systems aimed achieving trustworthiness scenarios. We case study leverages protect sensitive user an application implementation evaluate response accomplished through survey.

参考文章(19)
Siani Pearson, None, Privacy, Security and Trust in Cloud Computing Springer, London. pp. 3- 42 ,(2013) , 10.1007/978-1-4471-4189-1_1
Jean-Marc Seigneur, Christian Damsgaard Jensen, Trading Privacy for Trust Lecture Notes in Computer Science. pp. 93- 107 ,(2004) , 10.1007/978-3-540-24747-0_8
Sachin Babar, Antonietta Stango, Neeli Prasad, Jaydip Sen, Ramjee Prasad, Proposed embedded security framework for Internet of Things (IoT) international conference on wireless communication vehicular technology information theory and aerospace electronic systems technology. pp. 1- 5 ,(2011) , 10.1109/WIRELESSVITAE.2011.5940923
Ann Cavoukian, Privacy in the clouds Identity in the Information Society. ,vol. 1, pp. 89- 108 ,(2008) , 10.1007/S12394-008-0005-Z
Stephen S. Yau, Yin Yin, Ho An, An Adaptive Approach to Optimizing Tradeoff Between Service Performance and Security in Service-Based Systems International Journal of Web Services Research. ,vol. 8, pp. 74- 91 ,(2011) , 10.4018/JWSR.2011040104
Abubakr Sirageldin, Baharum Baharudin, Low Tang Jung, Hybrid scheme for trust management in pervasive computing 2012 International Conference on Information Retrieval & Knowledge Management. pp. 45- 49 ,(2012) , 10.1109/INFRKM.2012.6205031
Akhil Behl, Kanika Behl, An analysis of cloud computing security issues world congress on information and communication technologies. pp. 109- 114 ,(2012) , 10.1109/WICT.2012.6409059
Adam Joinson, Ulf-Dietrich Reips, Tom Buchanan, Carina B. Paine Schofield, Privacy, trust, and self-disclosure online Human-Computer Interaction. ,vol. 25, pp. 1- 24 ,(2010) , 10.1080/07370020903586662
Gansen Zhao, Ziliu Li, Wenjun Li, Hao Zhang, Yong Tang, Privacy Enhancing Framework on PaaS conference on decision and control. pp. 131- 137 ,(2012) , 10.1109/CSC.2012.27
Promise Mvelase, Nomusa Dlodlo, Quentin Williams, Matthew O. Adigun, Custom-Made Cloud Enterprise Architecture for Small Medium and Micro Enterprises International Journal of Cloud Applications and Computing archive. ,vol. 1, pp. 52- 63 ,(2011) , 10.4018/IJCAC.2011070105