Skip to main content
Erschienen in: Information Systems Frontiers 4/2016

01.08.2016

A security-and quality-aware system architecture for Internet of Things

verfasst von: Sabrina Sicari, Cinzia Cappiello, Francesco De Pellegrini, Daniele Miorandi, Alberto Coen-Porisini

Erschienen in: Information Systems Frontiers | Ausgabe 4/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) is characterized, at the system level, by high diversity with respect to enabling technologies and supported services. IoT also assumes to deal with a huge amount of heterogeneous data generated by devices, transmitted by the underpinning infrastructure and processed to support value-added services. In order to provide users with valuable output, the IoT architecture should guarantee the suitability and trustworthiness of the processed data. This is a major requirement of such systems in order to guarantee robustness and reliability at the service level. In this paper, we introduce a novel IoT architecture able to support security, privacy and data quality guarantees, thereby effectively boosting the diffusion of IoT services.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Alcaide, A., Palomar, E., Montero-Castillo, J., & Ribagorda, A. (2013). “Anonymous authentication for privacy-preserving IOT target-driven applications.” Computers & Security, 37, 111–123. Alcaide, A., Palomar, E., Montero-Castillo, J., & Ribagorda, A. (2013). “Anonymous authentication for privacy-preserving IOT target-driven applications.” Computers & Security, 37, 111–123.
Zurück zum Zitat Ali, M., Eltabakh, M., & Nita-rotaru, C. (2004). “Robust security mechanisms for data streams systems,” Purdue university, csd technical report 04-019. Ali, M., Eltabakh, M., & Nita-rotaru, C. (2004). “Robust security mechanisms for data streams systems,” Purdue university, csd technical report 04-019.
Zurück zum Zitat Anton, A. (1996). “Goal-based requirements analysis,” in Proceedings of the Second International Conference on Requirements Engineering, pp. 136–144. Anton, A. (1996). “Goal-based requirements analysis,” in Proceedings of the Second International Conference on Requirements Engineering, pp. 136–144.
Zurück zum Zitat Atzori, L., Iera, A., & Morabito, G. (2010). “The internet of things: A survey.” Computer networks, 54(15), 2787–2805. Atzori, L., Iera, A., & Morabito, G. (2010). “The internet of things: A survey.” Computer networks, 54(15), 2787–2805.
Zurück zum Zitat Ballou, D. P., & Pazer, H. L. (1985). Modeling Data and Process Quality in Multi-input, Multi-output Information Systems. Management Science, 31(2), 150–162.CrossRef Ballou, D. P., & Pazer, H. L. (1985). Modeling Data and Process Quality in Multi-input, Multi-output Information Systems. Management Science, 31(2), 150–162.CrossRef
Zurück zum Zitat Batini, C., Scannapieco, M. “Data quality: concepts, methodologies and techniques.” Data-Centric Systems and Applications, Springer 2006. Batini, C., Scannapieco, M. “Data quality: concepts, methodologies and techniques.” Data-Centric Systems and Applications, Springer 2006.
Zurück zum Zitat Bhargav-Spantzel, A., Squicciarini, A., and Bertino, E. “Trust negotiation in identity management,” Security Privacy, IEEE, vol. 5, no. 2, pp. 55 –63, march-April 2007. Bhargav-Spantzel, A., Squicciarini, A., and Bertino, E. “Trust negotiation in identity management,” Security Privacy, IEEE, vol. 5, no. 2, pp. 55 –63, march-April 2007.
Zurück zum Zitat Bovee, M., Srivastava, R. P., & Mak, B. (2001). “A Conceptual Framework and Belief-Function Approach to Assessing Overall Information Quality.” Proc. 6th Int. Conf. on Information Quality (ICIQ-2001), MA, USA, pp.311–32 Bovee, M., Srivastava, R. P., & Mak, B. (2001). “A Conceptual Framework and Belief-Function Approach to Assessing Overall Information Quality.” Proc. 6th Int. Conf. on Information Quality (ICIQ-2001), MA, USA, pp.311–32
Zurück zum Zitat Cao, J., Carminati, B., Ferrari, E., & Tan, K. (2011). “Castle: Continuously anonymizing data streams.” IEEE Transactions on Dependable and Secure Computing, 8(3), 337–352. Cao, J., Carminati, B., Ferrari, E., & Tan, K. (2011). “Castle: Continuously anonymizing data streams.” IEEE Transactions on Dependable and Secure Computing, 8(3), 337–352.
Zurück zum Zitat Chung, L. (1993). “Dealing with security requirements during the development of information systems,” in Advanced Information Systems Engineering, ser. Lecture Notes in Computer Science, C. Rolland, F. Bodart, and C. Cauvet, Eds. Springer Chung, L. (1993). “Dealing with security requirements during the development of information systems,” in Advanced Information Systems Engineering, ser. Lecture Notes in Computer Science, C. Rolland, F. Bodart, and C. Cauvet, Eds. Springer
Zurück zum Zitat Evans, D., & Eyers, D. (2012). “Efficient data tagging for managing privacy in the internet of things.” In Proceedings - 2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, iThings 2012 and Conf. on Cyber, Physical and Social Computing, CP- SCom 2012, Besancon, pp 244–248. Evans, D., & Eyers, D. (2012). “Efficient data tagging for managing privacy in the internet of things.” In Proceedings - 2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, iThings 2012 and Conf. on Cyber, Physical and Social Computing, CP- SCom 2012, Besancon, pp 244–248.
Zurück zum Zitat Guo, B., Zhang, D., Wang, Z., Yu, Z., & Zhou X. (2013). “Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things”. Journal of Network and Computer Applications, 36(6), 1531–1539. doi:10.1016/j.jnca.2012.12.028 Guo, B., Zhang, D., Wang, Z., Yu, Z., & Zhou X. (2013). “Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things”. Journal of Network and Computer Applications, 36(6), 1531–1539. doi:10.​1016/​j.​jnca.​2012.​12.​028
Zurück zum Zitat Huang, X., Fu, R., Chen, B., Zhang, T., Roscoe, A. (2012). “User interactive internet of things privacy preserved access control.” In 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, pp. 597–602. Huang, X., Fu, R., Chen, B., Zhang, T., Roscoe, A. (2012). “User interactive internet of things privacy preserved access control.” In 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, pp. 597–602.
Zurück zum Zitat Kalloniatis, C., Kavakli, E., & Gritzalis, S. (2008). Addressing privacy requirements in system design: the PriS method. Requirements Engineering, 13(3), 241–255.CrossRef Kalloniatis, C., Kavakli, E., & Gritzalis, S. (2008). Addressing privacy requirements in system design: the PriS method. Requirements Engineering, 13(3), 241–255.CrossRef
Zurück zum Zitat Kourouthanassis, P. E., Giaglis, G. M., & Vrechopoulos, A. P. (2007). Enhancing user experiencethroughpervasive information systems: The case of pervasiveretailing. International Journal of Information Management, 27(5), 319–335.CrossRef Kourouthanassis, P. E., Giaglis, G. M., & Vrechopoulos, A. P. (2007). Enhancing user experiencethroughpervasive information systems: The case of pervasiveretailing. International Journal of Information Management, 27(5), 319–335.CrossRef
Zurück zum Zitat Li, F., Nastic, S., & Dustdar, S. (2012). Data Quality Observation in Pervasive Environments. In Proceedings of the 2012 I.E. 15th International Conference on Computational Science and Engineering (CSE ’12). IEEE Computer Society, Washington, DC, USA, 602–609. doi:10.1109/ICCSE.2012.88 Li, F., Nastic, S., & Dustdar, S. (2012). Data Quality Observation in Pervasive Environments. In Proceedings of the 2012 I.E. 15th International Conference on Computational Science and Engineering (CSE ’12). IEEE Computer Society, Washington, DC, USA, 602–609. doi:10.​1109/​ICCSE.​2012.​88
Zurück zum Zitat Lindner, W., & Meier, J. “Securing the borealis data stream engine,” in Proceedings of the 10th International Database Engineering and Applications Symposium, ser. IDEAS’06. Washington, DC, USA: IEEE Computer Society, 2006, pp. 137–147. [Online]. Available: http://dx.doi.org/10.1109/IDEAS.2006.40 Lindner, W., & Meier, J. “Securing the borealis data stream engine,” in Proceedings of the 10th International Database Engineering and Applications Symposium, ser. IDEAS’06. Washington, DC, USA: IEEE Computer Society, 2006, pp. 137–147. [Online]. Available: http://​dx.​doi.​org/​10.​1109/​IDEAS.​2006.​40
Zurück zum Zitat Metzger, A.; Chi-Hung Chi; Engel, Y.; Marconi, A., “Research challenges on online service quality prediction for proactive adaptation,” Software Services and Systems Research – Results and Challenges (S-Cube), 2012 Workshop on European, vol., no., pp.51,57, 5–5 June 2012 doi:10.1109/S-Cube.2012.6225512 Metzger, A.; Chi-Hung Chi; Engel, Y.; Marconi, A., “Research challenges on online service quality prediction for proactive adaptation,” Software Services and Systems Research – Results and Challenges (S-Cube), 2012 Workshop on European, vol., no., pp.51,57, 5–5 June 2012 doi:10.​1109/​S-Cube.​2012.​6225512
Zurück zum Zitat Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Survey internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516.CrossRef Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Survey internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516.CrossRef
Zurück zum Zitat Mylopoulos, J., Chung, L., and Nixon, B. “Representing and using nonfunctional requirements: a process-oriented approach,” Software Engineering, IEEE Transactions on, vol. 18, no. 6, pp. 483 –497, Jun. 1992 Mylopoulos, J., Chung, L., and Nixon, B. “Representing and using nonfunctional requirements: a process-oriented approach,” Software Engineering, IEEE Transactions on, vol. 18, no. 6, pp. 483 –497, Jun. 1992
Zurück zum Zitat Nehme, R., Rundensteiner, E., & Bertino, E. “A security punctuation framework for enforcing access control on streaming data,” in Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, April 2008, pp. 406 –415 Nehme, R., Rundensteiner, E., & Bertino, E. “A security punctuation framework for enforcing access control on streaming data,” in Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, April 2008, pp. 406 –415
Zurück zum Zitat Papazoglou, M. P., Traverso, P., Dustdar, S., & Leymann, F. (2007). Service-Oriented Computing: State of the Art and Research Challenges. IEEE Computer, 40(11), 38–45.CrossRef Papazoglou, M. P., Traverso, P., Dustdar, S., & Leymann, F. (2007). Service-Oriented Computing: State of the Art and Research Challenges. IEEE Computer, 40(11), 38–45.CrossRef
Zurück zum Zitat Sandhu, R. S., Coyne, E. J., Feinstein, H. L. and Youman, C. E. “Role-based access control models,” Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996. [Online]. Available: http://dx.doi.org/10.1109/2.485845 Sandhu, R. S., Coyne, E. J., Feinstein, H. L. and Youman, C. E. “Role-based access control models,” Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996. [Online]. Available: http://​dx.​doi.​org/​10.​1109/​2.​485845
Zurück zum Zitat Sicari, S., Grieco, L. A., Boggia, G., & Coen-Porisini, A. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85(1), 152–166.CrossRef Sicari, S., Grieco, L. A., Boggia, G., & Coen-Porisini, A. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85(1), 152–166.CrossRef
Zurück zum Zitat van Lamsweerde, A., & Letier, E. (2000). Handling obstacles in goal-oriented requirements engineering. IEEE Transactions on Software Engineering, 26(10), 978–1005.CrossRef van Lamsweerde, A., & Letier, E. (2000). Handling obstacles in goal-oriented requirements engineering. IEEE Transactions on Software Engineering, 26(10), 978–1005.CrossRef
Zurück zum Zitat Wang, R., & Strong, D. (1996). Beyond accuracy: What data quality means to data consumers. Journal of Management Information Systems; Armonk; Spring, 12(4), 5–33.CrossRef Wang, R., & Strong, D. (1996). Beyond accuracy: What data quality means to data consumers. Journal of Management Information Systems; Armonk; Spring, 12(4), 5–33.CrossRef
Zurück zum Zitat Wang, Y., & Wen, Q. (2011). “A privacy enhanced dns scheme for the internet of things.” IET International Conference on Communication Technology and Application, ICCTA, Beijing, pp. 699–702. Wang, Y., & Wen, Q. (2011). “A privacy enhanced dns scheme for the internet of things.” IET International Conference on Communication Technology and Application, ICCTA, Beijing, pp. 699–702.
Zurück zum Zitat Yu, Q., Bouguettaya, A., & Medjahed, B. (2008). Deploying and Managing Web Services: Issues, Solutions, and Directions. The VLDB Journal, 17(3), 537–572.CrossRef Yu, Q., Bouguettaya, A., & Medjahed, B. (2008). Deploying and Managing Web Services: Issues, Solutions, and Directions. The VLDB Journal, 17(3), 537–572.CrossRef
Metadaten
Titel
A security-and quality-aware system architecture for Internet of Things
verfasst von
Sabrina Sicari
Cinzia Cappiello
Francesco De Pellegrini
Daniele Miorandi
Alberto Coen-Porisini
Publikationsdatum
01.08.2016
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 4/2016
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-014-9538-x

Weitere Artikel der Ausgabe 4/2016

Information Systems Frontiers 4/2016 Zur Ausgabe

Premium Partner