Skip to main content
Erschienen in: The Journal of Supercomputing 9/2018

27.11.2017

Enforcing high-level security policies for Internet of Things

verfasst von: ChangJin Koo, JeongYeon Kim

Erschienen in: The Journal of Supercomputing | Ausgabe 9/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

IoT is rapidly a developing area, but there are uncertainties about its security and privacy issues. In several IoT services, important data such as personal information are shared between system components. While it may simplify repetitive transactions, keeping the personal information increases the likelihood of identity theft causing direct or indirect damage. This study introduces quantitative analysis based on demand–supply curve for the damage caused by leakages of personal identification information and shows how security investment is decided to adopt high-level security compliance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chae J, Jeong J (2013) Study on decision making for the industrial security management factor’s priority. J Secur Eng 10(2):123–140 Chae J, Jeong J (2013) Study on decision making for the industrial security management factor’s priority. J Secur Eng 10(2):123–140
2.
Zurück zum Zitat Lee C-C, Kim J, Lee C (2014) A comparative study on the priorities between perceived importance and investment of the areas for information security management system. J Korea Inst Inf Secur Cryptol 24:5CrossRef Lee C-C, Kim J, Lee C (2014) A comparative study on the priorities between perceived importance and investment of the areas for information security management system. J Korea Inst Inf Secur Cryptol 24:5CrossRef
3.
Zurück zum Zitat Singh D, Tripathi G, Jara AJ (2014) A survey of Internet-of-Things: future vision, architecture, challenges and services. In: 2014 IEEE World Forum on Internet of Things (WF-IoT). IEEE, pp 287–292 Singh D, Tripathi G, Jara AJ (2014) A survey of Internet-of-Things: future vision, architecture, challenges and services. In: 2014 IEEE World Forum on Internet of Things (WF-IoT). IEEE, pp 287–292
4.
Zurück zum Zitat Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 44(9):51–58CrossRef Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 44(9):51–58CrossRef
5.
Zurück zum Zitat Mattern F, Floerkemeier C (2010) From the Internet of Computers to the Internet of Things. In: Sachs K, Petrov I, Guerrero P (eds) From active data management to event-based systems and more. Springer, Berlin, pp 242–259CrossRef Mattern F, Floerkemeier C (2010) From the Internet of Computers to the Internet of Things. In: Sachs K, Petrov I, Guerrero P (eds) From active data management to event-based systems and more. Springer, Berlin, pp 242–259CrossRef
6.
Zurück zum Zitat Miorandi D et al (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516CrossRef Miorandi D et al (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516CrossRef
7.
Zurück zum Zitat Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805CrossRefMATH Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805CrossRefMATH
8.
Zurück zum Zitat Bojanc R, Jerman-Blažič B (2012) Quantitative model for economic analyses of information security investment in an enterprise information system. Organizacija 45(6):276–288CrossRef Bojanc R, Jerman-Blažič B (2012) Quantitative model for economic analyses of information security investment in an enterprise information system. Organizacija 45(6):276–288CrossRef
9.
Zurück zum Zitat Jerman-Blažič B et al (2012) Managing the investment in information security technology by use of a quantitative modeling. Inf Process Manag 48(6):1031–1052CrossRef Jerman-Blažič B et al (2012) Managing the investment in information security technology by use of a quantitative modeling. Inf Process Manag 48(6):1031–1052CrossRef
10.
Zurück zum Zitat Mclean G, Brown J (2003) Determining the ROI in IT Security. CA Magazine Mclean G, Brown J (2003) Determining the ROI in IT Security. CA Magazine
11.
Zurück zum Zitat Purser SA (2004) Improving the ROI of the security management process. Comput Secur 23(7):542–546CrossRef Purser SA (2004) Improving the ROI of the security management process. Comput Secur 23(7):542–546CrossRef
12.
Zurück zum Zitat Han C-H et al (2011) A quantitative assessment model of private information breach. J Soc e-Bus Stud 16(4):17–31CrossRef Han C-H et al (2011) A quantitative assessment model of private information breach. J Soc e-Bus Stud 16(4):17–31CrossRef
13.
Zurück zum Zitat Anderson R, Moore T (2006) The economics of information security. Science 314(5799):610–613CrossRef Anderson R, Moore T (2006) The economics of information security. Science 314(5799):610–613CrossRef
14.
Zurück zum Zitat Årnes A et al (2006) Using hidden markov models to evaluate the risks of intrusions. In: Zamboni D, Kruegel C (eds) Recent advances in intrusion detection. Springer, Berlin, pp 145–164CrossRef Årnes A et al (2006) Using hidden markov models to evaluate the risks of intrusions. In: Zamboni D, Kruegel C (eds) Recent advances in intrusion detection. Springer, Berlin, pp 145–164CrossRef
15.
Zurück zum Zitat Sklavos N, Souras P (2006) Economic models and approaches in information security for computer networks. IJ Netw Secur 2(1):14–20 Sklavos N, Souras P (2006) Economic models and approaches in information security for computer networks. IJ Netw Secur 2(1):14–20
16.
Zurück zum Zitat Gordon LA, Loeb MP (2002) The economics of information security investment. ACM Trans Inf Syst Secur (TISSEC) 5(4):438–457CrossRef Gordon LA, Loeb MP (2002) The economics of information security investment. ACM Trans Inf Syst Secur (TISSEC) 5(4):438–457CrossRef
17.
Zurück zum Zitat Campbell K et al (2003) The economic cost of publicly announced information security breaches: empirical evidence from the stock market. J Comput Secur 11(3):431–448CrossRef Campbell K et al (2003) The economic cost of publicly announced information security breaches: empirical evidence from the stock market. J Comput Secur 11(3):431–448CrossRef
Metadaten
Titel
Enforcing high-level security policies for Internet of Things
verfasst von
ChangJin Koo
JeongYeon Kim
Publikationsdatum
27.11.2017
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 9/2018
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-017-2201-9

Weitere Artikel der Ausgabe 9/2018

The Journal of Supercomputing 9/2018 Zur Ausgabe

Premium Partner