Skip to main content

2019 | OriginalPaper | Buchkapitel

13. User-Centric Privacy

verfasst von : Antonio Skarmeta, José L. Hernández-Ramos, Juan A. Martinez

Erschienen in: Internet of Things Security and Data Protection

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security and privacy aspects are crucial for the acceptance of IoT environments. Accordingly, this chapter will focus on new approaches to enable end user to better control and protect their privacy and personal data. In particular, it will describe the work carried out in the context of the EU project SMARTIE, which proposed a user-centric platform for secure exchange and sharing based on the use of advanced cryptographic schemes. This platform is, in turn, an instantiation of a reference functional architecture derived from the IoT-A project that is also explained. Furthermore, the chapter provides a description about the use of specific technologies and approaches that are employed in the context of Smart Buildings, where data protection aspects are addressed through the mentioned platform.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of Things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRef J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of Things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRef
2.
Zurück zum Zitat G. Kortuem, F. Kawsar, V. Sundramoorthy, D. Fitton, Smart objects as building blocks for the internet of things. IEEE Internet Comput. 14(1), 44–51 (2010)CrossRef G. Kortuem, F. Kawsar, V. Sundramoorthy, D. Fitton, Smart objects as building blocks for the internet of things. IEEE Internet Comput. 14(1), 44–51 (2010)CrossRef
3.
Zurück zum Zitat E. Rescorla, N. Modadugu, Datagram transport layer security version 1.2. (No. RFC 6347) (2012) E. Rescorla, N. Modadugu, Datagram transport layer security version 1.2. (No. RFC 6347) (2012)
4.
Zurück zum Zitat L. Seitz, S. Gerdes, G. Selander, M. Mani, S. Kumar, Use cases for authentication and authorisation in constrained environments (No. RFC 7744) (2016) L. Seitz, S. Gerdes, G. Selander, M. Mani, S. Kumar, Use cases for authentication and authorisation in constrained environments (No. RFC 7744) (2016)
5.
Zurück zum Zitat J.L. Hernández-Ramos, D.G. Carrillo, A. Skarmeta, F. Gonçalves, L. Cortesão, J.M. Bohli, M. Bauer, SMARTIE: a secure platform for Smart Cities and IoT. Eng. Secure Intern. Things Syst. 2, 75 (2016)CrossRef J.L. Hernández-Ramos, D.G. Carrillo, A. Skarmeta, F. Gonçalves, L. Cortesão, J.M. Bohli, M. Bauer, SMARTIE: a secure platform for Smart Cities and IoT. Eng. Secure Intern. Things Syst. 2, 75 (2016)CrossRef
6.
Zurück zum Zitat D. Bonino, M.T.D. Alizo, A. Alapetite, T. Gilbert, M. Axling, H. Udsen, et al., Almanac: internet of things for smart cities, in Future Internet of Things and Cloud (FiCloud), 2015 3rd International Conference, (IEEE, New York, 2015), pp. 309–316CrossRef D. Bonino, M.T.D. Alizo, A. Alapetite, T. Gilbert, M. Axling, H. Udsen, et al., Almanac: internet of things for smart cities, in Future Internet of Things and Cloud (FiCloud), 2015 3rd International Conference, (IEEE, New York, 2015), pp. 309–316CrossRef
7.
Zurück zum Zitat H.C. Pöhls, V. Angelakis, S. Suppan, K. Fischer, G. Oikonomou, E.Z. Tragos, et al., RERUM: building a reliable IoT upon privacy-and security-enabled smart objects, in Wireless Communications and Networking Conference Workshops (WCNCW), 2014 IEEE, (IEEE, New York, 2014), pp. 122–127 H.C. Pöhls, V. Angelakis, S. Suppan, K. Fischer, G. Oikonomou, E.Z. Tragos, et al., RERUM: building a reliable IoT upon privacy-and security-enabled smart objects, in Wireless Communications and Networking Conference Workshops (WCNCW), 2014 IEEE, (IEEE, New York, 2014), pp. 122–127
8.
Zurück zum Zitat J.B. Bernabe, I. Elicegui, E. Gandrille, N. Gligoric, A. Gluhak, C. Hennebert, et al., SocIoTal—the development and architecture of a social IoT framework, in Global internet of things summit (GIoTS), 2017, (IEEE, New York, 2017), pp. 1–6 J.B. Bernabe, I. Elicegui, E. Gandrille, N. Gligoric, A. Gluhak, C. Hennebert, et al., SocIoTal—the development and architecture of a social IoT framework, in Global internet of things summit (GIoTS), 2017, (IEEE, New York, 2017), pp. 1–6
9.
Zurück zum Zitat A. Bassi, M. Bauer, M. Fiedler, T. Kramp, R. Van Kranenburg, S. Lange, S. Meissner, Enabling things to talk (Springer, Berlin, 2016) A. Bassi, M. Bauer, M. Fiedler, T. Kramp, R. Van Kranenburg, S. Lange, S. Meissner, Enabling things to talk (Springer, Berlin, 2016)
10.
Zurück zum Zitat T. Cooper, R. LaSalle, Guarding and growing personal data value. Accenture Institute for High Performance (2015) T. Cooper, R. LaSalle, Guarding and growing personal data value. Accenture Institute for High Performance (2015)
11.
Zurück zum Zitat A. Poikola, K. Kuikkaniemi, H. Honko, Mydata a nordic model for human-centered personal data management and processing. Finnish Ministry of Transport and Communications (2015) A. Poikola, K. Kuikkaniemi, H. Honko, Mydata a nordic model for human-centered personal data management and processing. Finnish Ministry of Transport and Communications (2015)
12.
Zurück zum Zitat D. Ferraiolo, J. Cugini, D.R. Kuhn. Role-based access control (RBAC): features and motivations. In Proceedings of 11th annual computer security application conference (1995), pp. 241–248 D. Ferraiolo, J. Cugini, D.R. Kuhn. Role-based access control (RBAC): features and motivations. In Proceedings of 11th annual computer security application conference (1995), pp. 241–248
13.
Zurück zum Zitat E. Yuan, J. Tong, Attributed based access control (ABAC) for web services, in Web Services, 2005. ICWS 2005. Proceedings. 2005 IEEE International Conference, (IEEE, New York, 2005) E. Yuan, J. Tong, Attributed based access control (ABAC) for web services, in Web Services, 2005. ICWS 2005. Proceedings. 2005 IEEE International Conference, (IEEE, New York, 2005)
14.
Zurück zum Zitat T. Moses, Extensible access control markup language (xacml) version 2.0. Oasis Standard, 2005 (2005) T. Moses, Extensible access control markup language (xacml) version 2.0. Oasis Standard, 2005 (2005)
15.
Zurück zum Zitat J.L. Hernández-Ramos, A.J. Jara, L. Marín, A.F. Skarmeta Gómez, DCapBAC: embedding authorisation logic into smart things through ECC optimisations. Int. J. Comput. Math. 93(2), 345–366 (2016)CrossRef J.L. Hernández-Ramos, A.J. Jara, L. Marín, A.F. Skarmeta Gómez, DCapBAC: embedding authorisation logic into smart things through ECC optimisations. Int. J. Comput. Math. 93(2), 345–366 (2016)CrossRef
16.
Zurück zum Zitat C.M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, T. Ylonen, SPKI certificate theory (1999), RFC2693 C.M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, T. Ylonen, SPKI certificate theory (1999), RFC2693
17.
Zurück zum Zitat M. Jones, J. Bradley, N. Sakimura, Json web token (jwt) (No. RFC 7519) (2015) M. Jones, J. Bradley, N. Sakimura, Json web token (jwt) (No. RFC 7519) (2015)
18.
Zurück zum Zitat J.B. Bernabe, J.L.H. Ramos, A.F.S. Gomez, TACIoT: multidimensional trust-aware access control system for the Internet of Things. Soft. Comput. 20(5), 1763–1779 (2016)CrossRef J.B. Bernabe, J.L.H. Ramos, A.F.S. Gomez, TACIoT: multidimensional trust-aware access control system for the Internet of Things. Soft. Comput. 20(5), 1763–1779 (2016)CrossRef
19.
Zurück zum Zitat T. Hardjono, E. Maler, M. Machulak, D. Catalano. User-managed access (uma) profile of oauth 2.0. Kantara Initiative, Recommendation, 04 (2014) T. Hardjono, E. Maler, M. Machulak, D. Catalano. User-managed access (uma) profile of oauth 2.0. Kantara Initiative, Recommendation, 04 (2014)
20.
Zurück zum Zitat J.L. Hernández-Ramos, J.B. Bernabe, M. Moreno, A.F. Skarmeta, Preserving smart objects privacy through anonymous and accountable access control for a m2m-enabled internet of things. Sensors 15(7), 15611–15639 (2015)CrossRef J.L. Hernández-Ramos, J.B. Bernabe, M. Moreno, A.F. Skarmeta, Preserving smart objects privacy through anonymous and accountable access control for a m2m-enabled internet of things. Sensors 15(7), 15611–15639 (2015)CrossRef
21.
Zurück zum Zitat J. Camenisch, E. Van Herreweghen, Design and implementation of the idemix anonymous credential system, in Proceedings of the 9th ACM conference on Computer and communications security, (ACM, New York, 2002), pp. 21–30 J. Camenisch, E. Van Herreweghen, Design and implementation of the idemix anonymous credential system, in Proceedings of the 9th ACM conference on Computer and communications security, (ACM, New York, 2002), pp. 21–30
22.
Zurück zum Zitat Z. Shelby, K. Hartke, C. Bormann, B. Frank. The Constrained Application Protocol (CoAP)(RFC 7252), 2014 (2016) Z. Shelby, K. Hartke, C. Bormann, B. Frank. The Constrained Application Protocol (CoAP)(RFC 7252), 2014 (2016)
23.
24.
Zurück zum Zitat V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in Proceedings of the 13th ACM conference on Computer and communications security, (ACM, New York, 2006), pp. 89–98 V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in Proceedings of the 13th ACM conference on Computer and communications security, (ACM, New York, 2006), pp. 89–98
25.
Zurück zum Zitat J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in Security and Privacy, 2007. SP’07. IEEE Symposium on, (IEEE, New York, 2007), pp. 321–334CrossRef J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in Security and Privacy, 2007. SP’07. IEEE Symposium on, (IEEE, New York, 2007), pp. 321–334CrossRef
27.
Zurück zum Zitat J.L. Hernandez-Ramos, J.B. Bernabé, A. Skarmeta, ARMY: architecture for a secure and privacy-aware lifecycle of smart objects in the internet of my things. IEEE Commun. Mag. 54(9), 28–35 (2016)CrossRef J.L. Hernandez-Ramos, J.B. Bernabé, A. Skarmeta, ARMY: architecture for a secure and privacy-aware lifecycle of smart objects in the internet of my things. IEEE Commun. Mag. 54(9), 28–35 (2016)CrossRef
28.
Zurück zum Zitat D. Forsberg, Y. Ohba, B. Patil, H. Tschofenig, A. Yegin. Protocol for carrying authentication for network access (PANA) (No. RFC 5191) (2008) D. Forsberg, Y. Ohba, B. Patil, H. Tschofenig, A. Yegin. Protocol for carrying authentication for network access (PANA) (No. RFC 5191) (2008)
29.
Zurück zum Zitat J.L. Hernández-Ramos, D.G. Carrillo, R. Marín-López, A.F. Skarmeta, Dynamic security credentials pana-based provisioning for IoT smart objects, in Internet of Things (WF-IoT), 2015 IEEE 2nd World Forum, (IEEE, New York, 2015), pp. 783–788CrossRef J.L. Hernández-Ramos, D.G. Carrillo, R. Marín-López, A.F. Skarmeta, Dynamic security credentials pana-based provisioning for IoT smart objects, in Internet of Things (WF-IoT), 2015 IEEE 2nd World Forum, (IEEE, New York, 2015), pp. 783–788CrossRef
Metadaten
Titel
User-Centric Privacy
verfasst von
Antonio Skarmeta
José L. Hernández-Ramos
Juan A. Martinez
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-04984-3_13

Neuer Inhalt