Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-319-68136-8_9guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Securing Data Provenance in Internet of Things (IoT) Systems

Published: 10 October 2016 Publication History

Abstract

The Internet of Things (IoT) promises to yield a plethora of new innovative applications based on highly interconnected devices. In order to enable IoT applications for critical and/or sensitive use cases, it is important to (i) foster their dependability by assuring and verifying the integrity and correctness of data processed in such applications, and (ii) adequately account for privacy and confidentiality concerns. For addressing these requirements, IoT systems can be equipped with data provenance mechanisms for maintaining information on the lineage and ownership of data. However, in order to provide secure and dependable IoT systems, provenance data needs to be sufficiently protected against tampering and unauthorized access. In this paper, we present a novel framework for cryptographic provenance data protection and access control based on blockchain technology and confidentiality policies.

References

[1]
Gadelha, J., et al.: Kairos: an architecture for securing authorship and temporal information of provenance data in grid-enabled workflow management systems. In: eScience 2008 (2008)
[2]
Braun, U., Shinnar, A., Seltzer, M.I.: Securing provenance. In: HotSec (2008)
[3]
Buldas A, Kroonmaa A, and Laanoja R Riis Nielson H and Gollmann D Keyless signatures’ infrastructure: how to build global distributed hash-trees Secure IT Systems 2013 Heidelberg Springer 313-320
[4]
Buldas A, Truu A, Laanoja R, and Gerhards R Bernsmed K and Fischer-Hübner S Efficient record-level keyless signatures for audit logs Secure IT Systems 2014 Cham Springer 149-164
[5]
Buneman P, Khanna S, and Wang-Chiew T Van den Bussche J and Vianu V Why and where: a characterization of data provenance Database Theory — ICDT 2001 2001 Heidelberg Springer 316-330
[6]
Gartner: Gartner says worldwide IoT security spending to reach $348 million in 2016 (2016). http://www.gartner.com/newsroom/id/3291817
[7]
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
[8]
Gubbi J, Buyya R, Marusic S, and Palaniswami M Internet of Things (IoT): a vision, architectural elements, and future directions Future Gen. Comp. Sys. 2013 29 7 1645-1660
[9]
Hasan R, Sion R, and Winslett M The case of the fake picasso: preventing history forgery with secure provenance FAST 2009 9 1-14
[11]
Linux Foundation: The Hyperledger Project (2016). https://www.hyperledger.org
[12]
Muniswamy-Reddy KK and Seltzer M Provenance as first class cloud data ACM SIGOPS Oper. Syst. Rev. 2010 43 4 11-16
[13]
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf
[14]
Rangwala, M., Liang, Z., Peng, W., Zou, X., Li, F.: A mutual agreement signature scheme for secure data provenance. Environments 13, 14
[15]
Rodrigues R and Liskov B Castro M and van Renesse R High availability in DHTs: erasure coding vs. replication Peer-to-Peer Systems IV 2005 Heidelberg Springer 226-239
[16]
Sahai A and Waters B Cramer R Fuzzy identity-based encryption Advances in Cryptology – EUROCRYPT 2005 2005 Heidelberg Springer 457-473
[17]
Wang, X., Zeng, K., Govindan, K., Mohapatra, P.: Chaining for securing data provenance in distributed information networks. In: MILCOM 2012, pp. 1–6 (2012)

Cited By

View all
  • (2019)Blockchain-based Data Provenance for the Internet of ThingsProceedings of the 9th International Conference on the Internet of Things10.1145/3365871.3365886(1-8)Online publication date: 22-Oct-2019

Index Terms

  1. Securing Data Provenance in Internet of Things (IoT) Systems
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image Guide Proceedings
          Service-Oriented Computing – ICSOC 2016 Workshops: ASOCA, ISyCC, BSCI, and Satellite Events, Banff, AB, Canada, October 10–13, 2016, Revised Selected Papers
          Oct 2016
          198 pages
          ISBN:978-3-319-68135-1
          DOI:10.1007/978-3-319-68136-8
          • Editors:
          • Khalil Drira,
          • Hongbing Wang,
          • Qi Yu,
          • Yan Wang,
          • Yuhong Yan,
          • François Charoy,
          • Jan Mendling,
          • Mohamed Mohamed,
          • Zhongjie Wang,
          • Sami Bhiri

          Publisher

          Springer-Verlag

          Berlin, Heidelberg

          Publication History

          Published: 10 October 2016

          Author Tags

          1. IoT
          2. Provenance
          3. Security
          4. Blockchain
          5. Keyless signature
          6. Access control

          Qualifiers

          • Article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 04 Oct 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2019)Blockchain-based Data Provenance for the Internet of ThingsProceedings of the 9th International Conference on the Internet of Things10.1145/3365871.3365886(1-8)Online publication date: 22-Oct-2019

          View Options

          View options

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media