152 research outputs found
User-centric Privacy Engineering for the Internet of Things
User privacy concerns are widely regarded as a key obstacle to the success of
modern smart cyber-physical systems. In this paper, we analyse, through an
example, some of the requirements that future data collection architectures of
these systems should implement to provide effective privacy protection for
users. Then, we give an example of how these requirements can be implemented in
a smart home scenario. Our example architecture allows the user to balance the
privacy risks with the potential benefits and take a practical decision
determining the extent of the sharing. Based on this example architecture, we
identify a number of challenges that must be addressed by future data
processing systems in order to achieve effective privacy management for smart
cyber-physical systems.Comment: 12 Page
Envisioning Tool Support for Designing Privacy-Aware Internet of Thing Applications
The design and development process for Internet of Things (IoT) applications
is more complicated than for desktop, mobile, or web applications. IoT
applications require both software and hardware to work together across
multiple different types of nodes (e.g., microcontrollers, system-on-chips,
mobile phones, miniaturised single-board computers, and cloud platforms) with
different capabilities under different conditions. IoT applications typically
collect and analyse personal data that can be used to derive sensitive
information about individuals. Without proper privacy protections in place, IoT
applications could lead to serious privacy violations. Thus far, privacy
concerns have not been explicitly considered in software engineering processes
when designing and developing IoT applications, partly due to a lack of tools,
technologies, and guidance. This paper presents a research vision that argues
the importance of developing a privacy-aware IoT application design tool to
address the challenges mentioned above. This tool should not only transform IoT
application designs into privacy-aware application designs but also validate
and verify them. First, we outline how this proposed tool should work in
practice and its core functionalities. Then, we identify research challenges
and potential directions towards developing the proposed tool. We anticipate
that this proposed tool will save many engineering hours which engineers would
otherwise need to spend on developing privacy expertise and applying it. We
also highlight the usefulness of this tool towards privacy education and
privacy compliance
Configurable structure tree as a means to manage configurable business processes
© 2017 IEEE. A configurable Business Process (BP) is an abstract BP that engineers customize with respect to specific requirements. To keep track of the multiple and recurrent customizations that lead to a set of derived BPs, this paper proposes a knowledge-based approach that uses a new Process Structure Tree called configurable PST (cPST). A cPST abstracts a separate variability option of the configurable BP. All cPSTs should be equivalent to the set of all PSTs associated with the derived BPs that could originate from the same configurable BP. This paper also proposes a logic-based configuration model for capturing configuration details on the cBP and describing the cPST computing
AnoML-IoT: An End to End Re-configurable Multi-protocol Anomaly Detection Pipeline for Internet of Things
The rapid development in ubiquitous computing has enabled the use of
microcontrollers as edge devices. These devices are used to develop truly
distributed IoT-based mechanisms where machine learning (ML) models are
utilized. However, integrating ML models to edge devices requires an
understanding of various software tools such as programming languages and
domain-specific knowledge. Anomaly detection is one of the domains where a high
level of expertise is required to achieve promising results. In this work, we
present AnoML which is an end-to-end data science pipeline that allows the
integration of multiple wireless communication protocols, anomaly detection
algorithms, deployment to the edge, fog, and cloud platforms with minimal user
interaction. We facilitate the development of IoT anomaly detection mechanisms
by reducing the barriers that are formed due to the heterogeneity of an IoT
environment. The proposed pipeline supports four main phases: (i) data
ingestion, (ii) model training, (iii) model deployment, (iv) inference and
maintaining. We evaluate the pipeline with two anomaly detection datasets while
comparing the efficiency of several machine learning algorithms within
different nodes. We also provide the source code
(https://gitlab.com/IOTGarage/anoml-iot-analytics) of the developed tools which
are the main components of the pipeline.Comment: Elsevier Internet of Things, Volume 16, 100437, December 202
Privacy-preserving data analysis workflows for eScience
©2019 Copyright held by the author(s). Computing-intensive experiences in modern sciences have become increasingly data-driven illustrating perfectly the Big-Data era’s challenges. These experiences are usually specified and enacted in the form of workflows that would need to manage (i.e., read, write, store, and retrieve) sensitive data like persons’ past diseases and treatments. While there is an active research body on how to protect sensitive data by, for instance, anonymizing datasets, there is a limited number of approaches that would assist scientists identifying the datasets, generated by the workflows, that need to be anonymized along with setting the anonymization degree that must be met. We present in this paper a preliminary for setting and inferring anonymization requirements of datasets used and generated by a workflow execution. The approach was implemented and showcased using a concrete example, and its efficiency assessed through validation exercises
A knowledge-based approach to manage configurable business processes
© 2018 John Wiley & Sons, Ltd. This paper stresses out the struggle of organizations when managing multiple variants of the same business process. Each variant constitutes a response to structural and/or functional needs that overtime become unsustainable due to the multiplicity and complexity of these needs. To mitigate this struggle, a knowledge-based approach for capturing these versions into a single configurable business process and splitting this process into fragments is discussed in the paper. The approach builds a configuration knowledge base to track the business process variability (ie, particularities of each business process variant). Variants are represented as a new configurable process structure tree resulting from fragmenting a business process. Implementation of the approach is, also, reported in this paper
Authentic-caller : self-enforcing authentication in a next generation network
The Internet of Things (IoT) or the Cyber-Physical System (CPS) is the network of connected devices, things and people which collect and exchange information using the emerging telecommunication networks (4G, 5G IP-based LTE). These emerging telecommunication networks can also be used to transfer critical information between the source and destination, informing the control system about the outage in the electrical grid, or providing information about the emergency at the national express highway. This sensitive information requires authorization and authentication of source and destination involved in the communication. To protect the network from unauthorized access and to provide authentication, the telecommunication operators have to adopt the mechanism for seamless verification and authorization of parties involved in the communication. Currently, the next-generation telecommunication networks use a digest-based authentication mechanism, where the call-processing engine of the telecommunication operator initiates the challenge to the request-initiating client or caller, which is being solved by the client to prove his credentials. However, the digest-based authentication mechanisms are vulnerable to many forms of known attacks e.g., the Man-In-The-Middle (MITM) attack and the password guessing attack. Furthermore, the digest-based systems require extensive processing overheads. Several Public-Key Infrastructure (PKI) based and identity-based schemes have been proposed for the authentication and key agreements. However, these schemes generally require smart-card to hold long-term private keys and authentication credentials. In this paper, we propose a novel self-enforcing authentication protocol for the SIPbased next-generation network based on a low-entropy shared password without relying on any PKI or trusted third party system. The proposed system shows effective resistance against various attacks e.g., MITM, replay attack, password guessing attack, etc. We a..
- …