skip to main content
10.1145/3009925.3009929acmconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
short-paper

Privacy-enhancing Federated Middleware for the Internet of Things

Published: 12 December 2016 Publication History

Abstract

The Internet of Things (IoT) offers new opportunities, but alongside those come many challenges for security and privacy. Most IoT devices offer no choice to users of where data is published, which data is made available and what identities are used for both devices and users. The aim of this work is to explore new middleware models and techniques that can provide users with more choice as well as enhance privacy and security. This paper outlines a new model and a prototype of a middleware system that implements this model.

References

[1]
B. Aziz, A. Arenas, and B. Crispo. Engineering secure Internet of Things systems. Institution of Engineering and Technology, 2016.
[2]
J. B. Bernabe, J. L. Hernández, M. V. Moreno, and A. F. S. Gomez. Privacy-preserving security framework for a social-aware internet of things. In International Conference on Ubiquitous Computing and Ambient Intelligence, pages 408--415. Springer, 2014.
[3]
A. Cavoukian, S. Taylor, and M. E. Abrams. Privacy by design: essential for organizational accountability and strong business practices. Identity in the Information Society, 3(2):405--413, 2010.
[4]
S. Cirani, M. Picone, P. Gonizzi, L. Veltri, and G. Ferrari. IoT-OAS: An OAuth-based Authorization Service Architecture for Secure Services in IoT Scenarios. 2015.
[5]
M. Cohn. User stories applied: For agile software development. Addison-Wesley Professional, 2004.
[6]
H. Desruelle, J. Lyle, S. Isenberg, and F. Gielen. On the challenges of building a web-based ubiquitous application platform. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pages 733--736. ACM, 2012.
[7]
S. Emerson, Y.-K. Choi, D.-Y. Hwang, K.-S. Kim, and K.-H. Kim. An oauth based authentication mechanism for iot networks. In Information and Communication Technology Convergence (ICTC), 2015 International Conference on, pages 1072--1074. IEEE, 2015.
[8]
P. Fremantle, B. Aziz, J. Kopecky, and P. Scott. Federated identity and access management for the internet of things. In Secure Internet of Things (SIoT), 2014 International Workshop on, pages 10--17. IEEE, 2014.
[9]
P. Fremantle, J. Kopecky, and B. Aziz. Web api management meets the internet of things. In European Semantic Web Conference, pages 367--375. Springer, 2015.
[10]
IETF. Authentication and authorization for constrained environments (ace) - documents. https://datatracker.ietf.org/wg/ace/documents/. (Accessed on 30th August 2016).
[11]
T. Kohno, A. Broido, and K. C. Claffy. Remote physical device fingerprinting. IEEE Transactions on Dependable and Secure Computing, 2(2):93--108, 2005.
[12]
A. Niruntasukrat, C. Issariyapat, P. Pongpaibool, K. Meesublak, P. Aiumsupucgul, and A. Panya. Authorization mechanism for mqtt-based internet of things. In 2016 IEEE International Conference on Communications Workshops (ICC), pages 290--295. IEEE, 2016.
[13]
D. Rotondi, C. Seccia, and S. Piccione. Access control & iot: Capability based authorization access control system. In 1st IoT International Forum, Berlin, November, 2011.
[14]
S. Spiekermann and L. F. Cranor. Engineering privacy. IEEE Transactions on software engineering, 35(1):67--82, 2009.

Cited By

View all
  • (2019)Privacy Enhancing Technologies in the Internet of Things: Perspectives and ChallengesIEEE Internet of Things Journal10.1109/JIOT.2018.28786586:2(2159-2187)Online publication date: Apr-2019
  • (2017)Internet of things security patternsProceedings of the 24th Conference on Pattern Languages of Programs10.5555/3290281.3290305(1-28)Online publication date: 23-Oct-2017
  • (2017)A Study on a JWT-Based User Authentication and API Assessment Scheme Using IMEI in a Smart Home EnvironmentSustainability10.3390/su90710999:7(1099)Online publication date: 23-Jun-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
Middleware Doctoral Symposium'16: Proceedings of the Doctoral Symposium of the 17th International Middleware Conference
December 2016
31 pages
ISBN:9781450346658
DOI:10.1145/3009925
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 December 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cloud
  2. Internet of Things
  3. Security and Privacy
  4. Sensors and Actuators

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

Middleware '16
Sponsor:
  • ACM
  • USENIX Assoc

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Privacy Enhancing Technologies in the Internet of Things: Perspectives and ChallengesIEEE Internet of Things Journal10.1109/JIOT.2018.28786586:2(2159-2187)Online publication date: Apr-2019
  • (2017)Internet of things security patternsProceedings of the 24th Conference on Pattern Languages of Programs10.5555/3290281.3290305(1-28)Online publication date: 23-Oct-2017
  • (2017)A Study on a JWT-Based User Authentication and API Assessment Scheme Using IMEI in a Smart Home EnvironmentSustainability10.3390/su90710999:7(1099)Online publication date: 23-Jun-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media