Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things

Stevan Coroller, S. Chabridon, M. Laurent-Maknavicius, D. Conan, J. Leneutre
{"title":"Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things","authors":"Stevan Coroller, S. Chabridon, M. Laurent-Maknavicius, D. Conan, J. Leneutre","doi":"10.1145/3286719.3286727","DOIUrl":null,"url":null,"abstract":"The Internet of Things paradigm lacks end-to-end privacy solutions to consider its full adoption in real life scenarios in the near future. The recent enactment of the EU General Data Protection Regulation (GDPR) indeed emphasises the need for stronger security and privacy measures for personal data processing and free movement, including consent management and accountability by the data controller and processor. In this paper, we suggest an architecture to enforce end-to-end data usage control in Distributed Event-Based Systems (DEBS), from data producers to consumer services, taking into account some of the GDPR requirements concerning consent management and data processing transparency. Our architecture proposal is based on UCONABC usage control models, which we overlap with a distributed hash table overlay for scalability and fault-tolerance concerns, and across and within systems data usage control. Our proposal highlights the benefits of combining both DEBS and end-user usage control architectures. To complete our approach, we quickly survey existing encryption models that ensure data confidentiality in topic-based Publish/Subscribe systems and highlight the remaining obstacles to transpose them to content-based DEBS with an overlay of brokers.","PeriodicalId":159597,"journal":{"name":"Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3286719.3286727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

The Internet of Things paradigm lacks end-to-end privacy solutions to consider its full adoption in real life scenarios in the near future. The recent enactment of the EU General Data Protection Regulation (GDPR) indeed emphasises the need for stronger security and privacy measures for personal data processing and free movement, including consent management and accountability by the data controller and processor. In this paper, we suggest an architecture to enforce end-to-end data usage control in Distributed Event-Based Systems (DEBS), from data producers to consumer services, taking into account some of the GDPR requirements concerning consent management and data processing transparency. Our architecture proposal is based on UCONABC usage control models, which we overlap with a distributed hash table overlay for scalability and fault-tolerance concerns, and across and within systems data usage control. Our proposal highlights the benefits of combining both DEBS and end-user usage control architectures. To complete our approach, we quickly survey existing encryption models that ensure data confidentiality in topic-based Publish/Subscribe systems and highlight the remaining obstacles to transpose them to content-based DEBS with an overlay of brokers.
意见书:面向物联网发布/订阅架构的端到端隐私
物联网范式缺乏端到端的隐私解决方案,无法在不久的将来在现实生活中全面采用。最近颁布的欧盟通用数据保护条例(GDPR)确实强调了对个人数据处理和自由流动采取更强有力的安全和隐私措施的必要性,包括数据控制者和处理者的同意管理和问责制。在本文中,我们建议在分布式事件系统(DEBS)中实施端到端数据使用控制的架构,从数据生产者到消费者服务,考虑到有关同意管理和数据处理透明度的一些GDPR要求。我们的架构建议基于UCONABC使用控制模型,我们将其与分布式哈希表重叠,以实现可伸缩性和容错问题,以及跨系统和系统内部的数据使用控制。我们的建议强调了结合DEBS和最终用户使用控制体系结构的好处。为了完成我们的方法,我们快速调查了现有的加密模型,这些模型确保了基于主题的发布/订阅系统中的数据保密性,并强调了将它们转换为基于内容的带有代理覆盖的DEBS的剩余障碍。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信