Mouna Rhahla, T. Abdellatif, Rabah Attia, W. Berrayana
{"title":"物联网系统的GDPR控制器:电子健康应用","authors":"Mouna Rhahla, T. Abdellatif, Rabah Attia, W. Berrayana","doi":"10.1109/WETICE.2019.00044","DOIUrl":null,"url":null,"abstract":"General Data Protection Regulation (GDPR) targets personal data protection of the European Union citizens, with a strong input on the rights of people to control their data. Current GDPR solutions are adhoc and are still challenging for scalable systems like Internet of Things (IoT). In this paper, we propose a general solution of a GDPR Controller in IoT systems. The controller gives the data owner a full control of his data: setting security policies, modifying them on run time, tracking data flow and notifying him for any illicit access. The controller architecture is validated and evaluated using an e-health use case with acceptable overhead on the system performance.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"A GDPR Controller for IoT Systems: Application to e-Health\",\"authors\":\"Mouna Rhahla, T. Abdellatif, Rabah Attia, W. Berrayana\",\"doi\":\"10.1109/WETICE.2019.00044\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"General Data Protection Regulation (GDPR) targets personal data protection of the European Union citizens, with a strong input on the rights of people to control their data. Current GDPR solutions are adhoc and are still challenging for scalable systems like Internet of Things (IoT). In this paper, we propose a general solution of a GDPR Controller in IoT systems. The controller gives the data owner a full control of his data: setting security policies, modifying them on run time, tracking data flow and notifying him for any illicit access. The controller architecture is validated and evaluated using an e-health use case with acceptable overhead on the system performance.\",\"PeriodicalId\":116875,\"journal\":{\"name\":\"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WETICE.2019.00044\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WETICE.2019.00044","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A GDPR Controller for IoT Systems: Application to e-Health
General Data Protection Regulation (GDPR) targets personal data protection of the European Union citizens, with a strong input on the rights of people to control their data. Current GDPR solutions are adhoc and are still challenging for scalable systems like Internet of Things (IoT). In this paper, we propose a general solution of a GDPR Controller in IoT systems. The controller gives the data owner a full control of his data: setting security policies, modifying them on run time, tracking data flow and notifying him for any illicit access. The controller architecture is validated and evaluated using an e-health use case with acceptable overhead on the system performance.