3,582 Hits in 4.3 sec

Towards Privacy-Preserving IoT Systems Using Model Driven Engineering

Judith Michael, Lukas Netz, Bernhard Rumpe, Simon Varga
2019 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems  
This paper discusses a way to create privacy-preserving IoT systems using an MDE approach to support privacy and data transparency.  ...  For MDE approaches it is important to consider privacy already on model level.  ...  PRIVACY-PRESERVING IOT SYSTEMS AND MDE The next steps towards privacy-preserving system design for IoT using an MDE approach are (1) to discuss privacypreserving systems design in the system architecture  ... 
dblp:conf/models/MichaelNRV19 fatcat:qd7m25oqxvf5vdctz7dt76topi

A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT

Rajani Chetan, Ramesh Shahabadkar
2018 International Journal of Electrical and Computer Engineering (IJECE)  
At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws.  ...  internet-based computing systems well capable of interacting with each other in an IoT.  ...  In futuristic IoT enabled applications, the long-term vision of network engineers is to connect every possible device used in daily life, to the internet.  ... 
doi:10.11591/ijece.v8i4.pp2319-2326 fatcat:burfrwji4vdznozho2kiluuqpm

Guest Editorial: Special Issue on Enabling Massive IoT With 6G: Applications, Architectures, Challenges, and Research Directions

Shahid Mumtaz, Varun G. Menon, Anwer Al-Dulaimi, Muhammad Ikram Ashraf, Mohsen Guizani
2021 IEEE Internet of Things Journal  
We hope that this special issue will serve as a useful reference for researchers, scientists, engineers, and academics in the field of massive IoT with 6G.  ...  management and privacy preservation in vehicular networks using a novel method named BTMPP, which is able to provide both the precise trust management and strong conditional privacy preservation simultaneously  ...  In "Privacy-preserving multiobjective sanitization model in 6G IoT environments," Lin et al. investigate the need to secure 6G IoT networks and discuss an ant colony optimization (ACO) approach by adopting  ... 
doi:10.1109/jiot.2021.3061231 fatcat:pqsf5wqmv5gdfjxilm56sszpom

Envisioning Tool Support for Designing Privacy-Aware Internet of Thing Applications [article]

Charith Perera, Mahmoud Barhamgi, Massimo Vecchio
2020 arXiv   pre-print
We also highlight the usefulness of this tool towards privacy education and privacy compliance.  ...  IoT applications typically collect and analyse personal data that can be used to derive sensitive information about individuals.  ...  Privacy Patterns and Knowledge Modelling Incorporating privacy-preserving techniques into IoT applications is a complex and time-consuming process [6] .  ... 
arXiv:1908.02724v3 fatcat:nzqmzy6s4favdbfjmd6drpkknm

ICCCN 2020 Subject Index Page

2020 2020 29th International Conference on Computer Communications and Networks (ICCCN)  
Preserving Distributed Collaborative Learning Youssef Khazbak, Tianxiang Tan, and Guohong Cao • Towards Model-Centric Security for IoT Systems Yunqi Guo, Zhaowei Tan, Songwu Lu 10:00-12:00 Session  ...  : • Implementation of Network Source Authentication and Path Validation Using Orthogonal Sequences Hao Cai and Tilman Wolf • Measurement-driven Security Analysis of Imperceptible  ... 
doi:10.1109/icccn49398.2020.9209746 fatcat:nat4yhfx5vdeznfiipphofwgzm

2020 Index IEEE Internet of Things Journal Vol. 7

2020 IEEE Internet of Things Journal  
., Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT; JIoT July 2020 6550-6565 Jamalipour, A., see Murali, S., JIoT Jan. 2020 379-388 James, L.A., see Wanasinghe, T.R.,  ...  ., +, JIoT July 2020 6035-6045 Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing.  ...  ., +, JIoT May 2020 4329-4341 Toward Incentivizing Fog-Based Privacy-Preserving Mobile Crowdsensing in the Internet of Vehicles.  ... 
doi:10.1109/jiot.2020.3046055 fatcat:wpyblbhkrbcyxpnajhiz5pj74a

Knowledge-Driven Analytics and Systems Impacting Human Quality of Life

Arijit Ukil, Leandro Marin, Antonio Jara, John Farserotu
2019 Proceedings of the 28th ACM International Conference on Information and Knowledge Management - CIKM '19  
It is understood that knowledge-driven initiatives in terms of technology, application and practical deployment have strong capability to enable long term human-centric convergence of cyber-physical systems  ...  pave ways for large number of useful and intelligent applications hitherto never commonly envisaged.  ...  AI-based systems with the right conglomeration of knowledge, deep learning algorithms, sensors and IoT have the capability to create an eco-system of positive impacting systems and models that augment  ... 
doi:10.1145/3357384.3358799 dblp:conf/cikm/UkilMJF19 fatcat:5wnoaz6ct5f47mtbshca3dpxee

Model-Driven Engineering for Mission-Critical IoT Systems

Federico Ciccozzi, Ivica Crnkovic, Davide Di Ruscio, Ivano Malavolta, Patrizio Pelliccione, Romina Spalazzese
2017 IEEE Software  
Model-driven engineering (MDE) can help meet the technical challenges of MC-IoT system development and runtime management.  ...  , FIGURE 1 . 1 A conceptual model of mission-critical Internet of Things (MC-IoT) systems. 2,4 Model-driven engineering can help meet the technical challenges of MC-IoT system development and runtime  ... 
doi:10.1109/ms.2017.1 fatcat:eqi23edf6bb4hlpvnv6tsdgqby

Guest Editorial: Introduction to the Special Section on Advanced Networking Technologies in the Battle Against the Outbreak of Epidemic Diseases

Yin Zhang, Ala Al-Fuqaha, Giancarlo Fortino, Limei Peng, Iztok Humar, Hua Wang
2022 IEEE Transactions on Network Science and Engineering  
In "Towards Large-Scale and Privacy-Preserving Contact Tracing in COVID-19 pandemic: A Blockchain Perspective," W.  ...  Tan et al. in "Towards Secure and Privacy-Preserving Data Sharing for COVID-19 Medical Records: A Blockchain-Empowered Approach" proposed a blockchainempowered security and privacy protection scheme with  ...  Giancarlo Fortino (Fellow, IEEE) is currently a Full Professor of computer engineering with the Department of Informatics, Modeling, Electronics, and Systems, UniCal.  ... 
doi:10.1109/tnse.2021.3134379 fatcat:5z2f2favdjdc7lf7rl7evzknke

IEEE Access Special Section Editorial: Toward Service-Centric Internet of Things (IoT): From Modeling to Practice

Yue Cao, Omprakash Kaiwartya, Xiaodong Xu, William Liu, Jaime Lloret, Yuanwei Liu, Yuan Zhuang
2021 IEEE Access  
He is currently a Senior Lecturer with the Department of Information Technology and Software Engineering, School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, New  ...  WILLIAM LIU received the master's and Ph.D. degrees in electrical and computer engineering from the University of Canterbury, New Zealand.  ...  It is followed by privacy-preserving equality tests and location geo-indistinguishability.  ... 
doi:10.1109/access.2021.3090136 fatcat:mjuwrb6bkrbzrpkm434czygrsq

Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things

Othonas Soultatos, George Spanoudakis, Kostantinos Fysarakis, Ioannis Askoxylakis, George Alexandris, Andreas Miaoudakis, E. Nikolaos Petroulakis
2018 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)  
IoT is the main enabler of such environments. However, the interconnection of these cyber-physical systems and the processing of personal data raise serious security and privacy issues.  ...  In this paper we present a framework that can guarantee Security, Privacy, Dependability and Interoperability (SPDI) in IoT.  ...  To address those challenges we propose a pattern-driven framework, built upon existing IoT platforms, Fig. 1 .  ... 
doi:10.1109/camad.2018.8514937 dblp:conf/camad/SoultatosSFAAMP18 fatcat:wkndmxhgkbh5vfxatdssybirom

Blockchain Driven Access Control Mechanisms, Models and Frameworks: A Systematic Literature Review

Aaqib Bashir Dar, Auqib Hamid Lone, Roohie Naaz, Asif Iqbal Baba, Fan Wu
2022 Journal of Information Security and Cybercrimes Research  
In this paper, we present a systematic literature review of blockchain driven access control systems.  ...  In hindsight, we present a taxonomy of blockchain-driven access control systems to better understand the immense implications of this field spanning various application domains  ...  A privacy-preserving blockchain-based access control scheme for big data in Cyber-Physical-Social System (CPSS).  ... 
doi:10.26735/tyif2196 fatcat:bi7yrohbgzewvklx6umkkl73u4

Context-driven Granular Disclosure Control for Internet of Things Applications

Arezou Soltani Panah, Ali Yavari, Ron van Schyndel, Dimitrios Georgakopoulos, Xun Yi
2017 IEEE Transactions on Big Data  
Motivated by these challenges, we propose a framework for privacy preservation in IoT environments that is capable of multi-granular obfuscation by enforcing context-driven disclosure policies.  ...  Then, we customize our framework for a smart vehicle system and make use of data stream watermarking techniques to protect privacy at different stages of the data lifecycle.  ...  Likewise, a context-driven RBAC model was proposed for health-care [14] .  ... 
doi:10.1109/tbdata.2017.2737463 fatcat:jmfrdvwkybf4ndfipc3j7cjoqy

Guest Editorial Special Issue on Smart IoT System: Opportunities by Linking Cloud, Edge, and AI

Wangdong Yang, Laurence T. Yang, A. T. Chronopoulos
2021 IEEE Internet of Things Journal  
In the article "Efficient and privacy-preserving decision tree classification for health monitoring systems," Liang et al. propose an efficient and privacy-preserving decision tree classification scheme  ...  The privacy-preserving decision tree classification is achieved by searching the encrypted indexes with encrypted biomedical data.  ...  We hope that this special issue will serve as a useful reference for researchers, scientists, engineers, and academics in the field of smart IoT system.  ... 
doi:10.1109/jiot.2021.3092440 fatcat:psdtaq4pdnemvd4zofkj5k3djm

Table of contents

2018 IEEE Internet of Things Journal  
Rodrigues 4900 A Model-Driven Workflow for Energy-Aware Scheduling Analysis of IoT-Enabled Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Zhu 5240 Toward a Perpetual IoT System: Wireless Power Management Policy With Threshold Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/jiot.2018.2887290 fatcat:he4ogei7sngn5mp6zy5atezike
« Previous Showing results 1 — 15 out of 3,582 results