Toward a lightweight ontology for privacy protection in IoT

Published on Apr 8, 2019 in SAC (ACM Symposium on Applied Computing)
· DOI :10.1145/3297280.3297367
Mayke Ferreira Arruda2
Estimated H-index: 2
(UFG: Universidade Federal de Goiás),
Renato de Freitas Bulcão-Neto3
Estimated H-index: 3
(UFG: Universidade Federal de Goiás)
Sources
Abstract
The literature asserts that the design of an ontology-based privacy model is an essential starting point to address privacy risks in IoT, where connected devices are increasingly capable of monitoring human activities. Due to the omnipresence of data privacy concerns in IoT, we highlight the need for privacy ontologies that combine an expressive vocabulary with extension points but that do not overload the processing of privacy policies data. This paper presents IoT-Priv as a lightweight privacy layer upon IoT basic concepts such as device, sensor, and service. We introduce privacy requirements guiding the IoT-Priv ontology design, match these requirements to the respective privacy terms modeled, and show how to use IoT-Priv through a usage scenario. Finally, we evaluate static metrics and response times of spatial and temporal query filters over instances of privacy policies. Results open the way for the creation of scalable, privacy-enabled systems.
📖 Papers frequently viewed together
2019
1 Author (Faiza Loukil)
2019
3 Authors (Sana Imtiaz, ..., Vladimir Vlassov)
References15
Newest
#1Faiza LoukilH-Index: 5
Last. Aïcha-Nabila BenharkatH-Index: 8
view all 4 authors...
The Internet of Things (IoT) provides the opportunity to collect, process and analyze data. This opportunity helps to understand preferences and life patterns of individuals in order to offer them customized services. However, privacy has become a significant issue due to the personal nature of the knowledge derived from these data and the involved potential risks. Despite the increasing legislation pressure, few proposed solutions have dealt with the privacy requirements, such as consent and ch...
Source
Jun 1, 2017 in UbiComp (Ubiquitous Computing)
#1Maria Bermudez-Edo (UGR: University of Granada)H-Index: 11
#2Tarek Elsaleh (University of Surrey)H-Index: 12
Last. Kerry Taylor (ANU: Australian National University)H-Index: 44
view all 4 authors...
Over the past few years, the semantics community has developed several ontologies to describe concepts and relationships for internet of things (IoT) applications. A key problem is that most of the IoT-related semantic descriptions are not as widely adopted as expected. One of the main concerns of users and developers is that semantic techniques increase the complexity and processing time, and therefore, they are unsuitable for dynamic and responsive environments such as the IoT. To address this...
Source
#1Hisham Kanaan (UR: University of Rochester)H-Index: 1
#2Khalid Mahmood (UR: University of Rochester)H-Index: 5
Last. Varun Sathyan (UR: University of Rochester)H-Index: 1
view all 3 authors...
Emerging healthcare systems are expected to leverage new Internet of Things (IoT) trends to enable preventive and personalized medicine. However, the success of such systems is entirely dependent on the ability to preserve patient privacy. This paper proposes a decentralized ontology based system architecture that caters to a healthcare organization's privacy needs as well as its enterprise security policy concerns considering futuristic IoT and Electronic Health Records (EHR) trends in healthca...
Source
Dec 1, 2016 in PST (Conference on Privacy, Security and Trust)
#1Noria FoukiaH-Index: 2
#2David BillardH-Index: 2
Last. Eduardo Solana (University of Geneva)H-Index: 4
view all 3 authors...
We present PISCES (Privacy Incorporated and SeCurity Enhanced Systems) framework, which aims at establishing foundations for implementing Privacy and Security by Design (PSD) in the scope of the Internet of Things (IoT). PISCES operates a strict separation between data provider and data controller, where providers are managers of their data privacy, and controllers are accountable for the privacy and protection of the data provided. This role separation is ensured by the Controller Smart Data Sy...
Source
#1Charith Perera (OU: Open University)H-Index: 27
#2Chang Liu (CSIRO: Commonwealth Scientific and Industrial Research Organisation)H-Index: 2
Last. Albert Y. Zomaya (USYD: University of Sydney)H-Index: 82
view all 5 authors...
Together, the Internet of Things (IoT) and cloud computing give us the ability to gather, process, and even trade data to better understand users' behaviors, habits, and preferences. However, future IoT applications must address the significant potential threats to privacy posed by such knowledge-discovery activities.
Source
Nov 8, 2016 in WebMedia (Brazilian Symposium on Multimedia and the Web)
#1Márcio Vinícius Oliveira Sena (UFG: Universidade Federal de Goiás)H-Index: 1
#2Renato de Freitas Bulcão-Neto (UFG: Universidade Federal de Goiás)H-Index: 3
Quality of context (QoC) is any information that describes the quality of the context information itself. The qualification process evaluates if the level of QoC computed meets context consumers' expectations in face of ambiguities, imprecisions or errors in a particular context information. A context management system should deal with those imperfections on a broad sense, including QoC representation, quantification, qualification and dissemination. This paper presents our Hermes Quality (HQ) a...
Source
Nov 7, 2016 in IOT (The Internet of Things)
#1Charith Perera (OU: Open University)H-Index: 27
#2Ciaran McCormick (OU: Open University)H-Index: 9
Last. Bashar Nuseibeh (OU: Open University)H-Index: 59
view all 5 authors...
The Internet of Things (IoT) systems are designed and developed either as standalone applications from the ground-up or with the help of IoT middleware platforms. They are designed to support different kinds of scenarios, such as smart homes and smart cities. Thus far, privacy concerns have not been explicitly considered by IoT applications and middleware platforms. This is partly due to the lack of systematic methods for designing privacy that can guide the software development process in IoT. ...
Source
#1Shulong Wang (Beijing University of Technology)H-Index: 2
#2Yibin Hou (Beijing University of Technology)H-Index: 4
Last. Songsong Ma (Beijing University of Technology)H-Index: 2
view all 4 authors...
Internet of things (IoT) mainly realizes the access of kinds of "things". For the massive heterogeneous devices, how to achieve their unified resource description is an important issue for IoT. Considering the lack of unified description model for devices in IoT, an Ontology-based Resource Description Model (ORDM) is proposed in this paper. The resource in IoT is described from attribute, state, control, historical information and privacy classes. In the application of smart office, the ORDM is ...
Source
#1Alberto Huertas Celdrán (University of Murcia)H-Index: 12
#2Félix J. García Clemente (University of Murcia)H-Index: 13
Last. Gregorio Martínez Pérez (University of Murcia)H-Index: 21
view all 4 authors...
This paper is intended to provide a solution for developing context-aware smart applications preserving the users' privacy in the Internet of Things (IoT). In this sense, we present a framework called Semantic Web-based Context Management (SeCoMan) aimed at offering a set of predefined queries to provide applications with information about indoor location of users and objects, as well as context-aware services. SeCoMan uses a semantic-oriented IoT vision where semantic technologies play a key ro...
Source
#1Bruno Augusti Mozzaquatro (University of Lisbon)H-Index: 5
#2Ricardo Jardim-Goncalves (University of Lisbon)H-Index: 27
Last. Carlos Agostinho (University of Lisbon)H-Index: 15
view all 3 authors...
The diversity of wireless technologies, connected to the Internet and the more powerful and smaller embedded devices, allows to encompass services to improve everyday activities around us through new applications and businesses. This context emerged with the Internet of Things (IoT), where different technologies connected with the Internet provide several applications to change people's lifestyle. However, such integration of heterogeneous devices causes many problems of security and privacy due...
Source
Cited By8
Newest
The increasing interconnections of city services, the explosion of available urban data, and the need for multidisciplinary analysis and decision making for city sustainability require new technological solutions to cope with such complexity. Ontologies have become viable and effective tools to practitioners for developing applications requiring data and process interoperability, big data management, and automated reasoning on knowledge. We investigate how and to what extent ontologies have been...
Source
#1Soulakshmee D. Nagowah (UoM: University of Mauritius)H-Index: 5
#2Hatem Ben Sta (Tunis University)H-Index: 4
Last. Baby Gobin-Rahimbux (UoM: University of Mauritius)H-Index: 3
view all 3 authors...
Source
#1Yaqoob Al-Slais (College of Information Technology)H-Index: 1
Software engineers continue to struggle to create privacy-friendly systems despite having guidelines as Privacy by Design (PbD) and the European Union’s (EU) General Data Protection Regulation (GDPR). These guidelines highlight what is needed to achieve greater privacy, but does not specify how to do so. In this paper, we survey 56 academic publications from 2007 to May 2020 discussing the current privacy engineering methodologies and propose a taxonomy based on the theoretical backgrounds and o...
Source
#1Mohamad Gharib (UniFI: University of Florence)H-Index: 10
#2Paolo Giorgini (University of Trento)H-Index: 56
Last. John Mylopoulos (University of Trento)H-Index: 95
view all 3 authors...
Privacy has emerged as a key concern for business and social computing as security breaches have compromised personal data for millions. Despite this, much of existing work on privacy requirements deal with them as a special case of security requirements, thereby missing essential traits of such requirements. In this context, wrong design decisions may be made due to an insufficient understanding of privacy. The main contribution of this paper is an ontology for privacy requirements that subsume...
Source
#1Mattia GianottiH-Index: 6
#2Fabiano RiccardiH-Index: 5
Last. Maristella MateraH-Index: 27
view all 5 authors...
The Internet of Things (IoT) enables the creation of Interactive Smart Spaces (ISSs) where different types of digital devices are integrated in the ambient or embedded in physical objects, and can sense human actions to control equipment, modify environmental parameters, or create multi-sensory effects. These IoT-enhanced interactive systems can support human activities in different contexts, e.g., education, entertainment, home assistance, rehabilitation, to name a few. This paper explores a hu...
Source
#1P. Sanjeevi (Jiangnan University)H-Index: 1
#2B. Siva KumarH-Index: 1
Last. A. BaseeraH-Index: 1
view all 6 authors...
Constituting the agriculture solid substance manufacture, the post-harvest sector processing schema is direct to preventing reduce the losses in intelligent agriculture. Many processing schemata will be preventing post-harvest losses on the agriculture solid substance manufacture, especially sekai-ichi apple is the regularly used fruit also used to make active in human-related activities of the sensory and control function consisting of an agricultural industry. Sekai-ichi apple is being a defin...
Source
#1Pedro Gonzalez-Gil (University of Murcia)H-Index: 3
#2Juan A. MartinezH-Index: 9
Last. Antonio F. Skarmeta (University of Murcia)H-Index: 39
view all 3 authors...
Although current estimates depict steady growth in Internet of Things (IoT), many works portray an as yet immature technology in terms of security. Attacks using low performance devices, the application of new technologies and data analysis to infer private data, lack of development in some aspects of security offer a wide field for improvement. The advent of Semantic Technologies for IoT offers a new set of possibilities and challenges, like data markets, aggregators, processors and search engi...
Source
#1Mattia GianottiH-Index: 6
#2Fabiano RiccardiH-Index: 5
Last. Maristella MateraH-Index: 27
view all 5 authors...
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.