Data provenance to audit compliance with privacy policy in the Internet of Things

@article{Pasquier2017DataPT,
  title={Data provenance to audit compliance with privacy policy in the Internet of Things},
  author={Thomas Pasquier and J. Singh and Julia E. Powles and D. Eyers and Margo I. Seltzer and J. Bacon},
  journal={Personal and Ubiquitous Computing},
  year={2017},
  volume={22},
  pages={333-344}
}
Managing privacy in the IoT presents a significant challenge. We make the case that information obtained by auditing the flows of data can assist in demonstrating that the systems handling personal data satisfy regulatory and user requirements. Thus, components handling personal data should be audited to demonstrate that their actions comply with all such policies and requirements. A valuable side-effect of this approach is that such an auditing process will highlight areas where technical… Expand
29 Citations
Decision Provenance: Capturing data flow for accountable systems
  • 6
From Here to Provtopia
  • 3
  • PDF
Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges
  • 25
Runtime Analysis of Whole-System Provenance
  • 28
  • PDF
A Security-Enhanced Interoperability Middleware for the Internet of Things
PR EP RI NT Runtime Analysis of Whole-System Provenance
  • PDF
Practical whole-system provenance capture
  • 50
  • PDF
...
1
2
3
...

References

SHOWING 1-10 OF 83 REFERENCES
Information Flow Audit for Transparency and Compliance in the Handling of Personal Data
  • Thomas Pasquier, D. Eyers
  • Computer Science
  • 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW)
  • 2016
  • 10
  • PDF
Information Flow Audit for PaaS Clouds
  • 26
  • PDF
Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things
  • 27
  • PDF
Towards secure provenance-based access control in cloud environments
  • 56
  • PDF
Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs
  • 27
  • PDF
Securing Provenance
  • 150
  • PDF
A provenance-based access control model
  • 84
  • PDF
Internet of Things - New security and privacy challenges
  • R. Weber
  • Computer Science
  • Comput. Law Secur. Rev.
  • 2010
  • 1,065
  • PDF
Obscuring Provenance Confidential Information via Graph Transformation
  • 7
  • PDF
...
1
2
3
4
5
...