[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
opinion
Free access

Personal data and the internet of things

Published: 21 May 2019 Publication History

Abstract

It is time to care about digital provenance.

References

[1]
Acar, U. et al. A graph model of data and workflow provenance. In Proceedings of the TAPP'10 Second Conference on Theory and Practice of Provenance, USENIX, 2010.
[2]
Allen, M.D. et al. Provenance for collaboration: Detecting suspicious behaviors and assessing trust in information. In Proceedings of the 7<sup>th</sup> International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). IEEE, 2011, 342--351.
[3]
Amar, Y. et al. An information theoretic approach to time-series data privacy. In Proceedings of the 1<sup>st</sup> Workshop on Privacy by Design in Distributed Systems. ACM, (2018), 3.
[4]
Balakrishnan, N. et al. Non-repudiable disk I/O in untrusted kernels. In Proceedings of the 8<sup>th</sup> Asia-Pacific Workshop on Systems. ACM, 2017, 24.
[5]
Bates, A. et al. Take only what you need: Leveraging mandatory access control policy to reduce provenance storage costs. In Proceedings of the Conference on Theory and Practice of Provenance (2015), USENIX, 7--7.
[6]
Bates, A.M. et al. Trustworthy whole-system provenance for the Linux kernel. In Proceedings of the USENIX Security Symposium (2015) 319--334.
[7]
Buneman, P. et al. Why and where: A characterization of data provenance. In Proceedings of the International Conference on Database Theory. Springer, 2001, 316--330.
[8]
Carata, L. et al. A primer on provenance. Commun. ACM 57, 5 (May 2014), 52--60.
[9]
Cheney, J. et al. Provenance in databases: Why, how, and where. Foundations and Trends in Databases 1, 4 (2009), 379--474.
[10]
Crabtree, A. et al. Building accountability into the Internet of Things: The IoT databox model. Journal of Reliable Intelligent Environments (2018).
[11]
Davidson, S. et al. Provenance views for module privacy. In Proceedings of the Thirtieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. ACM, 2011, 175--186.
[12]
De Hert, P. et al. The right to data portability in the GDPR: Towards user-centric interoperability of digital services. Computer Law & Security Review. Elsevier, (2017).
[13]
Eldefrawy, K. et al. SMART: Secure and minimal architecture for (establishing dynamic) root of trust. In Network and Distributed System Security Symposium 12 (2012), 1--15.
[14]
Han, X. et al. FRAPpuccino: Fault-detection through Runtime Analysis of Provenance. In Proceedings of the Workshop on Hot Topics in Cloud Computing (HotCLoud'17). USENIX (2017).
[15]
Hasan, R. et al. The case of the fake Picasso: Preventing history forgery with secure provenance. In Proceedings of the Conference on File and Storage Technologies (FAST'09), (2009), 1--14.
[16]
Herschel, M. et al. A survey on provenance: What for? What form? What from? The VLDB Journal---The International Journal on Very Large Data Bases 26, 6 (2017), 881--906.
[17]
Hossain, M.N. et al. Dependence-preserving data compaction for scalable forensic analysis. In Proceedings of the USENIX Security Symposium.
[18]
King, S.T. and Chen, P.M. Backtracking intrusions. ACM SIGOPS Operating Systems Review 37, 5 (May 2003).
[19]
Liang, X. et al. Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In International Symposium on Cluster, Cloud and Grid Computing. IEEE/ACM, (2017), 468--477.
[20]
Missier, P. et al. ProvAbs: Model, policy, and tooling for abstracting PROV graphs. In Proceedings of the International Provenance and Annotation Workshop. Springer, 2017, 3--15.
[21]
Moyer, T. and Gadepally, V. High-throughput ingest of data provenance records into Accumulo. In Proceedings of the High Performance Extreme Computing Conference (HPEC), IEEE, 2016, 1--6.
[22]
Pasquier, T. et al. Runtime analysis of whole system provenance. In Proceedings of the Conference on Computer and Communications Security (CCS'18). ACM, 2018.
[23]
Pasquier, T. et al. If these data could talk. Scientific Data 4 (2017), http://www.nature.com/sdata2017114.
[24]
Pasquier, T. et al. Data provenance to audit compliance with privacy policy in the Internet of Things. Personal and Ubiquitous Computing (2018), 333--344.
[25]
Pohly, D.J. et al. Hi-Fi: Collecting high-fidelity whole-system provenance. In Proceedings of the 28<sup>th</sup> Annual Computer Security Applications Conference. ACM, 2012, 259--268.
[26]
Schreiber, A. and Struminski, R. Tracing personal data using comics. In Proceedings of the International Conference on Universal Access in Human-Computer Interaction. Springer, 2017, 444--455.
[27]
Singh, J. et al. Twenty security considerations for cloud-supported Internet of Things. IEEE Internet of Things Journal 3, 3 (Mar. 2016), 269--284.

Cited By

View all
  • (2023)Personal Data Stores (PDS): A ReviewSensors10.3390/s2303147723:3(1477)Online publication date: 28-Jan-2023
  • (2022)Topical issues of the realization and protection of human rights in the practice of smart contract technology applicationLaw Enforcement Review10.52468/2542-1514.2022.6(1).134-1496:1(134-149)Online publication date: 24-Mar-2022
  • (2022)User Perspectives on the Acceptability of Realtime Data Capture for Design Research by Connected Products[ ] With Design: Reinventing Design Modes10.1007/978-981-19-4472-7_144(2201-2221)Online publication date: 6-Nov-2022
  • Show More Cited By

Index Terms

  1. Personal data and the internet of things

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Communications of the ACM
    Communications of the ACM  Volume 62, Issue 6
    June 2019
    85 pages
    ISSN:0001-0782
    EISSN:1557-7317
    DOI:10.1145/3336127
    Issue’s Table of Contents
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 May 2019
    Published in CACM Volume 62, Issue 6

    Check for updates

    Qualifiers

    • Opinion
    • Popular
    • Un-reviewed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)410
    • Downloads (Last 6 weeks)237
    Reflects downloads up to 30 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Personal Data Stores (PDS): A ReviewSensors10.3390/s2303147723:3(1477)Online publication date: 28-Jan-2023
    • (2022)Topical issues of the realization and protection of human rights in the practice of smart contract technology applicationLaw Enforcement Review10.52468/2542-1514.2022.6(1).134-1496:1(134-149)Online publication date: 24-Mar-2022
    • (2022)User Perspectives on the Acceptability of Realtime Data Capture for Design Research by Connected Products[ ] With Design: Reinventing Design Modes10.1007/978-981-19-4472-7_144(2201-2221)Online publication date: 6-Nov-2022
    • (2021)The Reliability of IoT Networks With Characteristics of Abnormal Induced SignalsIEEE Transactions on Reliability10.1109/TR.2020.302137670:2(808-818)Online publication date: Jun-2021
    • (2021)Multi-level models for data security in networks and in the Internet of thingsJournal of Information Security and Applications10.1016/j.jisa.2021.10277858(102778)Online publication date: May-2021
    • (2020)Towards transparency-encouraging partial software disclosure to enable trust in data usageProceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering10.1145/3324884.3415282(1167-1169)Online publication date: 21-Dec-2020
    • (2019)Modeling and Analysis of First Aid Command and Dispatching System of Cloud Medical SystemIEEE Access10.1109/ACCESS.2019.29544517(168752-168758)Online publication date: 2019
    • (undefined)From Here to ProvtopiaHeterogeneous Data Management, Polystores, and Analytics for Healthcare10.1007/978-3-030-33752-0_4(54-67)

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Digital Edition

    View this article in digital edition.

    Digital Edition

    Magazine Site

    View this article on the magazine site (external)

    Magazine Site

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media