Proceedings of the 19th International Conference on Enterprise Information Systems 2017
DOI: 10.5220/0006357504870494
|View full text |Cite
|
Sign up to set email alerts
|

Architecture for Privacy in Cloud of Things

Abstract: A large number of devices are connected to the internet through the Internet of Things (IoT) paradigm, resulting in a huge amount of produced data. Cloud computing is a computing paradigm currently adopted to process, store and provide access control to these data. This integration is called Cloud of Things-CoT and is useful in personal networks, like residential automation and health care, since it facilitates the access to the information. Although this integration brings benefits to the users, it introduces… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…In [90], Pacheco et al propose an architecture that helps to preserve privacy in CoT. With this architecture, users can fully control the access to the data stored in the cloud and generated by their devices, part of the IoT networks.…”
Section: Security and Privacy Solutions For Cot: A Brief Revue And Op...mentioning
confidence: 99%
“…In [90], Pacheco et al propose an architecture that helps to preserve privacy in CoT. With this architecture, users can fully control the access to the data stored in the cloud and generated by their devices, part of the IoT networks.…”
Section: Security and Privacy Solutions For Cot: A Brief Revue And Op...mentioning
confidence: 99%
“…As the IoT adoption increases, the number of WSNs also grows as does the number of devices connected to the Internet and the amount of data generated by those devices. In order to store, process and deliver this amount of data in a suitable way, cloud computing has been successfully used [ 4 , 5 , 6 , 7 , 8 , 9 ]. The integration of IoT and the cloud provides the necessary scalability, since devices are only responsible for generating and sending data to the cloud.…”
Section: Introductionmentioning
confidence: 99%
“…In an earlier version of this work [ 9 ], we briefly presented an architecture that extends UPECSI by transferring the privacy enforcement tasks from the gateway to the IoT devices. The resulting architecture is called PROTeCt ( P rivacy a R quitecture for integrati O n of internet of T hings and C loud computing), and a preliminary evaluation showed its practical behavior [ 10 ].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations