2016 8th International Conference on Communication Systems and Networks (COMSNETS) 2016
DOI: 10.1109/comsnets.2016.7439941
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and privacy-preserving access to sensor data for Internet of Things (IoT) based services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(21 citation statements)
references
References 21 publications
0
20
0
Order By: Relevance
“…In Appavoo, Chan, Bhojan, and Chang (2016),a lightweight functional encryption for privacy-preservation based on trust model was proposed. The proposed approach aims to minimize privacy loss and secondary uses in the presence of untrusted parties.…”
Section: Privacy Issues In Iotmentioning
confidence: 99%
“…In Appavoo, Chan, Bhojan, and Chang (2016),a lightweight functional encryption for privacy-preservation based on trust model was proposed. The proposed approach aims to minimize privacy loss and secondary uses in the presence of untrusted parties.…”
Section: Privacy Issues In Iotmentioning
confidence: 99%
“…In [9] proposed a lightweight privacy-preserving trust model based on the observation that a large class of applications can be provisioned based on simple threshold detection. The main algorithm in this proposed model is an uniformization scheme that uses a combination of sensor aliases to hide the identity of the sensing source and perfunction initialization vector to reveal information only to relevant service providers.…”
Section: Related Workmentioning
confidence: 99%
“…First, processing on sensor is minimum and can Using Smart Contract for Privacy Preserving in Internet of Things (IoT) Environments be easily implemented on resource constrained device [9]. Second, since the data store and service provider are separate entities, service provisioning is now open to external third party providers and a user have the flexibility to dynamically configure the service he/she wants [9]. We use proposed model in [9] and its functions for generating shared keys in our proposed protocol.…”
Section: Related Workmentioning
confidence: 99%
“…Several recent researches have been conducted for the privacy-preserving for the IoT based services [28][29][30][31][32][33][34][35][36]. In order to handle the massive amount of data, the most convincing solution is the federation of the IoT and cloud computing.…”
Section: Privacy-preserving For Iotmentioning
confidence: 99%
“…The authors in [29] proposed PAgIoT, a Privacy preserving Aggregation protocol suitable for IoT settings and enables multi-attribute aggregation for groups of entities while allowing for privacy-preserving value correlation. A lightweight privacy-preserving trust model had been designed for minimizing privacy loss in the presence of untrusted service providers, so that providers can be prevented from disclosing information to third parties for secondary uses [30]. A conditional privacy-preserving authentication with access linkability (CPAL) for roaming service, to provide universal secure roaming service and multilevel privacy preservation [31].…”
Section: Privacy-preserving For Iotmentioning
confidence: 99%