2018 IEEE International Conference on Electro/Information Technology (EIT) 2018
DOI: 10.1109/eit.2018.8500157
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of the Policy Enforcement Fog Module for Protecting Privacy of IoT Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…However, this kind of approach fails to identify specific requirements of the devices (i.e., they do not envision anything like a contract), offloading to the end-user the cumbersome task of defining fine-grained policies. Other researchers proposed Fog-based policy enforcement approaches to solve different problems in the IoT world, for example, ensuring data privacy [3] and providing secure resource orchestration in Fog computing [16]. Similar to our work, they share the necessity of enforcing policies at the Fog layer over devices that might not be compliant by design.…”
Section: Related Workmentioning
confidence: 65%
“…However, this kind of approach fails to identify specific requirements of the devices (i.e., they do not envision anything like a contract), offloading to the end-user the cumbersome task of defining fine-grained policies. Other researchers proposed Fog-based policy enforcement approaches to solve different problems in the IoT world, for example, ensuring data privacy [3] and providing secure resource orchestration in Fog computing [16]. Similar to our work, they share the necessity of enforcing policies at the Fog layer over devices that might not be compliant by design.…”
Section: Related Workmentioning
confidence: 65%
“…Other researchers proposed Fog-based policy enforcement approaches to solve different problems in the IoT world, for example, ensuring data privacy [16] and providing secure resource orchestration in Fog computing [17]. Similar to our work, they share the necessity of enforcing policies at the Fog layer over devices that might not be compliant by design.…”
Section: Related Workmentioning
confidence: 69%
“…While the value of the IoT lies in the data it generates [33], most of the IoT end nodes responsible for generating the data (which often have access to limited resources) are typically deployed in an unattended manner where attackers may have direct physical access to them. As a result, these devices are exposed to different types of attacks, including tampering, eavesdropping and Denial-of-Service (DoS) attacks, and hence the need for appropriate security measures to protect them.…”
Section: A a Brief Overview Of Security Challenges In The Iotmentioning
confidence: 99%