Skip to main content

A Framework for the Secure Storage of Data Generated in the IoT

  • Conference paper
  • First Online:
Ambient Intelligence - Software and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 376))

Abstract

The Internet of Things can be seen has a growing number of things that inter-operate using an Internet-based infrastructure and that has evolved during the last years with little concern for the privacy of its users, especially regarding how the collected data is stored. Technological measures ensuring users privacy must be established. In this paper we will present a technological framework for the secure storage of data. Things can then interact with the framework’s API much in the same way they now interact with its current servers, after which, the framework will perform the required operations in order to secure the data before storing it. The methods adopted for the secure storage will maintain the sharing ability, conveniently allowing authorized access to other users, the initial user’s terms (e.g. data anonymity) and the ability to revoke assigned privileges at all times.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gartner, Gartner’s 2014 hype cycle for emerging technologies maps the journey to digital business (2014)

    Google Scholar 

  2. G. Press, It’s official: the internet of things takes over big data as the most hyped technology (2014)

    Google Scholar 

  3. ABIresearch: the internet of things will drive wireless connected devices to 40.9 billion in 2020 (2014)

    Google Scholar 

  4. G. Press, Internet of things by the numbers: market estimates and forecasts (2014)

    Google Scholar 

  5. R.H. Weber, Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)

    Article  Google Scholar 

  6. R. Roman, P. Najera, J. Lopez, Securing the internet of things. Computer 44(9), 51–58 (2011)

    Article  Google Scholar 

  7. P. Spiess, S. Karnouskos, D. Guinard, D. Savio, O. Baecker, L. Souza, V. Trifa, SOA-based integration of the internet of things in enterprise services, in IEEE International Conference on Web Services ICWS 2009 (IEEE, , 2009), pp. 968–975

    Google Scholar 

  8. M. Blackstock, N. Kaviani, R. Lea, A. Friday, MAGIC Broker 2: an open and extensible platform for the internet of things, in Internet of Things (IOT) (IEEE, 2010), pp. 1–8

    Google Scholar 

  9. M. Collina, G.E. Corazza, A. Vanelli-Coralli, Introducing the QEST broker: scaling the IoT by bridging MQTT and REST, in 2012 IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC) (IEEE, 2012), pp. 36–41

    Google Scholar 

  10. A. Elmangoush, T. Magedanz, A. Blotny, N. Blum, Design of RESTful APIs for M2M services, in 2012 16th International Conference on Intelligence in Next Generation Networks (ICIN) (IEEE, 2012), pp. 50–56

    Google Scholar 

  11. Y.S. Chen, Y.R. Chen, Context-oriented data acquisition and integration platform for internet of things. in 2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI) (IEEE, 2012), pp. 103–108

    Google Scholar 

  12. M. Mun, S. Hao, N. Mishra, K. Shilton, J. Burke, D. Estrin, M. Hansen, R. Govindan, Personal data vaults: a locus of control for personal data streams, in Proceedings of the 6th International COnference (ACM, 2010), p. 17

    Google Scholar 

  13. D. Preuveneers, P. Novais, A survey of software engineering best practices for the development of smart applications in ambient intelligence. J. Ambient Intell. Smart Environ. 4(3), 149–162 (2012)

    Google Scholar 

  14. P. Novais, R. Costa, D. Carneiro, J. Neves, Inter-organization cooperation for ambient assisted living. J. Ambient Intell. Smart Environ. 2(2), 179–195 (2010)

    Google Scholar 

  15. OASIS Standard, MQTT Version 3.1.1. (2014)

    Google Scholar 

  16. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2 edition edn. Wiley (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ricardo Costa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Costa, R., Pinto, A. (2015). A Framework for the Secure Storage of Data Generated in the IoT. In: Mohamed, A., Novais, P., Pereira, A., Villarrubia González, G., Fernández-Caballero, A. (eds) Ambient Intelligence - Software and Applications. Advances in Intelligent Systems and Computing, vol 376. Springer, Cham. https://doi.org/10.1007/978-3-319-19695-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19695-4_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19694-7

  • Online ISBN: 978-3-319-19695-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics