Abstract
This work presents a paradigm shift and introduces a data-centric security architecture for the COMPOSE framework; a platform as a service and marketplace for the IoT. We distinguish our approach from classical device-centric approaches and outline architectural as well as infrastructural specifics of our platform. In particular, we describe how fine-granular and data-centric security requirements can be combined with static and dynamic enforcement to regain governance on devices and data without sacrificing the intrinsic openness of IoT platforms. We also highlight the power of our architecture, converting concepts such as data provenance and reputation into efficient, highly useful, and practically applicable complements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bai, J.: Feasibility analysis of big log data real time search based on Hbase and elasticsearch. In: 9th International Conference on Natural Computation, ICNC 2013, Shenyang, China, pp. 1166–1170, 23–25 July 2013
Broberg, N., Sands, D.: Paralocks: role-based information flow control and beyond. In: Proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 431–444. ACM, New York (2010)
Cloud Foundry (2015). https://storm.incubator.apache.org
Couchbase (2015). http://www.couchbase.com/
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504–513 (1977)
Doukas, C., Pérez, J.L., Villalba, A., Carrera, D.: Bridging web technologies with M2M platforms. In: W3C Workshop on the Web of Things, Enablers and Services for an Open Web of Devices, Germany, Berlin, pp. 25–26, June 2014
Hedin, D., Birgisson, A., Bello, L., Sabelfeld, A.: JSFlow: tracking information flow in JavaScript and its apis. In: Symposium on Applied Computing, SAC 2014, Gyeongju, Republic of Korea, pp. 1663–1671, 24–28 March 2014
Jensen, S.H., Møller, A., Thiemann, P.: Type analysis for JavaScript. In: Palsberg, J., Su, Z. (eds.) SAS 2009. LNCS, vol. 5673, pp. 238–255. Springer, Heidelberg (2009)
Kortuem, G., Kawsar, F., Sundramoorthy, V., Fitton, D.: Smart objects as building blocks for the internet of things. IEEE Internet Comput. 14(1), 44–51 (2010)
Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol. 9(4), 410–442 (2000)
Park, J., Sandhu, R.: The UCON\(_{ABC}\) usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128–174 (2004)
Parra Rodriguez, J.D., Schreckling, D., Posegga, J.: Identity management in platforms offering IoT as a service. In: Jara, A.J., et al. (eds.) IoT 2014. LNICST, vol. 150, pp. 281–288. Springer, Heidelberg (2015). doi:10.1007/978-3-319-19656-5_40
Parra, J.D.: Popularioty (2014). http://github.com/nopbyte/popularioty-api/
Parra, J.D.: Popularioty Analytics (2014). http://github.com/nopbyte/popularioty-analytics/
servIoTicy: IoT streaming made easy (2015). http://www.servioticy.com/
The Apache Storm distributed real-time communication system (2015). https://storm.incubator.apache.org/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Schreckling, D., Parra, J.D., Doukas, C., Posegga, J. (2016). Data-Centric Security for the IoT. In: Mandler, B., et al. Internet of Things. IoT Infrastructures. IoT360 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 170. Springer, Cham. https://doi.org/10.1007/978-3-319-47075-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-47075-7_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47074-0
Online ISBN: 978-3-319-47075-7
eBook Packages: Computer ScienceComputer Science (R0)