Privacy-Preserving Security Framework for a Social-Aware Internet of Things

  • Jorge Bernal Bernabe
  • Jose Luis Hernández
  • M. Victoria Moreno
  • Antonio F. Skarmeta Gomez
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8867)

Abstract

As smart objects are getting part of our personal space, the new associated services must tackle both, the inherent requirements of IoT and the needs of citizens using such services. Security, trust and privacy concerns are the cornerstone requirements of a social Internet of Things, where users want to share and obtain information in a huge opportunistic environment of connected devices and services. The paper presents an IoT security framework, being devised in the scope of SOCIOTAL EU project, which is based on the Architecture Reference Model (ARM) of IoT-A EU project. The framework extends the traditional ARM putting strong emphasis on security, trust and privacy concerns in order to cope with more opportunistic and secure sharing models required in a social-aware IoT scenarios, where users can set up dynamically communities and bubbles of devices and users.

Keywords

Internet of Things Security privacy Identity Management 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Butler fp7 eu project. deliverable 3.2: Integrated system architecture and initial pervasive butler proof of concept (2013)Google Scholar
  2. 2.
    Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Elsevier Computer Networks 54(15), 2787–2805 (2010)CrossRefMATHGoogle Scholar
  3. 3.
    Atzori, L., Iera, A., Morabito, G., Nitti, M.: The social internet of things (siot)–when social networks meet the internet of things: Concept, architecture and network characterization. Computer Networks (2012)Google Scholar
  4. 4.
    Bassi, A., Bauer, M., Fiedler, M., Kramp, T., van Kranenburg, R., Lange, S., Meissner, S.: Enabling things to talk (2013)Google Scholar
  5. 5.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 321–334. IEEE (2007)Google Scholar
  6. 6.
    Hernández-Ramos, J.L., Jara, A.J., Marín, L., Skarmeta, A.F.: Dcapbac: Embedding authorization logic into smart things through ecc optimizations. International Journal of Computer Mathematics, 1–22 (2014)Google Scholar
  7. 7.
    Sotiriadis, S., Petrakis, E.G., Covaci, S., Zampognaro, P., Georga, E., Thuemmler, C.: An architecture for designing future internet (fi) applications in sensitive domains. In: 2013 IEEE 13th International Conference on Bioinformatics and Bioengineering (BIBE), pp. 1–6. IEEE (2013)Google Scholar
  8. 8.
    Weiser, M.: The computer for the 21st century. Scientific American 265(3), 94–104 (1991)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Jorge Bernal Bernabe
    • 1
  • Jose Luis Hernández
    • 1
  • M. Victoria Moreno
    • 1
  • Antonio F. Skarmeta Gomez
    • 1
  1. 1.Department of Information and Communications EngineeringUniversity of MurciaMurciaSpain

Personalised recommendations