TY - JOUR
T1 - Enhancing privacy in wearable IoT through a provenance architecture
AU - Lomotey, Richard K.
AU - Sofranko, Kenneth
AU - Orji, Rita
N1 - Funding Information:
Acknowledgments: The authors wish to thank Joseph Pry and Emmanuel Kaku for their contributions towards the initial development of the research. This work was supported in part by a grant from the Pennsylvania State University—Beaver, USA.
Publisher Copyright:
© 2018 by the authors. Licensee MDPI, Basel, Switzerland.
PY - 2018/6
Y1 - 2018/6
N2 - The Internet of Things (IoT) is inspired by network interconnectedness of humans, objects, and cloud services to facilitate new use cases and new business models across multiple enterprise domains including healthcare. This creates the need for continuous data streaming in IoT architectures which are mainly designed following the broadcast model. The model facilitates IoT devices to sense and deliver information to other nodes (e.g., cloud, physical objects, etc.) that are interested in the information. However, this is a recipe for privacy breaches since sensitive data, such as personal vitals from wearables, can be delivered to undesired sniffing nodes. In order to protect users’ privacy and manufacturers’ IP, as well as detecting and blocking malicious activity, this research paper proposes privacy-oriented IoT architecture following the provenance technique. This ensures that the IoT data will only be delivered to the nodes that subscribe to receive the information. Using the provenance technique to ensure high transparency, the work is able to provide trace routes for digital audit trail. Several empirical evaluations are conducted in a real-world wearable IoT ecosystem to prove the superiority of the proposed work.
AB - The Internet of Things (IoT) is inspired by network interconnectedness of humans, objects, and cloud services to facilitate new use cases and new business models across multiple enterprise domains including healthcare. This creates the need for continuous data streaming in IoT architectures which are mainly designed following the broadcast model. The model facilitates IoT devices to sense and deliver information to other nodes (e.g., cloud, physical objects, etc.) that are interested in the information. However, this is a recipe for privacy breaches since sensitive data, such as personal vitals from wearables, can be delivered to undesired sniffing nodes. In order to protect users’ privacy and manufacturers’ IP, as well as detecting and blocking malicious activity, this research paper proposes privacy-oriented IoT architecture following the provenance technique. This ensures that the IoT data will only be delivered to the nodes that subscribe to receive the information. Using the provenance technique to ensure high transparency, the work is able to provide trace routes for digital audit trail. Several empirical evaluations are conducted in a real-world wearable IoT ecosystem to prove the superiority of the proposed work.
UR - http://www.scopus.com/inward/record.url?scp=85055624381&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85055624381&partnerID=8YFLogxK
U2 - 10.3390/mti2020018
DO - 10.3390/mti2020018
M3 - Article
AN - SCOPUS:85055624381
SN - 2414-4088
VL - 2
JO - Multimodal Technologies and Interaction
JF - Multimodal Technologies and Interaction
IS - 2
M1 - 18
ER -