A reference architecture for improving security and privacy in internet of things applications

Ivor D. Addo, Sheikh I. Ahamed, Sik-Sang Yau, Arun Buduru

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Scopus citations

Abstract

As the promise of the Internet of Things (IoT) materializes in our everyday lives, we are often challenged with a number of concerns regarding the efficacy of the current data privacy solutions that support the pervasive components at play in IoT. The privacy and security concerns surrounding IoT often manifests themselves as a treat to end-user adoption and negatively impacts trust among end-users in these solutions. In this paper, we present a reference software architecture for building cloud-enabled IoT applications in support of collaborative pervasive systems aimed at achieving trustworthiness among end-users in IoT scenarios. We present a case study that leverages this reference architecture to protect sensitive user data in an IoT application implementation and evaluate the response of an end-user study accomplished through a survey.

Original languageEnglish (US)
Title of host publicationProceedings - 2014 IEEE 3rd International Conference on Mobile Services, MS 2014
EditorsRong Chang, Nimish Radia, Yan Wang
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages108-115
Number of pages8
ISBN (Electronic)9781479950607
DOIs
StatePublished - Oct 14 2014
Event2014 3rd IEEE International Conference on Mobile Services, MS 2014 - Anchorage, United States
Duration: Jun 27 2014Jul 2 2014

Publication series

NameProceedings - 2014 IEEE 3rd International Conference on Mobile Services, MS 2014

Other

Other2014 3rd IEEE International Conference on Mobile Services, MS 2014
Country/TerritoryUnited States
CityAnchorage
Period6/27/147/2/14

Keywords

  • Cloud-Enabled Service Privacy and Security
  • Collective Intelligence
  • Internet of Things
  • Software Reference Architecture

ASJC Scopus subject areas

  • Communication
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A reference architecture for improving security and privacy in internet of things applications'. Together they form a unique fingerprint.

Cite this