Skip to main content

Access Control for Cross-Border Transfer of Sensor Data

  • Conference paper
  • First Online:
Mobile Internet Security (MobiSec 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 797))

Included in the following conference series:

Abstract

The iKaaS (intelligent Knowledge-as-a-Service) platform unitarily manages the data on existing cloud systems, which allows applications to access their desired data scattered all over the world transparently. Hidano et al. have proposed an access control mechanism suitable for the iKaaS platform to resolve privacy issues on the transfer of personal data to the applications in different countries. They introduced the concept of a privacy certificate authority (CA) to provide support for confirming the validity of the application. The privacy CA is established for each country as the executive agency responsible for the national regulations governing the handling of personal data. In this paper, we design a hierarchical model of multiple privacy CAs responsible for regulations where the areas governed by these regulations are different. The data transfer can be thereby controlled not only for different countries, but also for different economic or political blocs (e.g., European Union) or cities. In addition, focusing on a town management application as a use case of the iKaaS platform, we present how our access control mechanism works.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Article 29 Data Protection Working Party: Opinion 8/2014 on the on Recent Developments on the Internet of Things (2014)

    Google Scholar 

  2. Bantouna, A., Poulios, G., Tsagkaris, K., Demestichas, P.: Network load predictions based on big data and the utilization of self-organizing maps. Springer J. Netw. Syst. Manage. 22(2), 150–173 (2014)

    Article  Google Scholar 

  3. EU: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995)

    Google Scholar 

  4. EU FP7/ICT project 287708: iCore: Internet Connected Objects for Reconfigurable Eco-systems, October 2011–September 2014

    Google Scholar 

  5. EU FP7/ICT project 609094: RERUM: REliable, Resilient and secUre IoT for sMart city applications, September 2013–August 2016

    Google Scholar 

  6. EU HORIZON 2020 project 643262: iKaaS: intelligent Knowledge-as-a-Service, October 2014–September 2017

    Google Scholar 

  7. Faye, S., Louveton, N., Gheorghe, G., Engel, T.: A two-level approach to characterizing human activities from wearable sensor data. J. Wirel. Mobile Netw. 7(3), 102–110 (2016)

    Google Scholar 

  8. Hernandez-Ramos, J.L., Jara, A.J., Marin, L., Skarmeta, A.F.: Distributed capability-based access control for the internet of things. J. Internet Serv. Inf. Secur. (JISIS) 3(34), 1–16 (2013)

    Google Scholar 

  9. Hidano, S., Biswas, A.R., Kiyomoto, S.: Hierarchical privacy CAs for cross-border transfer of personal data. Res. Briefs Inf. Commun. Technol. Evol. (ReBICTE) 2(2), 1–12 (2016)

    Google Scholar 

  10. Hidano, S., Kiyomoto, S., Murakami, Y., Vlacheas, P., Moessner, K.: Design of a security gateway for iKaaS platform. In: Zhang, Y., Peng, L., Youn, C.-H. (eds.) CloudComp 2015. LNICST, vol. 167, pp. 323–333. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-38904-2_34

    Chapter  Google Scholar 

  11. Japan: Act on the Protection of Personal Information, Act No. 57, 30 May 2003

    Google Scholar 

  12. de Meer, H., Pöhls, H.C., Posegga, J., Samelin, K.: On the relation between redactable and sanitizable signature schemes. In: Jürjens, J., Piessens, F., Bielova, N. (eds.) ESSoS 2014. LNCS, vol. 8364, pp. 113–130. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-04897-0_8

    Chapter  Google Scholar 

  13. Pokric, B., Krco, S., Drajic, D., Pokric, M., Rajs, V., Mihajlovic, Z., Knezevic, P., Jovanovic, D.: Augmented reality enabled IoT services for environmental monitoring utilising serious gaming concept. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 6(1), 37–55 (2015)

    Google Scholar 

  14. Poncela, J., Vlacheas, P., Giaffreda, R., De, S., Vecchio, M., Nechifor, S., Barco, R., Aguayo-Torres, M.C., Stavroulaki, V., Moessner, K., Demestichas, P.: Smart cities via data aggregation. Springer J. Wirel. Personal Commun. 76(2), 149–168 (2014)

    Article  Google Scholar 

  15. Robles, T., Alcarria, R., Martin, D., Navarro, M., Calero, R., Iglesias, S., Lopez, M.: An IoT based reference architecture for smart water management processes. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 6(1), 4–23 (2015)

    Google Scholar 

  16. Vlacheas, P., Giaffreda, R., Stavroulaki, V., Kelaidonis, D., Somov, A., Foteinos, V., Poulios, G., Biswas, A.R., Moessner, K., Demestichas, P.: Enabling smart cities through a cognitive management framework for the internet of things. IEEE Commun. Mag. 51(6), 102–110 (2013)

    Article  Google Scholar 

Download references

Acknowledgments

The work is supported by the EUJ-1-2014 Research and Innovation action: iKaaS; EU Grant number 643262, Strategic Information and Communications R&D Promotion Programme (SCOPE), Ministry of Internal Affairs and Communications, Japan.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seira Hidano .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hidano, S., Kiyomoto, S., Biswas, A.R., Uchibayashi, T., Suganuma, T. (2018). Access Control for Cross-Border Transfer of Sensor Data. In: You, I., Leu, FY., Chen, HC., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2016. Communications in Computer and Information Science, vol 797. Springer, Singapore. https://doi.org/10.1007/978-981-10-7850-7_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7850-7_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7849-1

  • Online ISBN: 978-981-10-7850-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics