Skip to main content
Log in

A security-and quality-aware system architecture for Internet of Things

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) is characterized, at the system level, by high diversity with respect to enabling technologies and supported services. IoT also assumes to deal with a huge amount of heterogeneous data generated by devices, transmitted by the underpinning infrastructure and processed to support value-added services. In order to provide users with valuable output, the IoT architecture should guarantee the suitability and trustworthiness of the processed data. This is a major requirement of such systems in order to guarantee robustness and reliability at the service level. In this paper, we introduce a novel IoT architecture able to support security, privacy and data quality guarantees, thereby effectively boosting the diffusion of IoT services.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. http://cs.adelaide.edu.au/peertrack/

  2. http://www.hcilab.org/projects/perci/index.htm

  3. http://www.compose-project.eu/

  4. http://www.iot-icore.eu/

  5. http://ict-iotest.eu/iotest/

  6. http://www.ebbits-project.eu/

  7. http://www.utrustit.eu

  8. http://www.iot-butler.eu

References

  • Alcaide, A., Palomar, E., Montero-Castillo, J., & Ribagorda, A. (2013). “Anonymous authentication for privacy-preserving IOT target-driven applications.” Computers & Security, 37, 111–123.

  • Ali, M., Eltabakh, M., & Nita-rotaru, C. (2004). “Robust security mechanisms for data streams systems,” Purdue university, csd technical report 04-019.

  • Anton, A. (1996). “Goal-based requirements analysis,” in Proceedings of the Second International Conference on Requirements Engineering, pp. 136–144.

  • Atzori, L., Iera, A., & Morabito, G. (2010). “The internet of things: A survey.” Computer networks, 54(15), 2787–2805.

  • Ballou, D. P., & Pazer, H. L. (1985). Modeling Data and Process Quality in Multi-input, Multi-output Information Systems. Management Science, 31(2), 150–162.

    Article  Google Scholar 

  • Batini, C., Scannapieco, M. “Data quality: concepts, methodologies and techniques.” Data-Centric Systems and Applications, Springer 2006.

  • Bhargav-Spantzel, A., Squicciarini, A., and Bertino, E. “Trust negotiation in identity management,” Security Privacy, IEEE, vol. 5, no. 2, pp. 55 –63, march-April 2007.

  • Bovee, M., Srivastava, R. P., & Mak, B. (2001). “A Conceptual Framework and Belief-Function Approach to Assessing Overall Information Quality.” Proc. 6th Int. Conf. on Information Quality (ICIQ-2001), MA, USA, pp.311–32

  • Cao, J., Carminati, B., Ferrari, E., & Tan, K. (2011). “Castle: Continuously anonymizing data streams.” IEEE Transactions on Dependable and Secure Computing, 8(3), 337–352.

  • Chung, L. (1993). “Dealing with security requirements during the development of information systems,” in Advanced Information Systems Engineering, ser. Lecture Notes in Computer Science, C. Rolland, F. Bodart, and C. Cauvet, Eds. Springer

  • Evans, D., & Eyers, D. (2012). “Efficient data tagging for managing privacy in the internet of things.” In Proceedings - 2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, iThings 2012 and Conf. on Cyber, Physical and Social Computing, CP- SCom 2012, Besancon, pp 244–248.

  • Guo, B., Zhang, D., Wang, Z., Yu, Z., & Zhou X. (2013). “Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things”. Journal of Network and Computer Applications, 36(6), 1531–1539. doi:10.1016/j.jnca.2012.12.028

  • Huang, X., Fu, R., Chen, B., Zhang, T., Roscoe, A. (2012). “User interactive internet of things privacy preserved access control.” In 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, pp. 597–602.

  • Internet of ThingsStrategicResearchRoadmap; available online at: http://ec.europa.eu/information_society/policy/rfid/documents/in_cerp.pdf

  • Kalloniatis, C., Kavakli, E., & Gritzalis, S. (2008). Addressing privacy requirements in system design: the PriS method. Requirements Engineering, 13(3), 241–255.

    Article  Google Scholar 

  • Kourouthanassis, P. E., Giaglis, G. M., & Vrechopoulos, A. P. (2007). Enhancing user experiencethroughpervasive information systems: The case of pervasiveretailing. International Journal of Information Management, 27(5), 319–335.

    Article  Google Scholar 

  • Li, F., Nastic, S., & Dustdar, S. (2012). Data Quality Observation in Pervasive Environments. In Proceedings of the 2012 I.E. 15th International Conference on Computational Science and Engineering (CSE ’12). IEEE Computer Society, Washington, DC, USA, 602–609. doi:10.1109/ICCSE.2012.88

  • Lindner, W., & Meier, J. “Securing the borealis data stream engine,” in Proceedings of the 10th International Database Engineering and Applications Symposium, ser. IDEAS’06. Washington, DC, USA: IEEE Computer Society, 2006, pp. 137–147. [Online]. Available: http://dx.doi.org/10.1109/IDEAS.2006.40

  • Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., & Hung Byers A. “Big data: The next frontier for innovation, competition, and productivity” Report McKinsey Global Institute 2011. [Online] Available: http://www.mckinsey.com/mgi/publications/big_data/

  • Metzger, A.; Chi-Hung Chi; Engel, Y.; Marconi, A., “Research challenges on online service quality prediction for proactive adaptation,” Software Services and Systems Research – Results and Challenges (S-Cube), 2012 Workshop on European, vol., no., pp.51,57, 5–5 June 2012 doi:10.1109/S-Cube.2012.6225512

  • Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Survey internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516.

    Article  Google Scholar 

  • Mylopoulos, J., Chung, L., and Nixon, B. “Representing and using nonfunctional requirements: a process-oriented approach,” Software Engineering, IEEE Transactions on, vol. 18, no. 6, pp. 483 –497, Jun. 1992

  • Nehme, R., Rundensteiner, E., & Bertino, E. “A security punctuation framework for enforcing access control on streaming data,” in Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, April 2008, pp. 406 –415

  • Papadopoulos, S., Yang, Y., & Papadias, D. “Cads: continuous authentication on data streams,” in Proceedings of the 33rd international conference on Very large data bases, ser. VLDB’07. VLDB Endowment, 2007, pp. 135–146. [Online]. Available: http://dl.acm.org/citation.cfm?id=1325851.1325870

  • Papazoglou, M. P., Traverso, P., Dustdar, S., & Leymann, F. (2007). Service-Oriented Computing: State of the Art and Research Challenges. IEEE Computer, 40(11), 38–45.

    Article  Google Scholar 

  • Sandhu, R. S., Coyne, E. J., Feinstein, H. L. and Youman, C. E. “Role-based access control models,” Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996. [Online]. Available: http://dx.doi.org/10.1109/2.485845

  • Sicari, S., Grieco, L. A., Boggia, G., & Coen-Porisini, A. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85(1), 152–166.

    Article  Google Scholar 

  • van Lamsweerde, A., & Letier, E. (2000). Handling obstacles in goal-oriented requirements engineering. IEEE Transactions on Software Engineering, 26(10), 978–1005.

    Article  Google Scholar 

  • Wang, R., & Strong, D. (1996). Beyond accuracy: What data quality means to data consumers. Journal of Management Information Systems; Armonk; Spring, 12(4), 5–33.

    Article  Google Scholar 

  • Wang, Y., & Wen, Q. (2011). “A privacy enhanced dns scheme for the internet of things.” IET International Conference on Communication Technology and Application, ICCTA, Beijing, pp. 699–702.

  • Yu, Q., Bouguettaya, A., & Medjahed, B. (2008). Deploying and Managing Web Services: Issues, Solutions, and Directions. The VLDB Journal, 17(3), 537–572.

    Article  Google Scholar 

Download references

Acknowledgments

The work of D. Miorandi leading to these results has received funding from PAT within the framework of the LOCOS project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cinzia Cappiello.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sicari, S., Cappiello, C., De Pellegrini, F. et al. A security-and quality-aware system architecture for Internet of Things. Inf Syst Front 18, 665–677 (2016). https://doi.org/10.1007/s10796-014-9538-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-014-9538-x

Keywords

Navigation