ABSTRACT
Many IoT and cyber-physical systems follow the MGC (eMbedded-Gateway-Cloud) architecture. In this architecture, embedded devices equipped with sensors send measurement data to a gateway which aggregates the data into appropriate records and upload them to the cloud for data access and analytics. An example application of the MGC architecture is infrastructure video monitoring, in which drones and robots with mounted cameras patrol physical operational environments for on-site monitoring, defeats inspection, etc, and videos are encrypted at a gateway and then uploaded to cloud for authorized access by various stake holders. In this talk, we will discuss the various data security and privacy issues in the infrastructure video monitoring system (and MGC architecture in general) and present a data security and privacy platform which supports flexible access control of encrypted data based on users’ attributes and time of access and supports multiuser-to-multiuser encrypted keyword search over encrypted data.
Index Terms
- Data Security & Privacy Protection in IoT MGC Systems
Recommendations
IoT Security & Privacy: Threats and Challenges
IoTPTS '15: Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and SecurityThe era of the Internet of Things (IoT) has already started and it will profoundly change our way of life. While IoT provides us many valuable benefits, IoT also exposes us to many different types of security threats in our daily life. Before the advent ...
Privacy protection for low-cost RFID tags in IoT systems
CFI '12: Proceedings of the 7th International Conference on Future Internet TechnologiesRFID technologies in IoT systems enable to recognize animate or inanimate objects via radio frequency signals. However, RFID has several privacy problems such as object tracking by reading and tracking the ID transmitted from the RFID-tag. To solve such ...
Distributed Data Privacy Preservation in IoT Applications
Recently, the Internet of Things (IoT) has penetrated many aspects of the physical world to realize different applications. Through IoT, these applications generate, exchange, aggregate, and analyze a vast amount of security-critical and privacy- ...
Comments