scispace - formally typeset
Open AccessJournal ArticleDOI

IoT Notary: Attestable Sensor Data Capture in IoT Environments

Reads0
Chats0
TLDR
In this article, the authors argue that end-users need to trust data-capturing rules published by the systems, and that such a trust is misplaced in the context of smart buildings.
Abstract
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced—IoT systems...

read more

Citations
More filters
Journal ArticleDOI

Data Station: Delegated, Trustworthy, and Auditable Computation to Enable Data-Sharing Consortia with a Data Escrow

TL;DR: Data Station is introduced, a data escrow designed to enable the formation of data-sharing consortia with a Data Escrow that outperforms federated learning baselines in accuracy and runtime for the machine learning application and is orders of magnitude faster than alternative secure data- sharing frameworks.
Journal ArticleDOI

Data station

TL;DR: Data Station as discussed by the authors is a data escrow designed to enable the formation of data-sharing consortia, where data owners share data with the escrow knowing it will not be released without their consent.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

Internet of Things (IoT): A vision, architectural elements, and future directions

TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Posted Content

Intel SGX Explained.

TL;DR: In this article, the authors present a detailed and structured presentation of the publicly available information on SGX, a series of intelligent guesses about some important but undocumented aspects of SGX.
Journal ArticleDOI

Securing the Internet of Things: A Standardization Perspective

TL;DR: An in-depth review of the communication security solutions for IoT, specifically the standard security protocols to be used in conjunction with the Constrained Application Protocol (CoAP), an application protocol specifically tailored to the needs of adapting to the constraints of IoT devices.
Journal ArticleDOI

Preserving privacy in environments with location-based applications

TL;DR: A mechanism that lets users automate control of their location information, thereby minimizing the extent to which the system intrudes on their lives is proposed.