Privacy enhancing technologies in the Internet of Things: Perspectives and challenges

SC Cha, TY Hsu, Y Xiang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) devices have brought much efficiency and convenience to our daily
life. However, the devices may collect a myriad of data from people without their consent …

A room with an overview: Towards meaningful transparency for the consumer Internet of Things

C Norval, J Singh - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
As our physical environments become ever-more connected, instrumented, and automated,
it can be increasingly difficult for users to understand what is happening within them and …

Practical whole-system provenance capture

T Pasquier, X Han, M Goldstein, T Moyer… - Proceedings of the …, 2017 - dl.acm.org
Data provenance describes how data came to be in its present form. It includes data sources
and the transformations that have been applied to them. Data provenance has many uses …

SHARE: Shaping data distribution at edge for communication-efficient hierarchical federated learning

Y Deng, F Lyu, J Ren, Y Zhang, Y Zhou… - 2021 IEEE 41st …, 2021 - ieeexplore.ieee.org
Federated learning (FL) can enable distributed model training over mobile nodes without
sharing privacy-sensitive raw data. However, to achieve efficient FL, one significant …

Trustworthy AI in the age of pervasive computing and big data

A Kumar, T Braud, S Tarkoma… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The era of pervasive computing has resulted in countless devices that continuously monitor
users and their environment, generating an abundance of user behavioural data. Such data …

Runtime analysis of whole-system provenance

T Pasquier, X Han, T Moyer, A Bates… - Proceedings of the …, 2018 - dl.acm.org
Identifying the root cause and impact of a system intrusion remains a foundational challenge
in computer security. Digital provenance provides a detailed history of the flow of information …

Decision provenance: Harnessing data flow for accountable systems

J Singh, J Cobbe, C Norval - IEEE Access, 2018 - ieeexplore.ieee.org
Demand is growing for more accountability regarding the technological systems that
increasingly occupy our world. However, the complexity of many of these systems—often …

Holitrust-a holistic cross-domain trust management mechanism for service-centric Internet of Things

KA Awan, IU Din, M Zareei, M Talha, M Guizani… - Ieee …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is proposed and used in diverse application domains. In IoT, nodes
commonly have a low capacity to maintain security on their own expenses, which increases …

The security of medical data on internet based on differential privacy technology

Z Lv, F Piccialli - ACM Transactions on Internet Technology, 2021 - dl.acm.org
The study aims at discussing the security of medical data in the Internet era. By using k-
anonymity (KA) and differential privacy (DP), an algorithm model combining KA and DP was …

Accountability in the IoT: Systems, law, and ways forward

J Singh, C Millard, C Reed, J Cobbe, J Crowcroft - Computer, 2018 - ieeexplore.ieee.org
The physical, ubiquitous, and autonomous nature of the emerging Internet of Things (IoT)
raises various accountability challenges relating to safety and security, privacy and …