Data provenance to audit compliance with privacy policy in the Internet of Things
![Thumbnail](/bitstream/handle/1/35350573/ubi-2017.pdf.jpg?sequence=6&isAllowed=y)
View/ Open
Published Version
https://doi.org/10.1007/s00779-017-1067-4Metadata
Show full item recordCitation
Pasquier, Thomas, Jatinder Singh, Julia Powles, David Eyers, Margo Seltzer, and Jean Bacon. 2017. “Data Provenance to Audit Compliance with Privacy Policy in the Internet of Things.” Personal and Ubiquitous Computing (August 15). doi:10.1007/s00779-017-1067-4.Abstract
Managing privacy in the IoT presents a significant challenge. We make the case that information obtained by auditing the flows of data can assist in demonstrating that the systems handling personal data satisfy regulatory and user requirements. Thus, components handling personal data should be audited to demonstrate that their actions comply with all such policies and requirements. A valuable side-effect of this approach is that such an auditing process will highlight areas where technical enforcement has been incompletely or incorrectly specified. There is a clear role for technical assistance in aligning privacy policy enforcement mechanisms with data protection regulations. Thefirst step necessary in producing technology to accomplish this alignment is to gather evidence of data flows. We describe our work producing, representing and querying audit data and discuss outstanding challenges.
Terms of Use
This article is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http://nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of-use#OAPCitable link to this page
http://nrs.harvard.edu/urn-3:HUL.InstRepos:35350573
Collections
- FAS Scholarly Articles [18304]
Contact administrator regarding this item (to report mistakes or request changes)