Data Provenance to Audit Compliance with Privacy Policy in the Internet of Things

Thomas Pasquier, Jatinder Singh, Julia Powles, David Eyers, Margo Seltzer, Jean Bacon

Research output: Contribution to journalArticlepeer-review

52 Citations (Scopus)

Abstract

Managing privacy in the IoT presents a significant challenge. We make the case that information obtained by auditing the flows of data can assist in demonstrating that the systems handling personal data satisfy regulatory and user requirements. Thus, components handling personal data should be audited to demonstrate that their actions comply with all such policies and requirements. A valuable side-effect of this approach is that such an auditing process will highlight areas where technical enforcement has been incompletely or incorrectly specified. There is a clear role for technical assistance in aligning privacy policy enforcement mechanisms with data protection regulations. The first step necessary in producing technology to accomplish this alignment is to gather evidence of data flows. We describe our work producing, representing and querying audit data and discuss outstanding challenges.
Original languageEnglish
Pages (from-to)333-344
Number of pages12
JournalPersonal and Ubiquitous Computing
Volume22
Issue number2
Early online date12 Jun 2017
DOIs
Publication statusPublished - 1 Apr 2018
Externally publishedYes

Fingerprint

Dive into the research topics of 'Data Provenance to Audit Compliance with Privacy Policy in the Internet of Things'. Together they form a unique fingerprint.

Cite this