TY - JOUR
T1 - Self attestation of things
AU - Das Chowdhury, Partha
AU - Christianson, Bruce
PY - 2017/1/1
Y1 - 2017/1/1
N2 - Various devices including our mobile phones are increasingly used as the intermediary (gateway) between IoT peripherals (like the smart lock at our homes) and the larger cloud infrastructure. In this paper we introduce the novel notion of Caveat instances on the cloud together with a novel application of MQTT (the communication protocol designed for peripherals) to stamp our will on how data about us can be used when it travels and resides outside our immediate boundary. Even when we cannot keep our personal data private, we can still prevent it from being misused, for example to commit identity theft, by ensuring that the attacker cannot produce an appropriate attestation for the data.
AB - Various devices including our mobile phones are increasingly used as the intermediary (gateway) between IoT peripherals (like the smart lock at our homes) and the larger cloud infrastructure. In this paper we introduce the novel notion of Caveat instances on the cloud together with a novel application of MQTT (the communication protocol designed for peripherals) to stamp our will on how data about us can be used when it travels and resides outside our immediate boundary. Even when we cannot keep our personal data private, we can still prevent it from being misused, for example to commit identity theft, by ensuring that the attacker cannot produce an appropriate attestation for the data.
UR - http://www.scopus.com/inward/record.url?scp=85037840969&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-71075-4_9
DO - 10.1007/978-3-319-71075-4_9
M3 - Article
AN - SCOPUS:85037840969
SN - 0302-9743
VL - 10476 LNCS
SP - 76
EP - 84
JO - Lecture Notes in Computer Science (LNCS)
JF - Lecture Notes in Computer Science (LNCS)
ER -