Back to Search Start Over

Authenticated and Privacy-Preserving Consent Management in the Internet of Things

Authors :
Sophie Chabridon
Jean Leneutre
Imane Laaouane
Maryline Laurent
Réseaux, Systèmes, Services, Sécurité (R3S-SAMOVAR)
Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR)
Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)-Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)
Département Réseaux et Services de Télécommunications (RST)
Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)
Centre National de la Recherche Scientifique (CNRS)
Département Informatique et Réseaux (INFRES)
Télécom ParisTech
Autonomic and Critical Embedded Systems (ACES)
Laboratoire Traitement et Communication de l'Information (LTCI)
Institut Mines-Télécom [Paris] (IMT)-Télécom Paris-Institut Mines-Télécom [Paris] (IMT)-Télécom Paris
Institut Polytechnique de Paris (IP Paris)
Département Informatique (INF)
Algorithmes, Composants, Modèles Et Services pour l'informatique répartie (ACMES-SAMOVAR)
Source :
Procedia Computer Science, ANT 2019: 10th International Conference on Ambient Systems, Networks and Technologies (ANT), ANT 2019: 10th International Conference on Ambient Systems, Networks and Technologies (ANT), Apr 2019, Leuven, Belgium. pp.256-263, ⟨10.1016/j.procs.2019.04.037⟩, ANT/EDI40
Publication Year :
2019
Publisher :
HAL CCSD, 2019.

Abstract

International audience; As the Internet of Things (IoT) starts providing meaningful solutions in multiple domains, users expect to take full advantage of the features and benefits of smart devices, but not at the cost of privacy loss. They want to keep control over their own data, e.g. through consent and authorization management. This paper proposes a lightweight privacy-preserving solution for managing user's consent relative to specific purposes (obligations). The originality of our proposal is manyfold. First, the consent is issued cryptographically by the user over some consented specific purposes, thus it protects both the user and the service provider against possible repudiations. Second, the users' privacy is preserved as the protocol supports untraceability over the channel, and pseudonymity with regard to the service provider. Pseudonyms are fully managed by the users themselves through suitable use of Hierarchical Identity-Based Signature (HIBS). Third, the solution is lightweight in terms of communication and computation, thus making it suitable for IoT resource constrained environments. Fourth, an illustrative car-sharing use case is presented where users are able to personalize their driving experience. Fifth, a formal validation of the protocol is provided with the AVISPA tool, along with an informal security and privacy analysis. Sixth, our approach addresses part of the European General Data Protection Regulation (GDPR), as it supports user consent management and helps providers with handling accountability.

Details

Language :
English
Database :
OpenAIRE
Journal :
Procedia Computer Science, ANT 2019: 10th International Conference on Ambient Systems, Networks and Technologies (ANT), ANT 2019: 10th International Conference on Ambient Systems, Networks and Technologies (ANT), Apr 2019, Leuven, Belgium. pp.256-263, ⟨10.1016/j.procs.2019.04.037⟩, ANT/EDI40
Accession number :
edsair.doi.dedup.....5e9ee8d7be61ef2faade1c83a3de2161
Full Text :
https://doi.org/10.1016/j.procs.2019.04.037⟩