to move the logs sealing inside the devices, thereby
removing the need of a trusted server.
ACKNOWLEDGEMENTS
This material is based upon work supported
by DARPA under grants FA8750-16-20021 and
FA8750-15-2-0277.
REFERENCES
Aikins, S. K. (2016). Connectivity of smart devices:
Addressing the security challenges of the internet
of things. In Connectivity Frameworks for Smart
Devices: The Internet of Things from a Distributed
Computing Perspective.
Balaji, B., Bhattacharya, A., Fierro, G., Gao, J., Gluck,
J., Hong, D., Johansen, A., Koh, J., Ploennigs, J.,
Agarwal, Y., Berges, M., Culler, D., Gupta, R.,
Kjærgaard, M. B., Srivastava, M., and Whitehouse,
K. (2016). Brick: Towards a unified metadata
schema for buildings. In Proceedings of the
3rd ACM International Conference on Systems for
Energy-Efficient Built Environments, BuildSys ’16,
pages 41–50, New York, NY, USA. ACM.
Chadwick, D. W. and Fatema, K. (2012). A privacy
preserving authorisation system for the cloud. Journal
of Computer and System Sciences, 78(5):1359 – 1373.
Choi, H.-M., Jang, C.-B., and Kim, J.-M. (2014).
Efficient security method using mobile virtualization
technology and trustzone of arm. Journal of Digital
Convergence, 12(10):299–308.
ElDefrawy, K., Rattanavipanon, N., and Tsudik, G. (2017).
Hydra: Hybrid design for remote attestation (using
a formally verified microkernel). arXiv preprint
arXiv:1703.02688.
Farooq, M. U., Waseem, M., Khairi, A., and Mazhar, S.
(2015). A critical analysis on the security concerns
of internet of things (iot). International Journal of
Computer Applications, 111(7).
Gubbi, J., Buyya, R., Marusic, S., and Palaniswami, M.
(2013). Internet of things (iot): A vision, architectural
elements, and future directions. Future Generation of
Computer Systems, (7):1645–1660.
Han, S. N., Lee, G. M., and Crespi, N. (2014).
Semantic context-aware service composition for
building automation system. IEEE Transactions on
Industrial Informatics, 10(1):752–761.
Ma, D. and Tsudik, G. (2009). A new approach to secure
logging. ACM Transactions on Storage (TOS), 5(1):2.
Madakam, S. and Date, H. (2016). Security mechanisms for
connectivity of smart devices in the internet of things.
In Connectivity Frameworks for Smart Devices: The
Internet of Things from a Distributed Computing
Perspective.
Mehrotra, S., Kobsa, A., Venkatasubramanian, N., and
Rajagopalan, S. R. (2016). Tippers: A privacy
cognizant iot environment. In IEEE Pervasive
Computing and Communications Workshops.
Mirzamohammadi, S., Chen, J. A., Sani, A. A., Mehrotra,
S., and Tsudik, G. (2017). Ditio: Trustworthy auditing
of sensor activities in mobile & iot devices. In
The 15th ACM Conference on Embedded Networked
Sensor Systems (SenSys 2017).
Nambi, S. N. A. U., Sarkar, C., Prasad, R. V., and Rahim,
A. (2014). A unified semantic knowledge base for
iot. In 2014 IEEE World Forum on Internet of Things
(WF-IoT), pages 575–580.
Pappachan, P., Degeling, M., Yus, R., Das, A.,
Bhagavatula, S., Melicher, W., Naeini, P. E.,
Zhang, S., Bauer, L., Kobsa, A., Mehrotra, S.,
Sadeh, N., and Venkatasubramanian, N. (2017).
Towards privacy-aware smart buildings: Capturing,
communicating, and enforcing privacy policies
and preferences. In 2017 IEEE 37th International
Conference on Distributed Computing Systems
Workshops (ICDCSW), pages 193–198.
Ramakrishna, V. (2008). Policy management and
interoperation through negotiation in ubiquitous
computing. University of California, Los Angeles.
Schneier, B. and Kelsey, J. (1999). Secure audit logs to
support computer forensics. ACM Transactions on
Information System Security, 2:159–176.
Srinivasan, V., Stankovic, J., and Whitehouse, K. (2008).
Protecting your daily in-home activity information
from a wireless snooping attack. In Proceedings
of the 10th International Conference on Ubiquitous
Computing, pages 202–211.
Sun, Y., Wu, T. Y., Li, X., and Guizani, M. (2017). A
rule verification system for smart buildings. IEEE
Transactions on Emerging Topics in Computing,
5(3):367–379.
Swan, M. (2015). Blockchain: Blueprint for a New
Economy. O’Reilly Media, Inc., 1st edition.
Varadharajan, V. and Bansal, S. (2016). Data security and
privacy in the internet of things (iot) environment.
In Connectivity Frameworks for Smart Devices: The
Internet of Things from a Distributed Computing
Perspective.
Wang, W., De, S., Toenjes, R., Reetz, E., and Moessner,
K. (2012). A comprehensive ontology for knowledge
representation in the internet of things. In 2012 IEEE
11th International Conference on Trust, Security and
Privacy in Computing and Communications, pages
1793–1798.
Waters, B. R., Balfanz, D., Durfee, G., and Smetters, D. K.
(2004). Building an encrypted and searchable audit
log. In NDSS, volume 4, pages 5–6.
Winter, J. (2008). Trusted computing building blocks for
embedded linux-based arm trustzone platforms. In
Proceedings of the 3rd ACM workshop on Scalable
trusted computing, pages 21–30. ACM.
Yan, Z., Zhang, P., and Vasilakos, A. V. (2014). A survey
on trust management for internet of things. Journal of
Network and Computer Applications, 42:120 – 134.
Zhao, K. and Ge, L. (2013). A survey on the internet of
things security. In Computational Intelligence and
Security (CIS), 2013 9th International Conference on,
pages 663–667. IEEE.
Trustworthy Privacy Policy Translation in Untrusted IoT Environments
143