ACKNOWLEDGEMENTS
The research leading to these results has received
funding from the European Commission’s H2020
Programme under the grant agreement numbers
958357 (InterQ), and 958363 (DAT4.Zero).
REFERENCES
Al-Ruithe, M., Benkhelifa, E., and Hameed, K. (2019). A
systematic literature review of data governance and
cloud data governance. Personal and Ubiquitous
Computing.
Atluri, V., Hong, Y., and Chun, S. A. (2020). Security, pri-
vacy and trust for responsible innovations and gov-
ernance. In The 21st Annual International Confer-
ence on Digital Government Research, dg.o ’20, page
365–366, New York, NY, USA. Association for Com-
puting Machinery.
de Matos, E., Tiburski, R. T., Amaral, L. A., and Hessel, F.
(2018). Providing context-aware security for iot en-
vironments through context sharing feature. In 2018
17th IEEE International Conference On Trust, Secu-
rity And Privacy In Computing And Communications/
12th IEEE International Conference On Big Data Sci-
ence And Engineering (TrustCom/BigDataSE), pages
1711–1715.
De Prie
¨
elle, F., De Reuver, M., and Rezaei, J. (2020). The
role of ecosystem data governance in adoption of data
platforms by internet-of-things data providers: Case
of dutch horticulture industry. IEEE Transactions on
Engineering Management, pages 1–11.
Fantana, N. L., Riedel, T., Schlick, J., Ferber, S., Hupp, J.,
Miles, S., Michahelles, F., and Svensson, S. (2013).
Iot applications—value creation for industry. Internet
of Things: Converging technologies for smart envi-
ronments and integrated ecosystems, page 153.
Gartner (Unknown). Scalability.
Gollmann, D. (2010). Computer security. Wiley Interdisci-
plinary Reviews: Computational Statistics, 2(5):544–
554.
Grossetete, P. (2018). IoT and the Network: What is the
future?
IPFS (Unknown). What is IoT?
Jernigan, S., Kiron, D., and Ransbotham, S. (2016). Data
sharing and analytics are driving success with iot. MIT
Sloan Management Review, 58(1).
Kitchenham, B. A. and Charters, S. (2007). Guidelines for
performing systematic literature reviews in software
engineering. Technical Report EBSE 2007-001, Soft-
ware Engineering Group.
Lanotte, R., Merro, M., Munteanu, A., and Vigan
`
o, L.
(2020). A formal approach to physics-based attacks
in cyber-physical systems. ACM Trans. Priv. Secur.,
23(1).
Lazouski, A., Martinelli, F., and Mori, P. (2010). Usage
control in computer security: A survey. Computer Sci-
ence Review, 4(2):81–99.
Lo, S. K., Liu, Y., Chia, S. Y., Xu, X., Lu, Q., Zhu, L.,
and Ning, H. (2019). Analysis of blockchain solutions
for iot: A systematic literature review. IEEE Access,
pages 58822–58835.
Nguyen, H.-H., Phung, P. H., Nguyen, P. H., and Truong,
H.-L. (2022a). Context-driven policies enforcement
for edge-based iot data sharing-as-a-service. In 2022
IEEE International Conference on Services Comput-
ing (SCC), pages 221–230.
Nguyen, P. H., Kramer, M., Klein, J., and Traon, Y. L.
(2015). An extensive systematic review on the model-
driven development of secure systems. Information
and Software Technology, 68:62–81.
Nguyen, P. H., Sen, S., Jourdan, N., Cassoli, B., Myrseth, P.,
Armendia, M., and Myklebust, O. (2022b). Software
engineering and ai for data quality in cyber- physi-
cal systems - sea4dq’21 workshop report. SIGSOFT
Softw. Eng. Notes, 47(1):26–29.
Peerzade, E. (2021). The role of IoT sensors in the COVID-
19 fight.
Rajmohan, T., Nguyen, P. H., and Ferry, N. (2020). Re-
search landscape of patterns and architectures for iot
security: A systematic review. In 2020 46th Eu-
romicro Conference on Software Engineering and Ad-
vanced Applications (SEAA), pages 463–470.
Rajmohan, T., Nguyen, P. H., and Ferry, N. (2022). A
decade of research on patterns and architectures for
iot security. Cybersecurity, 5(1):1–29.
Sen, S., Husom, E. J., Goknil, A., Tverdal, S., Nguyen, P.,
and Mancisidor, I. (2022). Taming data quality in ai-
enabled industrial internet of things. IEEE Software,
39(6):35–42.
Siegel, J. E., Kumar, S., and Sarma, S. E. (2018). The future
internet of things: Secure, efficient, and model-based.
IEEE Internet of Things Journal, 5(4):2386–2398.
Solanas, A., Patsakis, C., Conti, M., Vlachos, I. S., Ramos,
V., Falcone, F., Postolache, O., Perez-martinez, P. A.,
Pietro, R. D., Perrea, D. N., and Martinez-Balleste,
A. (2014). Smart health: A context-aware health
paradigm within smart cities. IEEE Communications
Magazine, 52(8):74–81.
Steichen, M., Fiz, B., Norvill, R., Shbair, W., and State, R.
(2018). Blockchain-based, decentralized access con-
trol for ipfs. In 2018 IEEE International Conference
on Internet of Things (iThings) and IEEE Green Com-
puting and Communications (GreenCom) and IEEE
Cyber, Physical and Social Computing (CPSCom) and
IEEE Smart Data (SmartData), pages 1499–1506.
Ullah, I., De Roode, G., Meratnia, N., and Havinga, P.
(2021). Threat modeling—how to visualize attacks
on iota? Sensors, 21(5):1834.
Wikipedia (Unknown). Internet of things.
Yampolskiy, M., Horvath, P., Koutsoukos, X. D., Xue, Y.,
and Sztipanovits, J. (2012). Systematic analysis of
cyber-attacks on cps-evaluating applicability of dfd-
based approach. In 2012 5th International Symposium
on Resilient Control Systems, pages 55–62.
A Systematic Review of Secure IoT Data Sharing
105