Governing Internet of Things: Issues, approaches, and new paradigms

To read the full-text of this research, you can request a copy directly from the authors.


Internet of Things (IoT), which infuses computing into the physical world introduces new problems in areas such as safety and security of physical properties and privacy of the people inhabiting the spaces surrounded by the things. Because IoT can be deployed in public, private, and corporate spaces, formulating and enforcing the policies to manage the actions of the things such that the user data and physical properties are safeguarded are major challenges. This chapter comprehensively examines this problem and highlights the requirements of an IoT governance framework and highlights relevant research challenges. We begin the chapter with a comprehensive analysis of the background work. Then we describe the IoT governance problem and highlight some of the core research issues that should be addressed for realizing a governance framework.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

ResearchGate has not been able to resolve any citations for this publication.
Conference Paper
Full-text available
The ongoing convergence of cloud computing and the IoT gives rise to the proliferation of diverse, large-scale IoT and mobile cloud systems. Such novel IoT cloud systems offer numerous potential advantages for all involved stakeholders. However, due to scale, complexity, and inherent geographical distribution of such systems, governing new IoT cloud resources and capabilities poses numerous challenges. In this paper we introduce rtGovOps, a novel framework for dynamic, on-demand operational governance of software-defined IoT cloud systems at runtime. To illustrate the feasibility of our framework and its practical applicability to implement and enforce operational governance processes in large-scale software-defined IoT cloud system, we evaluate our approach using a real-world case study for managing electric vehicle fleets.
Full-text available
In this short text the authors claim that the challenges posed by Internet of Things cannot be managed with the current policy tools and research programs, as these are too slow and too instrumental. These challenges are: a) global cooperation and standards, b) new business models and new currencies, c) ethics, control society, surveillance, consent and data driven life, and d) technological challenges driven by the need to save energy. These lead up to the urgency to co-design decision making formats that aim at finding the perfect balance between top down planning and bottom up innovation.
Conference Paper
Protecting personal privacy is going to be a prime concern for the deployment of ubiquitous computing systems in the real world. With daunting Orwellian visions looming, it is easy to conclude that tamper-proof technical protection mechanisms such as strong anonymization and encryption are the only solutions to such privacy threats. However, we argue that such perfect protection for personal information will hardly be achievable, and propose instead to build systems that help others respect our personal privacy, enable us to be aware of our own privacy, and to rely on social and legal norms to protect us from the few wrongdoers. We introduce a privacy awareness system targeted at ubiquitous computing environments that allows data collectors to both announce and implement data usage policies, as well as providing data subjects with technical means to keep track of their personal information as it is stored, used, and possibly removed from the system. Even though such a system cannot guarantee our privacy, we believe that it can create a sense of accountability in a world of invisible services that we will be comfortable living in and interacting with.
Conference Paper
This paper tries to serve as an introductory reading to privacy issues in the field of ubiquitous computing. It develops six principles for guiding system design, based on a set of fair information practices common in most privacy legislation in use today: notice, choice and consent, proximity and locality, anonymity and pseudonymity, security, and access and recourse. A brief look at the history of privacy protection, its legal status, and its expected utility is provided as a background.