Please use this identifier to cite or link to this item:
http://hdl.handle.net/10773/31192
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cunha, Vítor A. | pt_PT |
dc.contributor.author | Silva, Eduardo da | pt_PT |
dc.contributor.author | Carvalho, Marcio B. de | pt_PT |
dc.contributor.author | Corujo, Daniel | pt_PT |
dc.contributor.author | Barraca, João P. | pt_PT |
dc.contributor.author | Gomes, Diogo | pt_PT |
dc.contributor.author | Schaeffer-Filho, Alberto E. | pt_PT |
dc.contributor.author | Santos, Carlos R. P. dos | pt_PT |
dc.contributor.author | Granville, Lisandro Z. | pt_PT |
dc.contributor.author | Aguiar, Rui L. | pt_PT |
dc.date.accessioned | 2021-04-15T16:12:34Z | - |
dc.date.available | 2021-04-15T16:12:34Z | - |
dc.date.issued | 2019-04-08 | - |
dc.identifier.uri | http://hdl.handle.net/10773/31192 | - |
dc.description.abstract | The fact that most IoT solutions are provided by 3rd-parties, along with the pervasiveness of the collected data, raises privacy and security concerns. There is a need to verify which data is being sent to the 3rd-party, as well as preventing those channels from becoming an exploitation avenue. We propose to use existing API definition languages to create contracts which define the data that can be transmitted, in what format, and with which constraints. To verify the compliance with these contracts, we propose a converging "Multi-Access Edge Computing" architecture which validates RESTalike API requests/responses against a Swagger schema. We deal with encrypted traffic using an SFC-enabled Man-in-the-Middle, allowing us to do verifications in "real-time". We devised a Proof of Concept and shown that we were able to detect (and stop) contract violations. | pt_PT |
dc.language.iso | eng | pt_PT |
dc.publisher | IEEE | pt_PT |
dc.relation | Project Smart EnterCom (Nr. 021949) | pt_PT |
dc.relation | “Um Ecossistema para Funções Virtualizadas de Rede” (0409/2016) | pt_PT |
dc.rights | restrictedAccess | pt_PT |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | pt_PT |
dc.title | Safeguarding from abuse by IoT vendors: edge messages verification of cloud-assisted equipment | pt_PT |
dc.type | bookPart | pt_PT |
dc.description.version | published | pt_PT |
dc.peerreviewed | yes | pt_PT |
ua.event.date | 8-12 April, 2019 | pt_PT |
degois.publication.firstPage | 599 | pt_PT |
degois.publication.lastPage | 603 | pt_PT |
degois.publication.title | 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) | pt_PT |
dc.relation.publisherversion | https://ieeexplore.ieee.org/document/8717812 | pt_PT |
dc.identifier.esbn | 978-390317615-7 | - |
Appears in Collections: | DETI - Capítulo de livro IT - Capítulo de livro |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
08717812.pdf | 330.94 kB | Adobe PDF | ![]() |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.