A survey on data provenance in IoT

Rui Hu, Zheng Yan*, Wenxiu Ding, Laurence T. Yang

*Corresponding author for this work

Research output: Contribution to journalReview Articlepeer-review

31 Citations (Scopus)
132 Downloads (Pure)

Abstract

Internet of Things (IoT), as a typical representation of cyberization, enables the interconnection of physical things and the Internet, which provides intelligent and advanced services for industrial production and human lives. However, it also brings new challenges to IoT applications due to heterogeneity, complexity and dynamic nature of IoT. Especially, it is difficult to determine the sources of specified data, which is vulnerable to inserted attacks raised by different parties during data transmission and processing. In order to solve these issues, data provenance is introduced, which records data origins and the history of data generation and processing, thus possible to track the sources and reasons of any problems. Though some related researches have been proposed, the literature still lacks a comprehensive survey on data provenance in IoT. In this paper, we first propose a number of design requirements of data provenance in IoT by analyzing the features of IoT data and applications. Then, we provide a deep-insight review on existing schemes of IoT data provenance and employ the requirements to discuss their pros and cons. Finally, we summarize a number of open issues to direct future research.

Original languageEnglish
Pages (from-to)1441-1463
Number of pages23
JournalWorld Wide Web
Volume23
Issue number2
DOIs
Publication statusPublished - 1 Mar 2020
MoE publication typeA2 Review article in a scientific journal

Keywords

  • cyberization
  • data provenance
  • distributed architecture
  • intelligent service
  • internet of things

Fingerprint

Dive into the research topics of 'A survey on data provenance in IoT'. Together they form a unique fingerprint.

Cite this