{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:57:00Z","timestamp":1770753420682,"version":"3.50.0"},"reference-count":24,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T00:00:00Z","timestamp":1524441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["MTI"],"abstract":"<jats:p>The Internet of Things (IoT) is inspired by network interconnectedness of humans, objects, and cloud services to facilitate new use cases and new business models across multiple enterprise domains including healthcare. This creates the need for continuous data streaming in IoT architectures which are mainly designed following the broadcast model. The model facilitates IoT devices to sense and deliver information to other nodes (e.g., cloud, physical objects, etc.) that are interested in the information. However, this is a recipe for privacy breaches since sensitive data, such as personal vitals from wearables, can be delivered to undesired sniffing nodes. In order to protect users\u2019 privacy and manufacturers\u2019 IP, as well as detecting and blocking malicious activity, this research paper proposes privacy-oriented IoT architecture following the provenance technique. This ensures that the IoT data will only be delivered to the nodes that subscribe to receive the information. Using the provenance technique to ensure high transparency, the work is able to provide trace routes for digital audit trail. Several empirical evaluations are conducted in a real-world wearable IoT ecosystem to prove the superiority of the proposed work.<\/jats:p>","DOI":"10.3390\/mti2020018","type":"journal-article","created":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T04:44:48Z","timestamp":1524545088000},"page":"18","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Enhancing Privacy in Wearable IoT through a Provenance Architecture"],"prefix":"10.3390","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5215-7806","authenticated-orcid":false,"given":"Richard K.","family":"Lomotey","sequence":"first","affiliation":[{"name":"Department of Information Sciences and Technology (IST), Pennsylvania State University, Beaver Campus, Monaca, PA 15061, USA"}]},{"given":"Kenneth","family":"Sofranko","sequence":"additional","affiliation":[{"name":"Department of Information Sciences and Technology (IST), Pennsylvania State University, Beaver Campus, Monaca, PA 15061, USA"}]},{"given":"Rita","family":"Orji","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science, Dalhousie University, Halifax, NS B3H 4R2, Canada"}]}],"member":"1968","published-online":{"date-parts":[[2018,4,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1007\/s10796-014-9538-x","article-title":"A security-and quality-aware system architecture for Internet of Things","volume":"18","author":"Sicari","year":"2016","journal-title":"Inf. Syst. Front."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s10796-015-9549-2","article-title":"Introduction: Advances in IoT research and applications","volume":"17","author":"Wang","year":"2015","journal-title":"Inf. Syst. Front."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"953","DOI":"10.1007\/s10796-013-9407-z","article-title":"A new methodology to support group decision-making for IoT-based emergency response systems","volume":"16","author":"Li","year":"2014","journal-title":"Inf. Syst. Front."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.inffus.2017.04.002","article-title":"High-order possibilistic c-means algorithms based on tensor decompositions for big data in IoT","volume":"39","author":"Zhang","year":"2018","journal-title":"Inf. Fusion"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1109\/TSC.2016.2555313","article-title":"Mobile Medical Data Synchronization on Cloud-Powered Middleware Platform","volume":"9","author":"Lomotey","year":"2016","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s10796-014-9532-3","article-title":"Engineering of web services for internet of things applications","volume":"18","author":"Pencheva","year":"2016","journal-title":"Inf. Syst. Front."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of Things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"March, S.T., and Scudder, G.D. (2017). Predictive maintenance: Strategic use of IT in manufacturing organizations. Inf. Syst. Front.","DOI":"10.1007\/s10796-017-9749-z"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/s10796-014-9489-2","article-title":"The Internet of Things\u2014A survey of topics and trends","volume":"17","author":"Whitmore","year":"2015","journal-title":"Inf. Syst. Front."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Lomotey, R.K., and Deters, R. (2016). Middleware for mobile medical data management with minimal latency. Inf. Syst. Front., 1\u201316.","DOI":"10.1007\/s10796-016-9729-8"},{"key":"ref_11","unstructured":"Namboodiri, M. (2016, August 01). M2M and IoT\u2014Security and Privacy Thoughts for 2015. Available online: https:\/\/www.linkedin.com\/pulse\/m2m-iot-security-privacy-thoughts-2015-manu-namboodiri."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1504\/IJBPIM.2017.083796","article-title":"Middleware platform for the synchronisation of mobile medical data","volume":"8","author":"Lomotey","year":"2017","journal-title":"Int. J. Bus. Process Integr. Manag."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Pignotti, E., and Edwards, P. (2013, January 8\u201312). Trusted tiny things: Making the internet of things more transparent to users. Proceedings of the International Workshop on Adaptive Security, Zurich, Switzerland.","DOI":"10.1145\/2523501.2523503"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2728","DOI":"10.1002\/sec.795","article-title":"Privacy in the Internet of Things: Threats and challenges","volume":"7","author":"Ziegeldorf","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_15","first-page":"1","article-title":"Data Security and Privacy in the IoT","volume":"2016","author":"Bertino","year":"2016","journal-title":"EDBT"},{"key":"ref_16","first-page":"27","article-title":"Identidroid: Android can finally wear its anonymous suit","volume":"7","author":"Shebaro","year":"2014","journal-title":"Trans. Data Priv."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1109\/JIOT.2015.2460333","article-title":"Twenty security considerations for cloud-supported Internet of Things","volume":"3","author":"Singh","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_18","unstructured":"Devi, K.N., and Muthuselvi, R. (2016). Secret Sharing of IoT Healthcare Data Using cryptographic algorithm. Int. J. Eng. Res., 5."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1016\/j.pmcj.2017.06.020","article-title":"Wearable IoT data stream traceability in a distributed health information system","volume":"40","author":"Lomotey","year":"2017","journal-title":"Pervasive Mob. Comput."},{"key":"ref_20","unstructured":"(2018, April 20). SensorTag. Available online: http:\/\/www.ti.com\/tool\/cc2650stk#0."},{"key":"ref_21","unstructured":"(2018, April 20). Xamarin. Available online: https:\/\/www.xamarin.com\/."},{"key":"ref_22","unstructured":"(2018, April 20). CouchDB. Available online: http:\/\/www.couchdb.com."},{"key":"ref_23","unstructured":"(2018, April 20). Kura Open Source for IoT. Available online: http:\/\/www.eclipse.org\/kura\/."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Alharbi, K., and Lin, X. (2012, January 18\u201321). PDP: A Privacy-Preserving Data Provenance Scheme. Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China.","DOI":"10.1109\/ICDCSW.2012.58"}],"container-title":["Multimodal Technologies and Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2414-4088\/2\/2\/18\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:01:48Z","timestamp":1760194908000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2414-4088\/2\/2\/18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,23]]},"references-count":24,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2018,6]]}},"alternative-id":["mti2020018"],"URL":"https:\/\/doi.org\/10.3390\/mti2020018","relation":{},"ISSN":["2414-4088"],"issn-type":[{"value":"2414-4088","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,23]]}}}