Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation (original) (raw)

Towards Privacy Preserving IoT Environments A Survey.pdf

The Internet of Things (IoT) is a network of Internet-enabled devices that can sense, communicate, and react to changes in their environment. Billions of these computing devices are connected to the Internet to exchange data between themselves and/or their infrastructure. IoT promises to enable a plethora of smart services in almost every aspect of our daily interactions and improve the overall quality of life. However, with the increasing wide adoption of IoT, it comes significant privacy concerns to lose control of how our data is collected and shared with others. As such, privacy is a core requirement in any IoT ecosystem and is a major concern that inhibits its widespread user adoption. The ultimate source of user discomfort is the lack of control over personal raw data that is directly streamed from sensors to the outside world. In this survey, we review existing research and proposed solutions to rising privacy concerns from a multi-point of view to identify the risks and mitigations. First, we provide an evaluation of privacy issues and concerns in IoT systems due to resource constraints. Second, we describe proposed IoT solutions that embrace a variety of privacy concerns such as identification, tracking, monitoring and profiling. Lastly, we discuss the mechanisms and architectures for protecting IoT data in case of mobility/permanence at the device layer, infrastructure/platform layer, and application layer.

Reference Architectures for Privacy Preservation in Cloud-based IoT Applications

Services Transactions on Services Computing, 2014

As the promise of the Internet of Things (IoT) materializes in our everyday lives, we are often challenged with a number of concerns regarding the efficacy of the current data privacy solutions that support the pervasive components at play in IoT. The privacy and security concerns surrounding IoT applications often manifests themselves as a threat to end-user adoption and negatively impacts trust among end-users. In this paper, we present a reference software architectures for building cloud-enabled IoT applications in support of collaborative pervasive systems aimed at achieving trustworthiness among end-users in IoT scenarios. We describe a case study that leverages this reference architecture to protect sensitive user data in IoT application implementation. We then evaluate the response data from our end-user survey. In addition we present a Secure, Private and Trustworthy protocol (named SPTP) that was prototyped for addressing critical security, privacy and trust concerns surrounding mobile, pervasive and cloud services in Collective Intelligence (CI) scenarios. We present our evaluation criteria for the proposed protocol, our results and future work.

Towards Privacy Preserving IoT Environments: A Survey

Wireless Communications and Mobile Computing, 2018

The Internet of Things (IoT) is a network of Internet-enabled devices that can sense, communicate, and react to changes in their environment. Billions of these computing devices are connected to the Internet to exchange data between themselves and/or their infrastructure. IoT promises to enable a plethora of smart services in almost every aspect of our daily interactions and improve the overall quality of life. However, with the increasing wide adoption of IoT, come significant privacy concerns to lose control of how our data is collected and shared with others. As such, privacy is a core requirement in any IoT ecosystem and is a major concern that inhibits its widespread user adoption. The ultimate source of user discomfort is the lack of control over personal raw data that is directly streamed from sensors to the outside world. In this survey, we review existing research and proposed solutions to rising privacy concerns from a multipoint of view to identify the risks and mitigatio...

Secure and Privacy-Oriented Archi- Tecture with Open Cloud Computing for Internet of Things Devices

2019

Smart devices and sensors are key empowering resources regarding the Internet of Things (IoT) paradigm to gather user’s sensed information and facts. However, getting involved in collecting user’s sensed data for further processing is definitely not very easy. This is because difficulties associated with application heterogeneity, as well as, the security and privacy that now have eliminated the grow of many sensing networks intended for systematic data gathering. Majority of the current researches state that increasing the superiority of IoT services, can be boost through implementing cloud computing approach. For this reason, it is very vital to be aware of the security and privacy aspects among the setting of cloud computing and as well, recognize the ideal properties and as well, the threats that may help and support design secure IoT based architecture. Therefore, this paper is exploring the concept behind the buildup of cloud computing and as well, examines its significance fo...

An Improvised Framework for Privacy Preservation in IoT

International Journal of Information Security and Privacy

Data privacy is now-a-days a special issue in era of Internet of Things because of the big data stored and transmitted by the public/private devices. Different types and levels of privacy can be provided at different layers of IoT architecture, also different mechanisms operate at different layers of IoT architecture. This article presents the work being done towards the design of a generic framework to integrate these privacy preserving mechanisms at different layers of IoT architecture and can ensure privacy preservation in a heterogeneous IoT environment. The data is classified into different levels of secrecy and appropriate rules and mechanisms are applied to ensure this privacy. The proposed framework is implemented and evaluated for its performance with security and execution time or primary parameters. Various scenarios are also evaluated, and a comparison is done with an existing mechanism ABE (Attribute Based Encryption). It has been found that the proposed work takes less...

Preserving privacy in internet of things: a survey

International journal of information technology, 2018

Internet of things (IOT) paradigm is changing day to day lives towards sophisticated automation and enhancing living standards of our societies. The most of ''Things'' in IOT are having limited power, storage, and computational capabilities. Therefore data is collected, manipulated and stored in the clouds. The benefit of ''anytime and anywhere'' access of data gives rise to serious security and privacy issues and lead to many problems like exposure of user's personal and sensitive information and loss of the trust between parties. These challenges need to be addressed with adequately with utmost care. From an operational point of view, the major concern for IOT is ''Privacy''. In this article, we discuss difference between privacy and security. Further, and present several approaches and techniques that are being used to fulfill the privacy requirements. This comparative study also contains advantages and disadvantages of the mentioned approaches. Finally, we discuss the future opportunities, trends, and provide recommendations about the privacy for IOT based applications and services.

An Innovative Method for Preserving Privacy in Internet of Things

Sensors, 2019

Preservation of privacy of users’ personal data has always been a critical issue to deal with. This issue in the Internet of Things (IoT), which facilitates millions of applications, has become even more challenging. Currently, several approaches and methods are available to safeguard privacy but each of them suffers from one or more anomalies. In particular, Trusted Third-Party approach relies on the trust of a third-party server, Cooperation needs the trust of other peers, Obfuscation is known to return inaccurate results, and Dummy generates too much overhead. Moreover, these and most of the other well-known approaches deal only with specific types of applications linked to the location-based services. In this paper, we present two new methods, namely: Blind Third Party (BTP) and Blind Peers ( B L P ), and combine them to form a new one to be known as the Blind Approach ( B L A ). With the help of simulation results we shall demonstrate the effectiveness and superiority of B L A ...

Privacy Preservation Technologies in Internet of Things

Proceedings of International Conference on Emerging Trends in Mathematics, Technology and Management, pp. 496-504, BITM, Shantiniketan, West Begnal. India, January 11-12, 2010, 2010

"Since the beginning of the Internet thirty years ago, we have witnessed a number of changes in the application of communication technologies. Today, the Internet can be described to a large extent as a ubiquitous infrastructure that is always accessible. After the era of connecting places and connecting people, the Internet of the future will also connect things. The idea behind the resulting Internet of Things is to seamlessly gather and use information about objects of the real world during their entire life cycle. In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things. In particular, we consider what kind of security problems are being faced and what level of protection can be provided by applying approaches based on secure multi-party computations."

Development and Implementation of an OpenSource IoT Platform, Network and Data Warehouse for Privacy-Compliant Applications in Research and Industry

Current Directions in Biomedical Engineering

In the scientific field, data acquisition using commercial or self-developed sensors is a necessity for many research activities. Data security and data privacy are important requirements in all types of IoT applications, especially in the medical context. IoTree42 is a powerful, OpenSource platform that closes the gap between cost-efficiency, the ease of use and digital sovereignty. The flexible and user-friendly design makes the platform ideal for the originally conceived research context. Nevertheless, it can be used for smaller budget-oriented setups and industrial applications with thousands of sensors and actuators likewise. The platform was developed with security in mind by minimizing interfaces and the use of stable software components and transport protocols. IoTree42 utilizes lightweight OpenSource software cast into a flexible backend, allowing the deployment not only on full-fledged servers but also on single board computers like the Raspberry Pi. Data is transmitted wi...

SECURE PRIVACY DATA COLLECTION, STORAGE AND ACCESS IN CLOUD-ASSISTED INTERNET OF THINGS AILINENI SAI PRASANNA, MODDU SAMPOORNA 2

Cloud-assisted Internet of Things (IoT) gives a promising answer for data blasting issues for the capacity imperatives of individual items. Notwithstanding, with the use of cloud, IoT faces new security challenges for data commonality between two gatherings, which is presented without precedent for this paper and not as of now tended to by customary methodologies. We explore a safe cloud-assisted IoT data overseeing technique to keep data confidentiality when gathering, putting away and getting to IoT data with the help of a cloud with the thought of clients' addition. The proposed framework novelly applies an intermediary re-encryption plot, which was proposed in [5]. Subsequently, a safe IoT under our proposed technique could oppose most assaults from the two insiders and outcasts of IoT to break data confidentiality, and in the mean time with steady correspondence cost for re-encrytion against incremental size of IoT. We additionally demonstrate the strategy is viable by numerical outcomes.