Analysis of Privacy Preservation Techniques in IoT

Analysis of Privacy Preservation Techniques in IoT

Ravindra Sadashivrao Apare (JJT University, Rajasthan, India) and Satish Narayanrao Gujar (BSCOER, Pune, India)
Copyright: © 2019 |Pages: 7
DOI: 10.4018/IJAEC.2019070104

Abstract

IoT (Internet of Things) is a sophisticated analytics and automation system that utilizes networking, big data, artificial intelligence, and sensing technology to distribute absolute systems for a service or product. The major challenges in IoT relies in security restrictions related with generating low cost devices, and the increasing number of devices that generates further opportunities for attacks. Hence, this article intends to develop a promising methodology associated with data privacy preservation for handling the IoT network. It is obvious that the IoT devices often generate time series data, where the range of respective time series data can be extremely large.
Article Preview
Top

1. Introduction

The IoT is a compilation of physical objects that are entrenched with software, electronics, together with sensors, which allows objects to be sensed and controlled distantly across the traditional network infrastructure, makes the direct integration feasible among computer communication networks in addition to the physical world, and significantly contributes to enhanced precision, efficiency, and economic compensations (Acemoglu, Makjdoumi, Malekian & Ozdaglar, 2017; Kang, Kim & Choo, 2017; Said, Albagory, Nofal & Raddady, 2017; Shirvanimoghaddam, Condoluci, Dohler & Johnson, 2017). Therefore, IoT is generally applied in numerous applications such as environment monitoring, transportation, medical healthcare systems, building automation, and energy management (G. Sun, Chang, Ramachandran, Z. Sun & Liao, 2017; Lopez, Rios, Bai & Wang). Moreover, IoT is the contemporary web evolution that comprises billions of devices, which are preserved by various association and people who are employing in addition to utilizing them for their own determinations (H. Chen, Beaudoin & Hong, 2017; L. Chen et al., 2017). IoT, in addition, manages with the embarrassment of Cyber Security and privacy intimidations that currently interrupts organizations, in addition, it has the capability to hold the data of entire countries and even industries for payoff just like erstwhile web-dependent information systems potentially (Guliano, Mazzenga, Neri & Vegni, 2017).

IoT must deal powerfully with such intimidations and confidentiality of the information gathered and assure the protection and are distilled from IoT strategies to comprehend its entire potential (Asplund & Nadjm-Tehrani, 2016; Sajid, Abbas & Saleem, 2016). On the other hand, IoT offers several characteristic limitations that make the appliance of traditional privacy methods and security challenges (Xu, Ren, Song & Du, 2016). This is owing to the IoT solutions, which comprise a variety of private security and solutions for defending such IoT data in addition to the store at the layer of the device, the IoT platform and the infrastructure layer or IoT application layer (Zhou, Cao, Dong & Vasilakos, 2017). Subsequently, a magnificent confront in IoT is to guarantee the end-to-end security across the mentioned three IoT layers.

Unsuitably, owing to the resource constrictions of IoT devices, it hands over tremendously multifaceted computation to the energy abundant cloud for significantly improved capability forever (Tiburski, Amaral, de Matos, de Azevedo & Hessel, 2016). On the other hand, the outputs, inputs, in addition to the role of the fundamental estimation might be intimately related to the privacy of IoT users, which could not be undefended to collusion between malicious IoT users in addition to malicious cloud servers (Hossain et al., 2016; Jacobsson, Boldt & Carlsson, 2016).

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 11: 4 Issues (2020): 1 Released, 3 Forthcoming
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing