skip to main content
10.1145/2490428.2490439acmconferencesArticle/Chapter ViewAbstractPublication PagessecuritConference Proceedingsconference-collections
research-article

Negotiation-based privacy preservation scheme in internet of things platform

Authors Info & Claims
Published:17 August 2012Publication History

ABSTRACT

Internet of things (IoT) brings forth a coupling among diverse sensors and diverse domains of applications and services. Sensors primarily provide the sensed observations, which are utilized by various applications and services. Applications are meant to serve personalized needs of the user, based on their various requirements. Therefore, in IoT, the challenge is to provide a platform to facilitate the interoperation among the diverse domains of applications, various heterogeneous devices such as sensors, actuators, gateways, and to preserve privacy while receiving and sharing the sensed observation from and with the multiple data sources and sinks. This paper discusses the characteristics and vision of the IoT system and presents a privacy preservation framework as a part of the IoT platform including a data masking tool for both privacy and utility preservation. The proposed framework provides negotiation--based architecture to find a solution for utility-privacy tradeoff in IoT data management. A case study on data privacy problem in e-health is presented along with a discussion for future research scope and conclusion.

References

  1. V. Banahatti, S. Lodha, SafeMask, In Proceedings of 5th World TCS Technical Architects' Global Conference (TACTiCS) organized by TCS, 2009.Google ScholarGoogle Scholar
  2. S. Bandyopadhyay, M. Sengupta, S. Maiti and S. Dutta "Role of middleware for Internet of things: a study," International Journal of Computer Science & Engineering Survey (IJCSES) vol.2, no.3, August 2011.Google ScholarGoogle Scholar
  3. A. Ukil, J. Sen, and S. Ghosh, "An Efficient Distribution Sensitive Privacy for Real-Time Applications," Springer LNEE, vol. 114, pp. 81--91, 2012.Google ScholarGoogle Scholar
  4. R. Chaytor and K. Wang, "Small domain randomization: same privacy, more utility", Proceedings of the VLDB Endowment, vol: 3, Issue: 1--2, September 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Chorost, "The Networked Pill", MIT Technology Review, March 20, 2008Google ScholarGoogle Scholar
  6. V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati, "Microdata Protection", Secure Data Management in Decentralized Systems, Springer, 2007.Google ScholarGoogle Scholar
  7. Cisco Satellite Solutions (IRIS), Available from Cisco at http://www.cisco.com/web/strategy/government/space-routing.html (accessed on 10 May, 2012).Google ScholarGoogle Scholar
  8. M. Van Dijk and A. Juels, "On the impossibility of cryptography alone for privacy-preserving cloud computing", USENIX conference on Hot topics in security, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Evans, "The Internet of Things: How the Next Evolution of the Internet Is Changing Everything," CISCO Whitepaper, April, 2011.Google ScholarGoogle Scholar
  10. Y. He, D. N. Jutla, "Contextual e-Negotiation for the Handling of Private Data in eCommerce on a Semantic Web" Proceedings of the 39th Hawaii International Conference on System Sciences, 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. IBM Smarter Planet, Available from IBM at http://www.ibm.com/smarterplanet/us/en/ (accessed on 10 May, 2012)Google ScholarGoogle Scholar
  12. D. Kifer and Jo. Gehrke, "Injecting utility into anonymized datasets," ACM SIGMOD, pp. 217--228, 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Lodha and D. Thomas, "Probabilistic Anonymity," In Proceedings of 1st ACM SIGKDD International Workshop on Privacy, Security and Trust in KDD (PinKDD), pp. 56--79, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. Mayer, "Security and Privacy Challenges in the Internet of Things," KiVS Workshop on Global Sensor Networks (GSN09), Kassel, Germany, March 2009.Google ScholarGoogle Scholar
  15. V. Rastogi, D. Suciu, and S. Hong, "The boundary between privacy and utility in data publishing", 33rd international conference on Very large data bases, 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Wikipedia, AlertMe, Available from the Wikipedia at http://en.wikipedia.org/wiki/AlertMe (accessed on 10 May, 2012).Google ScholarGoogle Scholar
  17. J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. Wai-Chee Fu. "Utility-based anonymization using local recoding," ACM SIGKDD, pp. 785--790, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Yassine and S. Shirmohammadi, "Privacy and the Market for Private Data: A Negotiation Model to Capitalize on Private Data" IEEE/ACS International Conference on Computer Systems and Applications, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Ukil, J. Sen, and S. Koilakonda, "Embedded security for Internet of things," IEEE NCETACS, pp. 1--6, 2011.Google ScholarGoogle Scholar

Index Terms

  1. Negotiation-based privacy preservation scheme in internet of things platform

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SecurIT '12: Proceedings of the First International Conference on Security of Internet of Things
          August 2012
          266 pages
          ISBN:9781450318228
          DOI:10.1145/2490428

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 17 August 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader