ABSTRACT
Internet of things (IoT) brings forth a coupling among diverse sensors and diverse domains of applications and services. Sensors primarily provide the sensed observations, which are utilized by various applications and services. Applications are meant to serve personalized needs of the user, based on their various requirements. Therefore, in IoT, the challenge is to provide a platform to facilitate the interoperation among the diverse domains of applications, various heterogeneous devices such as sensors, actuators, gateways, and to preserve privacy while receiving and sharing the sensed observation from and with the multiple data sources and sinks. This paper discusses the characteristics and vision of the IoT system and presents a privacy preservation framework as a part of the IoT platform including a data masking tool for both privacy and utility preservation. The proposed framework provides negotiation--based architecture to find a solution for utility-privacy tradeoff in IoT data management. A case study on data privacy problem in e-health is presented along with a discussion for future research scope and conclusion.
- V. Banahatti, S. Lodha, SafeMask, In Proceedings of 5th World TCS Technical Architects' Global Conference (TACTiCS) organized by TCS, 2009.Google Scholar
- S. Bandyopadhyay, M. Sengupta, S. Maiti and S. Dutta "Role of middleware for Internet of things: a study," International Journal of Computer Science & Engineering Survey (IJCSES) vol.2, no.3, August 2011.Google Scholar
- A. Ukil, J. Sen, and S. Ghosh, "An Efficient Distribution Sensitive Privacy for Real-Time Applications," Springer LNEE, vol. 114, pp. 81--91, 2012.Google Scholar
- R. Chaytor and K. Wang, "Small domain randomization: same privacy, more utility", Proceedings of the VLDB Endowment, vol: 3, Issue: 1--2, September 2010. Google ScholarDigital Library
- M. Chorost, "The Networked Pill", MIT Technology Review, March 20, 2008Google Scholar
- V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati, "Microdata Protection", Secure Data Management in Decentralized Systems, Springer, 2007.Google Scholar
- Cisco Satellite Solutions (IRIS), Available from Cisco at http://www.cisco.com/web/strategy/government/space-routing.html (accessed on 10 May, 2012).Google Scholar
- M. Van Dijk and A. Juels, "On the impossibility of cryptography alone for privacy-preserving cloud computing", USENIX conference on Hot topics in security, 2010. Google ScholarDigital Library
- D. Evans, "The Internet of Things: How the Next Evolution of the Internet Is Changing Everything," CISCO Whitepaper, April, 2011.Google Scholar
- Y. He, D. N. Jutla, "Contextual e-Negotiation for the Handling of Private Data in eCommerce on a Semantic Web" Proceedings of the 39th Hawaii International Conference on System Sciences, 2006 Google ScholarDigital Library
- IBM Smarter Planet, Available from IBM at http://www.ibm.com/smarterplanet/us/en/ (accessed on 10 May, 2012)Google Scholar
- D. Kifer and Jo. Gehrke, "Injecting utility into anonymized datasets," ACM SIGMOD, pp. 217--228, 2006 Google ScholarDigital Library
- S. Lodha and D. Thomas, "Probabilistic Anonymity," In Proceedings of 1st ACM SIGKDD International Workshop on Privacy, Security and Trust in KDD (PinKDD), pp. 56--79, 2007. Google ScholarDigital Library
- C. Mayer, "Security and Privacy Challenges in the Internet of Things," KiVS Workshop on Global Sensor Networks (GSN09), Kassel, Germany, March 2009.Google Scholar
- V. Rastogi, D. Suciu, and S. Hong, "The boundary between privacy and utility in data publishing", 33rd international conference on Very large data bases, 2007 Google ScholarDigital Library
- Wikipedia, AlertMe, Available from the Wikipedia at http://en.wikipedia.org/wiki/AlertMe (accessed on 10 May, 2012).Google Scholar
- J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. Wai-Chee Fu. "Utility-based anonymization using local recoding," ACM SIGKDD, pp. 785--790, 2006. Google ScholarDigital Library
- A. Yassine and S. Shirmohammadi, "Privacy and the Market for Private Data: A Negotiation Model to Capitalize on Private Data" IEEE/ACS International Conference on Computer Systems and Applications, 2008. Google ScholarDigital Library
- A. Ukil, J. Sen, and S. Koilakonda, "Embedded security for Internet of things," IEEE NCETACS, pp. 1--6, 2011.Google Scholar
Index Terms
- Negotiation-based privacy preservation scheme in internet of things platform
Recommendations
Privacy preserving Internet of Things
The Internet of Things (IoT) is the latest web evolution that incorporates billions of devices that are owned by different organisations and people who are deploying and using them for their own purposes. IoT-enabled harnessing of the information that ...
Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications
AbstractPrivacy issue has become a crucial concern in internet of things (IoT) applications ranging from home appliances to vehicular networks. RFID system has found enormous scope in IoT applications such as consumer electronics, healthcare, tracking ...
IMR based Anonymization for Privacy Preservation in Data Mining
KMO '16: Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting SocietyPrivacy Preserving Data Mining (PPDM) is a data mining research area that aims to protect individual's personal information from unsolicited or unauthorized disclosure. Privacy relates to personal information that a person would not wish others to know ...
Comments