Reference Hub5
IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment

IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment

Shelendra Kumar Jain, Nishtha Kesswani
Copyright: © 2020 |Volume: 14 |Issue: 2 |Pages: 27
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781799805366|DOI: 10.4018/IJISP.2020040107
Cite Article Cite Article

MLA

Jain, Shelendra Kumar, and Nishtha Kesswani. "IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment." IJISP vol.14, no.2 2020: pp.116-142. http://doi.org/10.4018/IJISP.2020040107

APA

Jain, S. K. & Kesswani, N. (2020). IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment. International Journal of Information Security and Privacy (IJISP), 14(2), 116-142. http://doi.org/10.4018/IJISP.2020040107

Chicago

Jain, Shelendra Kumar, and Nishtha Kesswani. "IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment," International Journal of Information Security and Privacy (IJISP) 14, no.2: 116-142. http://doi.org/10.4018/IJISP.2020040107

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Many emerging fields are adopting Internet of Things technologies to incorporate smartness in respective areas. Several IoT based application area produces large volumes of real time data. Data aggregated through sensor nodes may contain highly sensitive information. An effective and successful IoT system must protect sensitive data from revealing to unauthorized persons. In this article, the authors present an efficient privacy-preserving mechanism called Internet of Things privacy (IoTp). The research simulates and analyzes the effectiveness of the proposed data aggregation and data access mechanism for a typical IoT system. Proposed IoTp scheme ensures privacy at data collection, data store and data access phases of the IoT system. The authors have compared proposed work with existing model. Results show that IoTp scheme is efficient and lightweight mechanism for data collection and data access. It is suitable for the resource constrained IoT ecosystems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.