A Comprehensive Analysis of Privacy-Preserving Solutions Developed for IoT-Based Systems and Applications

被引:0
作者
Majeed, Abdul [1 ]
Patni, Sakshi [2 ,3 ]
Hwang, Seong Oun [1 ]
机构
[1] Gachon Univ, Dept Comp Engn, Seongnam 13120, South Korea
[2] Gachon Univ, Dept Comp, Seongnam 13120, South Korea
[3] Panipat Inst Engn & Technol, Dept Comp Applicat, Panipat 132102, India
基金
新加坡国家研究基金会;
关键词
anonymization; blockchain; Internet of Things; privacy-preserving methods; IoT data; federated learning; differential privacy; split learning; on-device IoT analytic; IDENTITY-BASED ENCRYPTION; HOMOMORPHIC ENCRYPTION; DIFFERENTIALLY PRIVATE; INDUSTRIAL INTERNET; BLOCKCHAIN; EDGE; COMPUTATION; ARCHITECTURE; LIGHTWEIGHT; SECURITY;
D O I
10.3390/electronics14112106
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, a large number of Internet of Things (IoT)-based products, solutions, and services have emerged from the industry to enter the marketplace, improving the quality of service. With the wide adoption of IoT-based systems/applications in real scenarios, the privacy preservation (PP) topic has garnered significant attention from both academia and industry; as a result, many PP solutions have been developed, tailored to IoT-based systems/applications. This paper provides an in-depth analysis of state-of-the-art (SOTA) PP solutions recently developed for IoT-based systems and applications. We delve into SOTA PP methods that preserve IoT data privacy and categorize them into two scenarios: on-device and cloud computing. We categorize the existing PP solutions into privacy-by-design (PbD), such as federated learning (FL) and split learning (SL), and privacy engineering solutions (PESs), such as differential privacy (DP) and anonymization, and we map them to IoT-driven applications/systems. We further summarize the latest SOTA methods that employ multiple PP techniques like & varepsilon;-DP + anonymization or & varepsilon;-DP + blockchain + FL (rather than employing just one) to preserve IoT data privacy in both PES and PbD categories. Lastly, we highlight quantum-based methods devised to enhance the security and/or privacy of IoT data in real-world scenarios. We discuss the status of current research in PP techniques for IoT data within the scope established for this paper, along with opportunities for further research and development. To the best of our knowledge, this is the first work that provides comprehensive knowledge about PP topics centered on the IoT, and which can provide a solid foundation for future research.
引用
收藏
页数:38
相关论文
共 272 条
[1]   Advancing Federated Learning Through Novel Mechanism for Privacy Preservation in Healthcare Applications [J].
Abaoud, Mohammed ;
Almuqrin, Muqrin A. A. ;
Khan, Mohammad Faisal .
IEEE ACCESS, 2023, 11 :83562-83579
[2]   A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems [J].
Adam, Mumin ;
Hammoudeh, Mohammad ;
Alrawashdeh, Rana ;
Alsulaimy, Basil .
IEEE ACCESS, 2024, 12 :57128-57149
[3]  
Ahdan Syaiful, 2019, 2019 IEEE 13th International Conference on Telecommunication Systems, Services, and Applications (TSSA), P194, DOI 10.1109/TSSA48701.2019.8985492
[4]  
Ahmadi M., 2024, P 2024 IEEE 3 INT C
[5]   Edge Intelligence: Federated Learning-Based Privacy Protection Framework for Smart Healthcare Systems [J].
Akter, Mahmuda ;
Moustafa, Nour ;
Lynar, Timothy ;
Razzak, Imran .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (12) :5805-5816
[6]   Blockchain-IoT Healthcare Applications and Trends: A Review [J].
Al-Nbhany, Wafaa A. N. A. ;
Zahary, Ammar T. ;
Al-Shargabi, Asma A. .
IEEE ACCESS, 2024, 12 :4178-4212
[7]  
Alam M.M., 2024, P 2024 3 INT C INN T, P1
[8]  
Alawad Faiga, 2024, 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics, P300, DOI 10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics62450.2024.00068
[9]   Federated Learning for Cloud and Edge Security: A Systematic Review of Challenges and AI Opportunities [J].
Albshaier, Latifa ;
Almarri, Seetah ;
Albuali, Abdullah .
ELECTRONICS, 2025, 14 (05)
[10]   Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments [J].
Aleisa, Mohammed A. .
IEEE ACCESS, 2025, 13 :18660-18676