Data privacy in the Internet of Things based on anonymization: A review

被引:7
作者
Neves, Flavio [1 ]
Souza, Rafael [1 ]
Sousa, Juliana [2 ]
Bonfim, Michel [3 ]
Garcia, Vinicius [1 ]
机构
[1] Univ Fed Pernambuco, Ctr Informat, Recife, Brazil
[2] Univ Pernambuco, Fac Ciencias Adm Pernambuco, Pernambuco, Brazil
[3] Univ Fed Ceara, Campus Quixada, Fortaleza, Ceara, Brazil
关键词
Internet of Things; privacy; data anonymization; k-anonymity; data flow; K-ANONYMITY; PERTURBATION; THREATS; MODEL;
D O I
10.3233/JCS-210089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has shown rapid growth in recent years. However, it presents challenges related to the lack of standardization of communication produced by different types of devices. Another problem area is the security and privacy of data generated by IoT devices. Thus, with the focus on grouping, analyzing, and classifying existing data security and privacy methods in IoT, based on data anonymization, we have conducted a Systematic Literature Review (SLR). We have therefore reviewed the history of works developing solutions for security and privacy in the IoT, particularly data anonymization and the leading technologies used by researchers in their work. We also discussed the challenges and future directions for research. The objective of the work is to give order to the main approaches that promise to provide or facilitate data privacy using anonymization in the IoT area. The study's results can help us understand the best anonymization techniques to provide data security and privacy in IoT environments. In addition, the findings can also help us understand the limitations of existing approaches and identify areas for improvement. The results found in most of the studies analyzed indicate a lack of consensus in the following areas: (i) with regard to a solution with a standardized methodology to be applied in all scenarios that encompass IoT; (ii) the use of different techniques to anonymize the data; and (iii), the resolution of privacy issues. On the other hand, results made available by the k-anonymity technique proved efficient in combination with other techniques. In this context, data privacy presents one of the main challenges for broadening secure domains in applying privacy with anonymity.
引用
收藏
页码:261 / 291
页数:31
相关论文
共 55 条
  • [1] Abomhara M, 2014, 2014 INTERNATIONAL CONFERENCE ON PRIVACY AND SECURITY IN MOBILE SYSTEMS (PRISMS)
  • [2] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [3] Utilizing Blockchain to Overcome Cyber Security Concerns in the Internet of Things: A Review
    Alotaibi, Bandar
    [J]. IEEE SENSORS JOURNAL, 2019, 19 (23) : 10953 - 10971
  • [4] A Comparison of Lightweight Communication Protocols in Robotic Applications
    Amaran, Muhammad Harith
    Noh, Nazmin Arif Mohd
    Rohmad, Mohd Saufy
    Hashim, Habibah
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON ROBOTICS AND INTELLIGENT SENSORS (IEEE IRIS2015), 2015, 76 : 400 - 405
  • [5] [Anonymous], 2019, IEEE P802.1AS-Rev/D8.0 January, P1
  • [6] Ashton K., 2009, RFID J, V22, P97, DOI DOI 10.1016/J.AMJCARD.2013.11.014
  • [7] Privacy Preservation in the Internet of Things
    Berrehili, Fatima Zahra
    Belmekki, Abdelhamid
    [J]. ADVANCES IN UBIQUITOUS NETWORKING 2, 2017, 397 : 163 - 175
  • [8] The Internet of Things vision: Key features, applications and open issues
    Borgia, Eleonora
    [J]. COMPUTER COMMUNICATIONS, 2014, 54 : 1 - 31
  • [9] Chaum D., 1988, Journal of Cryptology, V1, P65, DOI 10.1007/BF00206326
  • [10] UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS
    CHAUM, DL
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (02) : 84 - 88