Privacy in Internet of Things: From Principles to Technologies

被引:63
作者
Li, Chao [1 ]
Palanisamy, Balaji [1 ]
机构
[1] Univ Pittsburgh, Sch Comp & Informat, Pittsburgh, PA 15260 USA
关键词
General data protection regulation (GDPR); Internet of Things (IoT); privacy; privacy-by-design (PbD); privacy enhancing technologies (PETs); privacy laws; DIFFERENTIAL PRIVACY; LIGHTWEIGHT; MIDDLEWARE; SECURITY; CLOUD; IOT; ARCHITECTURE; SYSTEM; FAMILY; MODEL;
D O I
10.1109/JIOT.2018.2864168
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ubiquitous deployment of low-cost smart devices and widespread use of high-speed wireless networks have led to the rapid development of the Internet of Things (IoT). IoT embraces countless physical objects that have not been involved in the traditional Internet and enables their interaction and cooperation to provide a wide range of IoT applications. Many services in the IoT may require a comprehensive understanding and analysis of data collected through a large number of physical devices that challenges both personal information privacy and the development of IoT. Information privacy in IoT is a broad and complex concept as its understanding and perception differ among individuals and its enforcement requires efforts from both legislation as well as technologies. In this paper, we review the state-of-the-art principles of privacy laws, the architectures for IoT and the representative privacy enhancing technologies (PETs). We analyze how legal principles can be supported through a careful implementation of PETs at various layers of a layered IoT architecture model to meet the privacy requirements of the individuals interacting with IoT systems. We demonstrate how privacy legislation maps to privacy principles which in turn drives the design of necessary PETs to be employed in the IoT architecture stack.
引用
收藏
页码:488 / 505
页数:18
相关论文
共 170 条
  • [1] Aberer K, 2006, P 32 INT C VER LARG, P1199
  • [2] A Reference Architecture for Improving Security and Privacy in Internet of Things Applications
    Addo, Ivor D.
    Ahamed, Sheikh I.
    Yau, Stephen S.
    Buduru, Arun
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON MOBILE SERVICES (MS), 2014, : 108 - 115
  • [3] Adleman L.M., 1983, U.S. Patent, Patent No. 4405829
  • [4] Aggarwal C. C., 2005, P 31 VLDB C TRONDH N, V5, P901, DOI DOI 10.5555/1083592.1083696
  • [5] Aggarwal G, 2005, LECT NOTES COMPUT SC, V3363, P246
  • [6] Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P143
  • [7] Albrecht MR, 2014, LECT NOTES COMPUT SC, V8616, P57, DOI 10.1007/978-3-662-44371-2_4
  • [8] Alghamdi TA, 2013, TOP HIST PHIL, P163, DOI 10.1109/FGCT.2013.6767217
  • [9] ON THE FEASIBILITY OF ATTRIBUTE-BASED ENCRYPTION ON INTERNET OF THINGS DEVICES
    Ambrosin, Moreno
    Anzanpour, Arman
    Conti, Mauro
    Dargahi, Tooska
    Moosavi, Sanaz Rahimi
    Rahmani, Amir M.
    Liljeberg, Pasi
    [J]. IEEE MICRO, 2016, 36 (06) : 25 - 35
  • [10] [Anonymous], 2014, CONSTRAINED APPL PRO