Security and Privacy in IoT based E-Business and Retail

被引:0
|
作者
Kaushik, Keshav [1 ]
Dahiya, Susheela [1 ]
机构
[1] Univ Petr & Energy Studies, Sch Comp Sci, Dehra Dun, Uttar Pradesh, India
来源
PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART) | 2018年
关键词
Internet of Things (IoT); Security and Privacy; e-Business; Retail; IoT Architecture; Cyber-Attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Interconnection of various "things" are resulting into many issues related to security and privacy of IoT platform. With the advancement in technology, many e-businesses and retail stores are using IoT based solutions for their sale, marketing, productivity and promotions. These IoT based solutions are much helpful in providing various benefits to owner and customers. However, these solutions are vulnerable to many security and privacy based concerns. This paper addressed the rise of cyber threats in IoT, Enterprise view of IoT for E-Business & Retail Security, advancements in e-business and retail because of IoT, flow of threat agents related to security and privacy concerns in e-business and retail.
引用
收藏
页码:78 / 81
页数:4
相关论文
共 50 条
  • [1] Networking security and privacy strategies in e-business
    Tsai, N
    Ching, RKH
    Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 70 - 73
  • [2] ASPIDA: An Observatory for Security and Privacy in the Greek e-Business Sector
    Vlachos, Vasileios
    Katevas, Gerasimos
    Katsidimas, Ioannis
    Kerimakis, Emmanouil
    Nikoletseas, Sotiris
    Panagiotou, Stefanos
    Spirakis, Paul
    25TH PAN-HELLENIC CONFERENCE ON INFORMATICS WITH INTERNATIONAL PARTICIPATION (PCI2021), 2021, : 362 - 368
  • [3] The security policy of e-business based on PKI
    Zhang, CY
    Zhang, LQ
    THIRD INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE ENGINEERING: DIGITAL ENTERPRISES AND NONTRADITIONAL INDUSTRIALIZATION, 2003, : 655 - 659
  • [4] Privacy-based computation model in e-business
    Aburukba, Raafat
    Masaud-Wahaishi, AbdulMutalib
    Ghenniwa, Hamada
    Shen, Weiming
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2009, 47 (17) : 4885 - 4906
  • [5] E-business, recent threats and security countermeasures
    Pournouri, Sina
    Craven, Matthew
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (03) : 169 - 184
  • [6] A security architecture for E-business based on grid technology
    Zhou, Ning
    Zhang, Fangfang
    Yu, Xiaosheng
    FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1352 - 1356
  • [7] Accountancy for E-Business Enterprises Based on Cyber Security
    Yang, Yu
    Yin, Zecheng
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2023, 19 (06)
  • [8] E-business Workflow Security Architecture based on UCON
    Wen, Haoyu
    Ji, Dongxing
    2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 338 - 340
  • [9] Research of E-Business Security Based on SOAP Protocol
    Wang, Yiran
    MANUFACTURING PROCESS TECHNOLOGY, PTS 1-5, 2011, 189-193 : 4304 - 4307
  • [10] Protecting the Privacy Based on Reasoning in E-Business Using Anonymous
    Peng, Tao
    Jiang, Minghua
    Hu, Ming
    2009 INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND INFORMATION APPLICATION TECHNOLOGY, VOL III, PROCEEDINGS,, 2009, : 232 - 235