Security and Privacy in IoT based E-Business and Retail

被引:0
|
作者
Kaushik, Keshav [1 ]
Dahiya, Susheela [1 ]
机构
[1] Univ Petr & Energy Studies, Sch Comp Sci, Dehra Dun, Uttar Pradesh, India
来源
PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART) | 2018年
关键词
Internet of Things (IoT); Security and Privacy; e-Business; Retail; IoT Architecture; Cyber-Attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Interconnection of various "things" are resulting into many issues related to security and privacy of IoT platform. With the advancement in technology, many e-businesses and retail stores are using IoT based solutions for their sale, marketing, productivity and promotions. These IoT based solutions are much helpful in providing various benefits to owner and customers. However, these solutions are vulnerable to many security and privacy based concerns. This paper addressed the rise of cyber threats in IoT, Enterprise view of IoT for E-Business & Retail Security, advancements in e-business and retail because of IoT, flow of threat agents related to security and privacy concerns in e-business and retail.
引用
收藏
页码:78 / 81
页数:4
相关论文
共 50 条
  • [21] IoT Security and Privacy Issues
    Assiri, Abeer
    Almagwashi, Haya
    2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [22] Research on the Security Model for E-business Process Management
    Yu Xin
    Xia MingPing
    Yu, Bai
    2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 369 - +
  • [23] IoT Driving New Business Model, and IoT Security, Privacy, and Awareness Challenges
    Sharbaf, Mehrdad S.
    2022 IEEE 8TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2022,
  • [24] Semiautomatic Derivation and Use of Personal Privacy Policies in E-Business
    Yee, George
    Korba, Larry
    INTERNATIONAL JOURNAL OF E-BUSINESS RESEARCH, 2005, 1 (01) : 54 - 69
  • [25] E-business security design using process security requirements septet
    Nachtigal, S.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 408 - 413
  • [26] A security blueprint for e-business applications based on the three-tier architecture
    Du, J
    Jiao, JX
    Li, XD
    2004 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2004, : 879 - 884
  • [27] An Integrated Framework for Enhancing Security and Privacy in IoT-Based Business Intelligence Applications
    Kumar, Randhir
    Kumar, Prabhat
    Jolfaei, Alireza
    Islam, A. K. M. Najmul
    2023 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, ICCE, 2023,
  • [28] A-MVC : A security architecture on the e-business presentation layer
    Xiao, Kun
    Chen, Shihong
    Wang, Leichun
    Xiao, Jian
    SIXTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 957 - 962
  • [29] Across-step access control in E-business security
    Liu, Guohua
    Yi, Chuanjiang
    Liu, Weihua
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 453 - 458
  • [30] Climate of Data-driven Innovation Within E-business Retail Actors
    Sundstrom, Malin
    FIIB BUSINESS REVIEW, 2019, 8 (02) : 79 - 87