Safe Use of the Internet of Things for Privacy Enhancing
Subject Areas :
1 - Department of Industrial Engineering, K. N. Toosi University of Technology, Tehran, Iran
Keywords: Security Issues, IoT, Information, Technology Advances, Privacy Enhancing,
Abstract :
New technologies and their uses have always had complex economic, social, cultural, and legal implications, with accompanying concerns about negative consequences. So it will probably be with the IoT and their use of data and attendant location privacy concerns. It must be recognized that management and control of information privacy may not be sufficient according to traditional user and public preferences. Society may need to balance the benefits of increased capabilities and efficiencies of the IoT against a possibly inevitably increased visibility into everyday business processes and personal activities. Much as people have come to accept increased sharing of personal information on the Web in exchange for better shopping experiences and other advantages, they may be willing to accept increased prevalence and reduced privacy of information. Because information is a large component of IoT information, and concerns about its privacy are critical to widespread adoption and confidence, privacy issues must be effectively addressed. The purpose of this paper is which looks at five phases of information flow, involving sensing, identification, storage, processing, and sharing of this information in technical, social, and legal contexts, in the IoT and three areas of privacy controls that may be considered to manage those flows, will be helpful to practitioners and researchers when evaluating the issues involved as the technology advances.
[1] E. Rekleitis, P. Rizomiliotis, and S. Gritzalis, “A Holistic Approach to RFID Security and Privacy,” Proc. 1st Int’l Workshop Security of the Internet of Things (SecIoT 10), Network Information and Computer Security Laboratory, 2010 www.nics.uma.es/seciot10/files/pdf/rekleitis_seciot10_paper.pdf.#
[2] D.Clark, ‘Internet of Things’ in reach: Companies rush into devices like smart door locks, appliances, but limitations exist. The Wall Street Journal. Retrieved April 3, 2015, from http://www.wsj.com/articles/SB100014240527 02303640604579296580892973264 .#
[3] L. Ding, P. Shi, and B. Liu, “The clustering of Internet, Internet of things and social network,” in Proc. 3rd Int. Symp. KAM, Wuhan, China, 2010.#
[4] M. Nitti, R. Girau, L. Atzori, A. Iera, and G. Morabito, “A subjective model for trustworthiness evaluation in the social Internet of things,” in Proc. IEEE 23rd Int. Symp. PIMRC, Sydney, NSW, Australia, 2012, pp. 18–23.#
[5] F. Bao and I.-R. Chen, “Trust management for the Internet of things and its application to service composition,” in Proc. IEEE Int. Symp. Wow Mom, San Francisco, CA, USA, 2012, pp. 1–6.#
[6] C. Occhiuzzi, C. Vallese, S. Amendola, S. Manzari, and G. Marrocco, “NIGHT-Care: A passive RFID system for remote monitoring and control of overnight living environment,” Procedia Computer Science, vol. 32, 2014, pp. 190 – 197.#
[7] B.Xu, L. D. Xu, H. Cai, C. Xie, J. Hu, and F.Bu, “Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services, ” IEEE Transaction on Industrial Informatics, Vol. 10, No. 2, May 2014.#
[8] A. Sarma and J. Gir&227;o, “Identities in the Future Internet of Things,” Wireless Personal Comm., Mar. 2009, pp. 353-363.#
[9] J. Sen, “Privacy Preservation Technologies in Internet of Things,” Proc. Int’l Conf. Emerging Trends in Mathematics, Technology, and Management, 2011; http://arxiv.org/ftp/arxiv/papers/1012/1012.2177.pdf.#
[10] G. Broenink, “The Privacy Coach: Supporting Customer Privacy in the Internet of Things,” Proc. Workshop on What Can the Internet of Things Do for the Citizen? (CIOT 2010); Radboud University, May 2010; http://dare.ubn.ru.nl/bitstream/2066/83839/1/83839.pdf.#
[11] S. Radomirovic, “Towards a Model for Security and Privacy in the Internet of Things,” Proc. 1st Int’l Workshop on the Security of the Internet of Things (SecIoT 10), Network Information and Computer Security Laboratory, 2010; www.nics.uma.es/seciot10/files/pdf/radomirovic_seciot10_paper.pdf.#
[12] B. D. Weinberg, G. R. Milne, Y. G. Andonova, F. M. Hajjat, “Internet of Things: Convenience vs. privacy and secrecy,” Business Horizons," Vol.58, No. 6, November-December, 2015, pp.615-624.#
[13] M.Henze, L.Hermerschmidt, D. Kerpen, R.H&228;u&223;ling, B. Rumpe, K. Wehrle, “A comprehensive approach to privacy in the cloud-based Internet of Things,” Future Generation Computer Systems, Vol.56, March 2016, pp. 701-718.#
[14] R. H. Weber, “Internet of things: Privacy issues revisited,” Computer Law & Security Review, Vol. 31, No. 5, October 2015, pp. 618-627.#
[15] A.Botta, W. de Donato, V. Persico, A.Pescap&233;, “Integration of Cloud computing and Internet of Things: A survey Future Generation Computer Systems,” Vol. 56, March 2016, pp.684-700.#
[16] A. Antonić, M. Marjanović, K. Pripužić, I.P. Žarko, “A mobile crowd sensing ecosystem enabled by CUPUS: Cloud-based publish/subscribe middleware for the Internet of Things,” Future Generation Computer Systems, Vol. 56, March 2016, pp.607-622.#
[17] R.Neisse, G.Steri, I. N. Fovino, G. B.SecKit, “A Model-based Security Toolkit for the Internet of Things Computers & Security,” Vol. 54, October 2015, pp. 60-76.#
[18] I. Lee, K. Lee, “The Internet of Things (IoT): Applications, investments, and challenges for enterprises,” Business Horizons, Vol.58, No. 4, July–August 2015, pp. 431-440.#
[19] Texas Instruments. (2014). “Application areas for the Internet of Things,” Retrieved April 3, 2015, from http://www.ti.com/.#
[20] A.Cavoukian, J.Jonas, “Privacy by design in the age of big data. Information and Privacy Commissioner of Ontario,” Canada. 2012. Available at https://privacybydesign.ca/ content/uploads/2012/06/pbd-big_data.pdf.#
[21] G. R. Milne, “Digital privacy in the marketplace,” New York: Business Expert Press. 2015.#
[22] I.Rubinstein, “Regulating privacy by design,” Berkeley Technology Law Journal, Vol. 26, No.3, 2011, pp.1409-1456.#
[23] H. Packard, “HP study reveals 70 percent of Internet of Things devices vulnerable to attack,” July 29 2014. Retrieved from http://www8.hp.com/us/en/hp-news/press-release. Html? Id=1744676.VOTykPnF-ok.#
[24] L. Atzori, A. Iera, and G. Morabito, “The Internet of things: A survey,” Comput. Netw, vol. 54, no. 15, pp. 2787–2805, 2010.#
[25] P. Mendes, “Social-driven Internet of connected objects,” in Proc. Interconn. Smart Objects with the Internet Workshop, Lisbon, Portugal, 2011.#
[26] Z. Yan, P. Zhang, A. V. Vasilakos, “A survey on trust management for Internet of Things,” Journal of Network and Computer Applications, Volume 42, June 2014, pp. 120-134.#
[27] Y. Challal, E. Natalizio, S. Sen, A. M. Vegni, “Internet of Things security and privacy: Design methods and optimization, Ad Hoc Networks,” Vol.32, September 2015, pp.1-2.#
[28] J. Lee, S.Oh, J. W. Jang, “A Work in Progress: Context based Encryption Scheme for Internet of Things,” Procedia Computer Science, Vol. 56, 2015, pp. 271-275.#
[29] V.H. Jeroen. “Fact sheet-Ethics Subgroup IoT -Version 4.0. Conclusions of the Internet of Things public consultation,” 2013. Available at https://ec.europa.eu/digital-agenda/en/news/conclusions-internet-things-public-consultation.#
[30] S. H. Rebecca. “Europe’s policy options for a dynamic and trustworthy development of the Internet of Things,” SMART 2012/0053, RAND Corp., European Union 2013, 2013.#
[31] A. Samani, H. H. Ghenniwa, A.Wahaishi, “Privacy in Internet of Things: A Model and Protection Framework,” Procedia Computer Science, Vol. 52, 2015, pp. 606-613.#
[32] Value Ageing’ project. “Incorporating European Fundamental Values In to ICT for Ageing: A vital political, ethical, technological, and industrial challenge,” Ref. online: www.valueageing.eu#
[33] R. H. Weber, “Internet of Things–New security and privacy challenges”. Computer Law & Security Review, Vol. 26, No.1, 2010, pp. 23-30.#
[34] C. M. Medaglia, A.Serbanati, “An overview of privacy and security issues in the internet of things,” In The Internet of Things, Springer New York, 2010, pp. 389-395.#
[35] J. S.Kumar, D. R. Patel, “A survey on Internet of Things: security and privacy issues,” International Journal of Computer Applications, 2014, Vol. 90, No.11.#
[36] S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Computer Networks, Vol.76, 2015, pp.146-164.#
[37] Q, Jing, A.V. Vasilakos, J.Wan, J. Lu, D, Qiu, “Security of the internet of things: Perspectives and challenges,” Wireless Networks, Vol. 20, No.8, 2014, pp. 2481-2501.#
[38] H.Suo, J.Wan, C. Zou, J. Liu, “Security in the internet of things: a review,” In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on 2012, pp. 648-651.#
[39] S. Chabridon, R. Laborde, T. Desprats, A. Oglaza, P.Marie, S.M. Marquez, “A survey on addressing privacy together with quality of context for context management in the internet of things,” Annals of telecommunications-annales des t&233;l&233;communications, Vol.69, No.1, 2014, pp.47-62.#
[40] R.Dworkin, “Autonomy and the demented self,” The Milbank Quarterly, Vol.64, No.2, pp.4-16.#
[41] A.Gawande, “Being mortal: Medicine and what matters in the end,” New York: Metropolitan Books, Henry Holt & Company, 2014.#