TY - GEN
T1 - Towards Privacy Provisioning for Internet of Things (IoT)
AU - Ghazal, Taher M.
AU - Hasan, Mohammad Kamrul
AU - Abdul Wahab, Amelia Natasya
AU - Ibrahim, Amer
AU - Khan, Wasim Ahmad
AU - Raza, Neha Zulfiqar
AU - Atta, Ayesha
AU - Mago, Beenu
N1 - Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - Internet of things (IoT) providing an environment to connect all the things from the world to internet. It interconnects smart things and provides advanced building management systems, smart city services, participatory sensing applications which improve every day's life. IoT hold wide range of physical objects embedded with tags, sensors, devices that had not been involved with internet and allow them to interact to provide IoT applications. The adoption of IoT is ubiquitous but it also arises the major concerns about 'Privacy'. Privacy includes the secretion of personal information as well as therapy of data. This paper accommodates systematic literature review of privacy threats and challenges along with the techniques used to deal and address them which emerged in the research literature. I observed that very rare models consented to eliminate privacy aspects. I also analyzed that the focus of the multiple solution providers was user-centric point of view. Not one of the existing surveys analyze the privacy of IoT in terms of organized analysis of the privacy fundamentals and approaches. There is need to work on it.
AB - Internet of things (IoT) providing an environment to connect all the things from the world to internet. It interconnects smart things and provides advanced building management systems, smart city services, participatory sensing applications which improve every day's life. IoT hold wide range of physical objects embedded with tags, sensors, devices that had not been involved with internet and allow them to interact to provide IoT applications. The adoption of IoT is ubiquitous but it also arises the major concerns about 'Privacy'. Privacy includes the secretion of personal information as well as therapy of data. This paper accommodates systematic literature review of privacy threats and challenges along with the techniques used to deal and address them which emerged in the research literature. I observed that very rare models consented to eliminate privacy aspects. I also analyzed that the focus of the multiple solution providers was user-centric point of view. Not one of the existing surveys analyze the privacy of IoT in terms of organized analysis of the privacy fundamentals and approaches. There is need to work on it.
KW - Identification
KW - Privacy by Design
KW - Profiling
KW - Secret Sharing Schemes
UR - http://www.scopus.com/inward/record.url?scp=85146495527&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85146495527&partnerID=8YFLogxK
U2 - 10.1109/ICCR56254.2022.9995916
DO - 10.1109/ICCR56254.2022.9995916
M3 - Conference contribution
AN - SCOPUS:85146495527
T3 - International Conference on Cyber Resilience, ICCR 2022
BT - International Conference on Cyber Resilience, ICCR 2022
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2022 International Conference on Cyber Resilience, ICCR 2022
Y2 - 6 October 2022 through 7 October 2022
ER -