Full Paper View Go Back

IoT and Personal Data Protection

Jhanvi Zala1

Section:Review Paper, Product Type: Journal-Paper
Vol.9 , Issue.4 , pp.32-35, Aug-2021


Online published on Aug 31, 2021


Copyright Β© Jhanvi Zala . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jhanvi Zala, β€œIoT and Personal Data Protection,” International Journal of Scientific Research in Computer Science and Engineering, Vol.9, Issue.4, pp.32-35, 2021.

MLA Style Citation: Jhanvi Zala "IoT and Personal Data Protection." International Journal of Scientific Research in Computer Science and Engineering 9.4 (2021): 32-35.

APA Style Citation: Jhanvi Zala, (2021). IoT and Personal Data Protection. International Journal of Scientific Research in Computer Science and Engineering, 9(4), 32-35.

BibTex Style Citation:
@article{Zala_2021,
author = {Jhanvi Zala},
title = {IoT and Personal Data Protection},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {8 2021},
volume = {9},
Issue = {4},
month = {8},
year = {2021},
issn = {2347-2693},
pages = {32-35},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2462},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2462
TI - IoT and Personal Data Protection
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Jhanvi Zala
PY - 2021
DA - 2021/08/31
PB - IJCSE, Indore, INDIA
SP - 32-35
IS - 4
VL - 9
SN - 2347-2693
ER -

366 Views    388 Downloads    61 Downloads
  
  

Abstract :
IoT is the most evolving technology ever. In short period of time, there are so many devices related to IoT have come into market. Devices like smart watches, lenses, fitness brand, microchips and other more. IoT means a physical device powered by the Internet with an embedded system of sensors, actuators and a networking device that exchanges and collects data. All the devices need different application to run. Any user who uses this application has to enter the data to enhance service of the device. Similarly, to see the security and nodes of IoT devices that have been compromised, collect all this information of malicious activity, it has become a top priority of the IoT network. If we insert data from any application into the device, the user shares this data. The user`s privacy is at risk whenever the user shares data. So this paper presents how you can protect a user`s personal data. Inside this paper we will look at different methods of how to protect personal data. Personal data administrators are being used to monitor and handle user data exchange, as well as inference prevention techniques. It can also equate the PDPA to its counterparts in other countries using a comparative approach.

Key-Words / Index Term :
personal data, privacy, PDPA

References :
[1] SN. Friedman, J. B. Rowe, D. J. Reinkensmeyer, M Bachman,The manumeter: A wearable device for monitoring daily use of the wrist and fingers. IEEE journal of biomedical and health informatics, 18(6), 1804-1812, 2014.
[2] Department of computer science, Bioengineering, Robotics and systems Engineering University of Genoa, Italy. A Framework for Personal Data Protection in IoT.
[3] Z. Huo,M. Xiaofeng, Z. Rui, "Feel free to check-in: Privacy alert against hidden location inference attacks in GeoSNs.", International Conference on Database Systems for Advanced Applications, Springer Berlin Heidelberg, 2013.
[4] Department of Computing and Cyber Security, Texas A&M University, San Antonio, TX 78224, USA. IoT Privacy and Security: Challenges and Solutions.
[5] Meng, Y.; Zhang, W.; Zhu, H.; Shen, X.S. Securing consumer IoT in the smart home: Architecture, challenges, and countermeasures. IEEE Wirel. Commun. 25, 53–59, 2018.
[6] Siby, S.; Maiti, R.R.; Tippenhauer, N.O. Iotscanner: Detecting privacy threats in IoT neighborhoods. In Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, Abu Dhabi United Arab Emirates, pp. 23–30, 2 April 2017.
[7] Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 148,283–294, 2019.
[8] Leloglu, E.Areviewof security concerns in Internet of Things. J. Comput. Commun. 5, 121–136, 2016.
[9] Sadeghi, A.-R.; Wachsmann, C.; Waidner, M. Security and privacy challenges in industrial internet of things. In Proceedings of the 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, USA, 8–12 pp. 1–6, June 2015.
[10] Bertino, E., Choo, K.-K. R., Georgakopolous, D., & Nepal, S. (2016). Internet of Things (IoT): Smart and Secure Service Delovery. ACM Transactions on Internet Technology, 16(4), 1–7. http://doi.org/10.1145/3013520
[11] Raza, S., Helgason, T., Papadimitratos, P., & Voigt, T. (2017). SecureSense: End-to-end secure communication architecture for the cloud-connected internet of things. Future Generation Computer Systems. http://doi.org/10.1016/j.future.2017.06.008
[12] Z. Cai, Z. He, X. Guan, Y. Li, "Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks", IEEE Transactions on Dependable and Secure Computing, 5971(c), 2016.
[13] Y. Sun, L. Yin, L. Liu, S. Xin, "Toward inference attacks for kanonymity", Personal and Ubiquitous Computing, 18(8), 1871- 1880, 2014
[14] S. Chakraborty, C. Shen, K. R. Raghavan, Y. Shoukry, M. Millar, M. Srivastava, "ipShield : A Framework For Enforcing Context-Aware Privacy", In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), pp. 143-156. 2014.
[15] The Influence of Privacy and Security on the Future of IoT Mihaela M?d?lina ANGHEL, Petru IANC, Marian ILEANA, Laura Iulia MODI Bucharest University of Economic Studis, Romania Informatica Economic? vol. 24, no. 2/202
[16] H. Orman, Blockchain: The emperors new pki?, IEEE Internet Computing, vol. 22, no. 2, pp. 23–28, 2018.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us atΒ  support@isroset.org or view contact page for more details.

Go to Navigation