A Survey on Privacy Preservation in Fog-Enabled Internet of Things

被引:4
|
作者
Sarwar, Kinza [1 ]
Yongchareon, Sira [1 ]
Yu, Jian [1 ]
Rehman, Saeed Ur [2 ,3 ]
机构
[1] Auckland Univ Technol, Sch Engn Comp & Math Sci, 55 Wellesley St East, Auckland 1010, New Zealand
[2] Flinders Univ S Australia, Coll Sci & Engn, Adelaide, SA, Australia
[3] Flinders Univ S Australia, Coll Sci & Engn, Sturt Rd, Bedford Pk, SA 5042, Australia
关键词
Content privacy; context privacy; fog computing; Fog-enabled IoT; Internet of Things; IoT privacy; PRESERVING DATA AGGREGATION; SOURCE LOCATION PRIVACY; KEY AGREEMENT PROTOCOL; HEALTH-CARE; AUTHENTICATION SCHEME; DIFFERENTIAL PRIVACY; USER AUTHENTICATION; ANONYMOUS AUTHENTICATION; IOT APPLICATIONS; ENCRYPTED DATA;
D O I
10.1145/3474554
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Despite the rapid growth and advancement in the Internet of Things (IoT), there are critical challenges that need to be addressed before the full adoption of the IoT. Data privacy is one of the hurdles towards the adoption of IoT as there might be potential misuse of users' data and their identity in IoT applications. Several researchers have proposed different approaches to reduce privacy risks. However, most of the existing solutions still suffer from various drawbacks, such as huge bandwidth utilization and network latency, heavyweight cryptosystems, and policies that are applied on sensor devices and in the cloud. To address these issues, fog computing has been introduced for IoT network edges providing low latency, computation, and storage services. In this survey, we comprehensively review and classify privacy requirements for an in-depth understanding of privacy implications in IoT applications. Based on the classification, we highlight ongoing research efforts and limitations of the existing privacy-preservation techniques and map the existing IoT schemes with Fog-enabled IoT schemes to elaborate on the benefits and improvements that Fog-enabled IoT can bring to preserve data privacy in IoT applications. Lastly, we enumerate key research challenges and point out future research directions.
引用
收藏
页数:39
相关论文
共 50 条
  • [31] Secure and privacy-preserving orchestration and delivery of fog-enabled IoT services
    Viejo, Alexandre
    Sanchez, David
    AD HOC NETWORKS, 2019, 82 : 113 - 125
  • [32] Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey
    Shen, Yizhou
    Shepherd, Carlton
    Ahmed, Chuadhry Mujeeb
    Shen, Shigen
    Wu, Xiaoping
    Ke, Wenlong
    Yu, Shui
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 133
  • [33] Virtual Fog: A Virtualization Enabled Fog Computing Framework for Internet of Things
    Li, Jianhua
    Jin, Jiong
    Yuan, Dong
    Zhang, Hongke
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01): : 121 - 131
  • [34] Fog Computing for the Internet of Things: Security and Privacy Issues
    Alrawais, Arwa
    Alhothaily, Abdulrahman
    Hu, Chunqiang
    Cheng, Xiuzhen
    IEEE INTERNET COMPUTING, 2017, 21 (02) : 34 - 42
  • [35] Security, Trust and Privacy for Cloud, Fog and Internet of Things
    Chen, Chien-Ming
    Chaudhry, Shehzad Ashraf
    Yeh, Kuo-Hui
    Aman, Muhammad Naveed
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [36] Preserving privacy in internet of things: a survey
    Abi Sen A.A.
    Eassa F.A.
    Jambi K.
    Yamin M.
    International Journal of Information Technology, 2018, 10 (2) : 189 - 200
  • [37] A survey on privacy and security of Internet of Things
    Ogonji, Mark Mbock
    Okeyo, George
    Wafula, Joseph Muliaro
    COMPUTER SCIENCE REVIEW, 2020, 38
  • [38] Fog-enabled WLANs for Indoor Positioning
    Guo, Yanjun
    Zhao, Liqiang
    Wang, Yong
    Liu, Qi
    Qiu, Jiahui
    2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING), 2019,
  • [39] Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things
    Hu, Pengfei
    Ning, Huansheng
    Qiu, Tie
    Song, Houbing
    Wang, Yanna
    Yao, Xuanxia
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1143 - 1155
  • [40] A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET
    Soleymani, Seyed Ahmad
    Goudarzi, Shidrokh
    Anisi, Mohammad Hossein
    Zareei, Mahdi
    Abdullah, Abdul Hanan
    Kama, Nazri
    VEHICULAR COMMUNICATIONS, 2021, 29