Data privacy in the Internet of Things based on anonymization: A review

被引:3
|
作者
Neves, Flavio [1 ]
Souza, Rafael [1 ]
Sousa, Juliana [2 ]
Bonfim, Michel [3 ]
Garcia, Vinicius [1 ]
机构
[1] Univ Fed Pernambuco, Ctr Informat, Recife, Brazil
[2] Univ Pernambuco, Fac Ciencias Adm Pernambuco, Pernambuco, Brazil
[3] Univ Fed Ceara, Campus Quixada, Fortaleza, Ceara, Brazil
关键词
Internet of Things; privacy; data anonymization; k-anonymity; data flow; K-ANONYMITY; PERTURBATION; THREATS; MODEL;
D O I
10.3233/JCS-210089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has shown rapid growth in recent years. However, it presents challenges related to the lack of standardization of communication produced by different types of devices. Another problem area is the security and privacy of data generated by IoT devices. Thus, with the focus on grouping, analyzing, and classifying existing data security and privacy methods in IoT, based on data anonymization, we have conducted a Systematic Literature Review (SLR). We have therefore reviewed the history of works developing solutions for security and privacy in the IoT, particularly data anonymization and the leading technologies used by researchers in their work. We also discussed the challenges and future directions for research. The objective of the work is to give order to the main approaches that promise to provide or facilitate data privacy using anonymization in the IoT area. The study's results can help us understand the best anonymization techniques to provide data security and privacy in IoT environments. In addition, the findings can also help us understand the limitations of existing approaches and identify areas for improvement. The results found in most of the studies analyzed indicate a lack of consensus in the following areas: (i) with regard to a solution with a standardized methodology to be applied in all scenarios that encompass IoT; (ii) the use of different techniques to anonymize the data; and (iii), the resolution of privacy issues. On the other hand, results made available by the k-anonymity technique proved efficient in combination with other techniques. In this context, data privacy presents one of the main challenges for broadening secure domains in applying privacy with anonymity.
引用
收藏
页码:261 / 291
页数:31
相关论文
共 50 条
  • [1] Attack Risk Analysis in Data Anonymization in Internet of Things
    Yang, Tianli
    Cang, Li Shan
    Iqbal, Muddesar
    Almakhles, Dhafer
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 11 (04) : 4986 - 4993
  • [2] Privacy Information Security Classification for Internet of Things Based on Internet Data
    Lu, Xiaofeng
    Qu, Zhaowei
    Li, Qi
    Hui, Pan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [3] An Anonymization Protocol for the Internet of Things
    Davoli, Luca
    Protskaya, Yanina
    Veltri, Luca
    2017 INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS), 2017, : 459 - 464
  • [4] A data privacy protection scheme for Internet of things based on blockchain
    Gong, Jing
    Mei, Yurong
    Xiang, Feng
    Hong, Hanshu
    Sun, Yibo
    Sun, Zhixin
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (05)
  • [5] Review of Internet of Things in Development of Smart Cities with Data Management & Privacy
    Burange, Anup W.
    Misalkar, Harshal D.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 189 - 195
  • [6] Privacy Preserving Data Publishing and Data Anonymization Approaches: A Review
    Goswami, Puneet
    Madan, Suman
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 139 - 142
  • [7] Privacy and Security in Internet-based Computing: Cloud Computing, Internet of Things, Cloud of Things: a review
    Sahmim, Syrine
    Gharsellaoui, Hamza
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 1516 - 1522
  • [8] Data encryption standard based protection method of privacy data on Internet of Things
    Cheng, Xiaohui
    Liang, Zhongning
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 1285 - 1291
  • [9] Big Data Privacy in the Internet of Things Era
    Perera, Charith
    Ranjan, Rajiv
    Wang, Lizhe
    Khan, Samee U.
    Zomaya, Albert Y.
    IT PROFESSIONAL, 2015, 17 (03) : 32 - 39
  • [10] Review on Security and Privacy Concerns in Internet of Things
    Kumar, Nishant
    Madhuri, J.
    ChanneGowda, Manjunath
    2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,