Data privacy in the Internet of Things based on anonymization: A review

被引:3
|
作者
Neves, Flavio [1 ]
Souza, Rafael [1 ]
Sousa, Juliana [2 ]
Bonfim, Michel [3 ]
Garcia, Vinicius [1 ]
机构
[1] Univ Fed Pernambuco, Ctr Informat, Recife, Brazil
[2] Univ Pernambuco, Fac Ciencias Adm Pernambuco, Pernambuco, Brazil
[3] Univ Fed Ceara, Campus Quixada, Fortaleza, Ceara, Brazil
关键词
Internet of Things; privacy; data anonymization; k-anonymity; data flow; K-ANONYMITY; PERTURBATION; THREATS; MODEL;
D O I
10.3233/JCS-210089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has shown rapid growth in recent years. However, it presents challenges related to the lack of standardization of communication produced by different types of devices. Another problem area is the security and privacy of data generated by IoT devices. Thus, with the focus on grouping, analyzing, and classifying existing data security and privacy methods in IoT, based on data anonymization, we have conducted a Systematic Literature Review (SLR). We have therefore reviewed the history of works developing solutions for security and privacy in the IoT, particularly data anonymization and the leading technologies used by researchers in their work. We also discussed the challenges and future directions for research. The objective of the work is to give order to the main approaches that promise to provide or facilitate data privacy using anonymization in the IoT area. The study's results can help us understand the best anonymization techniques to provide data security and privacy in IoT environments. In addition, the findings can also help us understand the limitations of existing approaches and identify areas for improvement. The results found in most of the studies analyzed indicate a lack of consensus in the following areas: (i) with regard to a solution with a standardized methodology to be applied in all scenarios that encompass IoT; (ii) the use of different techniques to anonymize the data; and (iii), the resolution of privacy issues. On the other hand, results made available by the k-anonymity technique proved efficient in combination with other techniques. In this context, data privacy presents one of the main challenges for broadening secure domains in applying privacy with anonymity.
引用
收藏
页码:261 / 291
页数:31
相关论文
共 50 条
  • [21] A Review on Privacy Preservation of Location-Based Services in Internet of Things
    Wazirali, Raniyah
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (02): : 767 - 779
  • [22] Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things
    Yin, Chunyong
    Xi, Jinwen
    Sun, Ruxia
    Wang, Jin
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3628 - 3636
  • [23] Big Data Privacy and Anonymization
    Torra, Vicenc
    Navarro-Arribas, Guillermo
    PRIVACY AND IDENTITY MANAGEMENT: FACING UP TO NEXT STEPS, 2016, 498 : 15 - 26
  • [24] Privacy in the Internet of Things
    Cai, Zhipeng
    Chang, Rong N.
    Forsstrom, Stefan
    Kos, Anton
    Wang, Chaokun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [25] ocation Privacy for HIP Based Internet of Things
    Choi, Kyung
    Kim, Mihui
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 1457 - 1463
  • [26] Efficient Identity-Based Encryption With Revocation for Data Privacy in Internet of Things
    Sun, Yinxia
    Chatterjee, Pushpita
    Chen, Yi
    Zhang, Yudong
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2734 - 2743
  • [27] Data Privacy Security Mechanism of Industrial Internet of Things Based on Block Chain
    Xie, Yinggang
    Li, Yuxin
    Ma, Yunbin
    APPLIED SCIENCES-BASEL, 2022, 12 (14):
  • [28] Data Protection and Privacy of the Internet of Healthcare Things (IoHTs)
    Shahid, Jahanzeb
    Ahmad, Rizwan
    Kiani, Adnan K.
    Ahmad, Tahir
    Saeed, Saqib
    Almuhaideb, Abdullah M.
    APPLIED SCIENCES-BASEL, 2022, 12 (04):
  • [29] A controllable privacy data transmission mechanism for Internet of things system based on blockchain
    Nie, ZiXiang
    Long, YuanZhenTai
    Zhang, SenLin
    Lu, YueMing
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (03)
  • [30] Privacy Preserving Data Provenance Model Based on PUF for Secure Internet of Things
    Hamadeh, Hala
    Tyagi, Akhilesh
    2019 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2019), 2019, : 189 - 194