A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective

被引:22
|
作者
Abdulghani, Hezam Akram [1 ]
Nijdam, Niels Alexander [1 ]
Cohen, Anastasija [1 ]
Konstantas, Dimitri [1 ]
机构
[1] Univ Geneva, Geneva Sch Econ & Management, CH-1211 Geneva, Switzerland
来源
SYMMETRY-BASEL | 2019年 / 11卷 / 06期
基金
欧盟地平线“2020”;
关键词
Internet of Things (IoT); security guidelines; privacy guidelines; countermeasures; security goals; attacks; IoT data at rest; DATA-STORAGE SECURITY; BIG DATA; SYSTEM; ATTACKS; ARCHITECTURE; REPLICATION; INTERNET; ISSUES;
D O I
10.3390/sym11060774
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The Internet of Things (IoT) makes our lives much easier, more valuable, and less stressful due to the development of many applications around us including smart cities, smart cars, and smart grids, offering endless services and solutions. Protecting IoT data of such applications at rest either on the objects or in the cloud is an indispensable requirement for achieving a symmetry in the handling and protection of the IoT, as we do with data created by persons and applications. This is because unauthorised access to such data may lead to harmful consequences such as linkage attacks, loss of privacy, and data manipulation. Such undesired implications may jeopardise the existence of IoT applications if protection measures are not taken, and they stem from two main factors. One is that IoT objects have limited capabilities in terms of memory capacity, battery life, and computational power that hamper the direct implementation of conventional Internet security solutions without some modifications (e.g., traditional symmetric algorithms). Another factor is the absence of widely accepted IoT security and privacy guidelines for IoT data at rest and their appropriate countermeasures, which would help IoT stakeholders (e.g., developers, manufacturers) to develop secure IoT systems and therefore enhance IoT security and privacy by design. Toward this end, we first briefly describe the main IoT security goals and identify IoT stakeholders. Moreover, we briefly discuss the most well-known data protection frameworks (e.g., General Data Protection Regulation (GDPR), Health Insurance Portability (HIPAA)). Second, we highlight potential attacks and threats against data at rest and show their violated security goals (e.g., confidentiality and integrity). Third, we review a list of protection measures by which our proposed guidelines can be accomplished. Fourth, we propose a framework of security and privacy guidelines for IoT data at rest that can be utilised to enhance IoT security and privacy by design and establish a symmetry with the protection of user-created data. Our framework also presents the link between the suggested guidelines, mitigation techniques, and attacks. Moreover, we state those IoT stakeholders (e.g., manufacturers, developers) who will benefit most from these guidelines. Finally, we suggest several open issues requiring further investigation in the future, and we also discuss the limitations of our suggested framework.
引用
收藏
页数:36
相关论文
共 50 条
  • [1] A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective
    Abdul-Ghani, Hezam Akram
    Konstantas, Dimitri
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (02)
  • [2] Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures
    Waheed, Nazar
    He, Xiangjian
    Ikram, Muhammad
    Usman, Muhammad
    Hashmi, Saad Sajid
    [J]. ACM COMPUTING SURVEYS, 2021, 53 (06)
  • [3] A Taxonomy of IoT: Security and Privacy Threats
    Alsamani, Badr
    Lahza, Husam
    [J]. CONFERENCE PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2018, : 72 - 77
  • [4] Machine learning security and privacy: a review of threats and countermeasures
    Paracha, Anum
    Arshad, Junaid
    Farah, Mohamed Ben
    Ismail, Khalid
    [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2024, 2024 (01)
  • [5] Internet of Things (IoT): Security and Privacy Threats
    Shaikh, Eman
    Mohiuddin, Iman
    Manzoor, Ayisha
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [6] Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures
    Mo, Kanghua
    Ye, Peigen
    Ren, Xiaojun
    Wang, Shaowei
    Li, Wenjun
    Li, Jin
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (06)
  • [7] Modern security threats in the Internet of Things (IoT): Attacks and Countermeasures
    Rajendran, Gowthamaraj
    Nivash, Ragul R. S.
    Parthy, Purushotham Parthiban
    Balamurugan, S.
    [J]. 2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,
  • [8] Data Security in Cloud Computing: Threats and Countermeasures
    Chen, Yi-Fan
    Suo, Hui
    Liu, Zhuo-Hua
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 181 - 185
  • [9] Security Threats Recognition and Countermeasures on Smart Battlefield Environment based on IoT
    Eom, Jung Ho
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 347 - 356
  • [10] Empirical Study of Email Security Threats and Countermeasures
    Nagamalai, Dhinaharan
    Dhinakaran, Beatrice Cynthia
    Ozcan, Abdulkadir
    Okatan, Ali
    Lee, Jae-Kwang
    [J]. NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 229 - 242