A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective

被引:22
|
作者
Abdulghani, Hezam Akram [1 ]
Nijdam, Niels Alexander [1 ]
Cohen, Anastasija [1 ]
Konstantas, Dimitri [1 ]
机构
[1] Univ Geneva, Geneva Sch Econ & Management, CH-1211 Geneva, Switzerland
来源
SYMMETRY-BASEL | 2019年 / 11卷 / 06期
基金
欧盟地平线“2020”;
关键词
Internet of Things (IoT); security guidelines; privacy guidelines; countermeasures; security goals; attacks; IoT data at rest; DATA-STORAGE SECURITY; BIG DATA; SYSTEM; ATTACKS; ARCHITECTURE; REPLICATION; INTERNET; ISSUES;
D O I
10.3390/sym11060774
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The Internet of Things (IoT) makes our lives much easier, more valuable, and less stressful due to the development of many applications around us including smart cities, smart cars, and smart grids, offering endless services and solutions. Protecting IoT data of such applications at rest either on the objects or in the cloud is an indispensable requirement for achieving a symmetry in the handling and protection of the IoT, as we do with data created by persons and applications. This is because unauthorised access to such data may lead to harmful consequences such as linkage attacks, loss of privacy, and data manipulation. Such undesired implications may jeopardise the existence of IoT applications if protection measures are not taken, and they stem from two main factors. One is that IoT objects have limited capabilities in terms of memory capacity, battery life, and computational power that hamper the direct implementation of conventional Internet security solutions without some modifications (e.g., traditional symmetric algorithms). Another factor is the absence of widely accepted IoT security and privacy guidelines for IoT data at rest and their appropriate countermeasures, which would help IoT stakeholders (e.g., developers, manufacturers) to develop secure IoT systems and therefore enhance IoT security and privacy by design. Toward this end, we first briefly describe the main IoT security goals and identify IoT stakeholders. Moreover, we briefly discuss the most well-known data protection frameworks (e.g., General Data Protection Regulation (GDPR), Health Insurance Portability (HIPAA)). Second, we highlight potential attacks and threats against data at rest and show their violated security goals (e.g., confidentiality and integrity). Third, we review a list of protection measures by which our proposed guidelines can be accomplished. Fourth, we propose a framework of security and privacy guidelines for IoT data at rest that can be utilised to enhance IoT security and privacy by design and establish a symmetry with the protection of user-created data. Our framework also presents the link between the suggested guidelines, mitigation techniques, and attacks. Moreover, we state those IoT stakeholders (e.g., manufacturers, developers) who will benefit most from these guidelines. Finally, we suggest several open issues requiring further investigation in the future, and we also discuss the limitations of our suggested framework.
引用
收藏
页数:36
相关论文
共 50 条
  • [21] Data Security and Privacy Challenges in Adopting Solutions For IOT
    Padaki, Sagar
    Supriya, S.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 410 - 415
  • [22] Data Security & Privacy Protection in IoT MGC Systems
    Huijie, Robert Deng
    [J]. PROCEEDINGS OF THE 9TH ACM CYBER-PHYSICAL SYSTEM SECURITY WORKSHOP, CPSS 2023, 2023, : 1 - 1
  • [23] IoT Big Data Security and Privacy Versus Innovation
    Sollins, Karen R.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 1628 - 1635
  • [24] Nothing to Hide? On the Security and Privacy Threats Beyond Open Data
    Pastor-Galindo, Javier
    Gomez Marmol, Felix
    Martinez Perez, Gregorio
    [J]. IEEE INTERNET COMPUTING, 2021, 25 (04) : 58 - 66
  • [25] Analysis on Security and Privacy Guidelines: RFID-Based IoT Applications
    Abdulghani, Hezam Akram
    Nijdam, Niels Alexander
    Konstantas, Dimitri
    [J]. IEEE Access, 2022, 10 : 131528 - 131554
  • [26] Analysis on Security and Privacy Guidelines: RFID-Based IoT Applications
    Abdulghani, Hezam Akram
    Nijdam, Niels Alexander
    Konstantas, Dimitri
    [J]. IEEE ACCESS, 2022, 10 : 131528 - 131554
  • [27] Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey
    Barua, Arup
    Al Alamin, Md Abdullah
    Hossain, Md Shohrab
    Hossain, Ekram
    [J]. IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2022, 3 : 251 - 281
  • [28] A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures
    Obaidat, Muath A.
    Obeidat, Suhaib
    Holst, Jennifer
    Al Hayajneh, Abdullah
    Brown, Joseph
    [J]. COMPUTERS, 2020, 9 (02)
  • [29] Threats and countermeasures for information system security: A cross-industry study
    Yeh, Quey-Jen
    Chang, Arthur Jung-Ting
    [J]. INFORMATION & MANAGEMENT, 2007, 44 (05) : 480 - 491
  • [30] A Study on IoT: Model, Communication Protocols, Security Hazards & Countermeasures
    Bagga, Manju
    Thakral, Prateek
    Bagga, Tarun
    [J]. 2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 591 - 598