Anonymization : Securing privacy in IoT

被引:2
|
作者
Kaur, Jashanpreet [1 ]
Sengupta, Jyotsna [1 ]
机构
[1] Punjabi Univ, Dept Comp Sci, Patiala 147002, Punjab, India
来源
关键词
Anonymization; Neural Network; Privacy; k-anonymity; INTERNET;
D O I
10.1080/02522667.2020.1802123
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
The convergence of object automation with the association of internet system has become very communal in our routine life. At home, health centres, industries etc. each field has internet-related control systems installed to support organization's proper execution, thereby, increasing the efficiency and saving time. Beside multi-fold benefits, IoT has brought a plethora of privacy risks and security issues. To maintain the privacy of both, the user and the objects many counter measures are carried out and techniques have been found to address illegitimate access and minimize their effect on private data, communication, location etc. The paper focuses on the IoT threats related to individual's identity and the various techniques like anonymization to preserve and protect individual's identity.
引用
下载
收藏
页码:1463 / 1477
页数:15
相关论文
共 50 条
  • [31] Satisfying Privacy Requirements Before Data Anonymization
    Sun, Xiaoxun
    Wang, Hua
    Li, Jiuyong
    Zhang, Yanchun
    COMPUTER JOURNAL, 2012, 55 (04): : 422 - 437
  • [32] Efficient k-anonymization for privacy preservation
    Liang, Z.
    Wei, R.
    PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, : 737 - 742
  • [33] Protecting Privacy in Knowledge Graphs With Personalized Anonymization
    Hoang, Anh-Tu
    Carminati, Barbara
    Ferrari, Elena
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2181 - 2193
  • [34] Fundamental Limits of Location Privacy using Anonymization
    Takbiri, Nazanin
    Houmansadr, Amir
    Goeckel, Dennis L.
    Pishro-Nik, Hossein
    2017 51ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2017,
  • [35] Defining Perfect Location Privacy Using Anonymization
    Montazeri, Zarrin
    Houmansadr, Amir
    Pishro-Nik, Hossein
    2016 ANNUAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (CISS), 2016,
  • [36] Practical Anonymization for Protecting Privacy in Combinatorial Maps
    Chu, Dandan
    Li, Yidong
    Wang, Tao
    Zhang, Lei
    Shen, Hong
    2014 15TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT 2014), 2014, : 119 - 123
  • [37] On Privacy Preserving Anonymization of Finger-selfies
    Malhotra, Aakarsh
    Chhabra, Saheb
    Vatsa, Mayank
    Singh, Richa
    2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2020), 2020, : 120 - 128
  • [38] Limits of Location Privacy under Anonymization and Obfuscation
    Takbiri, Nazanin
    Houmansadr, Amir
    Goeckel, Dennis L.
    Pishro-Nik, Hossein
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 764 - 768
  • [39] Data Anonymization for Privacy Aware Machine Learning
    Jaidan, David Nizar
    Carrere, Maxime
    Chemli, Zakaria
    Poisvert, Remi
    MACHINE LEARNING, OPTIMIZATION, AND DATA SCIENCE, 2019, 11943 : 725 - 737
  • [40] An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services
    Onesimu, J. Andrew
    Karthikeyan, J.
    Sei, Yuichi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1629 - 1649