2020
DOI: 10.1109/access.2020.3005509
|View full text |Cite
|
Sign up to set email alerts
|

GDPR Compliance Verification in Internet of Things

Abstract: Data privacy in Internet of Things (IoT) applications remains a major concern of regulation bodies. The introduction of the European General Data Protection Regulation (GDPR) enables users to control how their data is accessed and processed, requiring consent from users before any data manipulation is carried out on their (personal) data by smart devices or cloud-hosted services. Blockchains provide the benefits of a distributed and immutable ledger recording digital transactions across a global network of pee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 42 publications
(18 citation statements)
references
References 40 publications
0
18
0
Order By: Relevance
“…Another pertinent issue, but which was not addressed by this work, is related to issues of ethics and information privacy. Even if the individual provides all the authorizations to have his life analyzed by the system, there are laws that prevent certain information, even if released by the individual, from being analyzed for the creation of profiles (Barati et al, 2020). And how to analyze the information derived from the individual's interaction with his peers, without hurting ethics and data protection laws?…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Another pertinent issue, but which was not addressed by this work, is related to issues of ethics and information privacy. Even if the individual provides all the authorizations to have his life analyzed by the system, there are laws that prevent certain information, even if released by the individual, from being analyzed for the creation of profiles (Barati et al, 2020). And how to analyze the information derived from the individual's interaction with his peers, without hurting ethics and data protection laws?…”
Section: Discussionmentioning
confidence: 99%
“…What Web Cookies and algorithms like those of the RMSE system do, is the creation of user profiles (cf. Barati et al, 2020) useful to recognize the individual and insert him in categories, in order to improve the marketing of products and services for these individuals.…”
Section: Exponential and Disruptive Technologiesmentioning
confidence: 99%
“…Therefore, a significant related issue is consent to share information. Among several obligations the GDPR imposes on software operators and service providers, a key obligation is user consent [33]. The complex granularity in the IoV together with the fleeting character of services, however, obfuscate the matter of making informed consensual decisions.…”
Section: B Trust In the Iovmentioning
confidence: 99%
“…Method Application [23], [29] Privacy Labels Data privacy [1], [33] Blockchain methods GDPR compliance [83], [84] Virtual Trip Lines Anonymous data collection [96] Private Info. Retrieval Anonymous data retrieval [97]- [99] Differential Privacy Anonymous data retrieval…”
Section: Papermentioning
confidence: 99%
“…However, a solution for checking the compliance of such obligations in an automatic way was not provided. The authors in [26] proposed a formal representation for verification of GDPR obligations. Such obligations are encoded in smart contracts to provide an automatic approach for data accountability.…”
Section: Fig 1: Overview Of the Research Approachmentioning
confidence: 99%