2021
DOI: 10.1007/s10796-021-10116-w
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Enhancing Techniques in the Internet of Things Using Data Anonymisation

Abstract: The Internet of Things (IoT) and Industrial 4.0 bring enormous potential benefits by enabling highly customised services and applications, which create huge volume and variety of data. However, preserving the privacy in IoT and Industrial 4.0 against re-identification attacks is very challenging. In this work, we considered three main data types generated in IoT: context data, continuous data, and media data. We first proposed a stream data anonymisation method based on k-anonymity for data collected by IoT de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 43 publications
0
7
0
Order By: Relevance
“…Ren et al. [14] proposed a stream data anonymisation method as a privacy‐enhancing technique for data collecting by IoT devices. However, privacy enhancement techniques have been proposed for various IoT streaming and media data scenarios.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Ren et al. [14] proposed a stream data anonymisation method as a privacy‐enhancing technique for data collecting by IoT devices. However, privacy enhancement techniques have been proposed for various IoT streaming and media data scenarios.…”
Section: Methodsmentioning
confidence: 99%
“…Moreover, other applications use different types of security and privacy. For instance, Ontology and Anonymisation have been used for privacy in articles [3,14]. On the other hand, due to the mass production of data in the IoT, security and privacy are challenged.…”
Section: A Brief Summary Of the Evaluation Of Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Traditional data obfuscation methods are often ineffective and inefficient for time series datasets. For example, the perturbation method [23,24] is commonly used to mask sensitive data by randomly adding crafted noises. However, controlling the perturbation level to preserve privacy without sacrificing the original data's value is a challenging task.…”
Section: Related Workmentioning
confidence: 99%
“…A less stringent technique is data deidentification, which is the removal or manipulation of direct and indirect identifiers such that reestablishing a link between a subject and his/her data would require a key that can be used to reverse the de-identification process (Garfinkel, 2015). Deidentification can be achieved by replacing identifiers with pseudonyms or codes, or pseudonymization (Ren et al, 2021). For example, Kallio et al (2020) assigned pseudonymization codes to participants that were used to log in and provide ratings of IEQ.…”
Section: Privacy Concerns Related To Wearablesmentioning
confidence: 99%