2019
DOI: 10.1109/jiot.2018.2878658
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
68
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 72 publications
(69 citation statements)
references
References 154 publications
0
68
0
1
Order By: Relevance
“…Authors of [37] applied a multi-objective algorithm to hide sensitive information in order to achieve privacy preserving data mining (PPDM). In IoT devices, data may be collected from people without their consent, hence posing privacy risk [38]. However, authors in [39] proposed a user-friendly framework to achieve consents in Bluetooth low-energy IoT devices.…”
Section: Review Of Existing Privacy Preserving Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Authors of [37] applied a multi-objective algorithm to hide sensitive information in order to achieve privacy preserving data mining (PPDM). In IoT devices, data may be collected from people without their consent, hence posing privacy risk [38]. However, authors in [39] proposed a user-friendly framework to achieve consents in Bluetooth low-energy IoT devices.…”
Section: Review Of Existing Privacy Preserving Modelsmentioning
confidence: 99%
“…The framework is seen to have improved the privacy policy agreement in IoT appliances. Also, a survey of privacy enhancing technologies (PETs) to mitigate privacy risk, privacy legislation, and their challenges in IoT is found in [38]. Authors in [40] gave an overview of approaches to safeguard privacy in the industrial internet of things (IIoT), and emphasized a secure algorithm for endpoints.…”
Section: Review Of Existing Privacy Preserving Modelsmentioning
confidence: 99%
“…The Internet of Things (IoT) [ 1 , 2 ] is an emerging concept that changes the interactions of people with things in everyday life. IoT [ 3 ] allows the connection of ubiquitous objects/things to the Internet in order to provide innovative services that can lead to time- and money-saving in the daily activity of the individuals and that can increase the quality of life [ 4 ].…”
Section: Introductionmentioning
confidence: 99%
“…In keeping with this trend, today, IoT data markets can be categorized into two major approaches regarding privacy [11]: i) privacy protection market and ii) privacy valuation market. In the privacy protection market, privacy-enhancing technologies are provided to data providers, which minimize potential privacy infringement risks and protect possible privacy violations caused by IoT services/applications [12], [13]. On the other hand, in the privacy valuation market, data brokers offer proper benefits or incentives to data providers (who consider the value between privacy protection and valuation) for collecting IoT datasets under agreement or consent.…”
Section: Introductionmentioning
confidence: 99%