Filters








8,674 Hits in 10.5 sec

An Internet of Things Based Multi-Level Privacy-Preserving Access Control for Smart Living

Usama Salama, Lina Yao, Hye-young Paik
2018 Informatics  
This paper presents an access control framework for AAL which considers multi-level access and privacy preservation.  ...  We achieve multi-level access control by extending Public Key Infrastructure (PKI) for secure authentication and utilizing Attribute-Based Access Control (ABAC) for authorization.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/informatics5020023 fatcat:327nosidlrarnetkfkarfedxpi

Internet of Cloud: Security and Privacy issues [article]

Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin Jones, Helge Janicke
2017 arXiv   pre-print
We thoroughly investigate current security and privacy preservation solutions that exist in this area, with an eye on the Industrial Internet of Things, discuss open issues and propose future directions  ...  In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that these systems face.  ...  [85] proposed a privacy-preserving location based services query scheme in outsourced cloud, called EPQ, for smart phone.  ... 
arXiv:1711.00525v1 fatcat:jlwxjo6jrnbzfjpelriqv6oa5m

Privacy of the Internet of Things: A Systematic Literature Review (Extended Discussion) [article]

Noura Aleisa, Karen Renaud
2016 arXiv   pre-print
The Internet of Things' potential for major privacy invasion is a concern.  ...  This paper reports on a systematic literature review of privacy-preserving solutions appearing in the research literature and in the media.  ...  ACKNOWLEDGEMENTS A shorter version of this paper will appear in the Proceedings of the Hawaii International Conference on System 7 Sciences HICSS-50: January 4-7, 2017 -Hilton Waikoloa Village.  ... 
arXiv:1611.03340v1 fatcat:xtqzh4zbivfxbpui4j536qdag4

Demystifying User Data Privacy in the World of IOT

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Internet of Things (IoT) would touch upon almost all aspects of everyday life, as a consequence of which, everything (i.e. living and non-living things) will have a counterpart virtual identities on the  ...  Thus analyzing the framework of IOT from the perspective of user data protection is a very crucial self-test which is required for IoT implementation.  ...  To provide an enhanced privacy preservation, fine grained access control is one of the preferred methods in cloud based systems.  ... 
doi:10.35940/ijitee.j9835.0881019 fatcat:6oygcxohi5fpthd7lw6i2fjwyy

SECURITY AND PRIVACY OF CYBER PHYSICAL SYSTEMS IN IOT USING CLOUD INFRASTRUCTURE

Jayashree Agarkhed
2017 International Journal of Advanced Research in Computer Science  
IoT refers to the junction of Internet technology using RFID, sensors and smart objects.  ...  The major security challenges are considered as the key issues for the consideration. They include data confidentiality, privacy and trust issues.  ...  This is the era of where the things speak instead of livings humans. This technology has been termed as Internet of Things (IoT).  ... 
doi:10.26483/ijarcs.v8i8.4841 fatcat:y6ox5m77vjhovljvqxxrbji4u4

2020 Index IEEE Internet of Things Journal Vol. 7

2020 IEEE Internet of Things Journal  
., Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT; JIoT July 2020 6550-6565 Jamalipour, A., see Murali, S., JIoT Jan. 2020 379-388 James, L.A., see Wanasinghe, T.R.,  ...  Intelligent Cooperative Edge Computing in Internet of Things. Gong, C., +, Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health.  ...  ., +, JIoT July 2020 6132-6142 HAC: Enable High Efficient Access Control for Information-Centric Internet of Things.  ... 
doi:10.1109/jiot.2020.3046055 fatcat:wpyblbhkrbcyxpnajhiz5pj74a

ARMY: architecture for a secure and privacy-aware lifecycle of smart objects in the internet of my things

Jose L. Hernandez-Ramos, Jorge Bernal Bernabe, Antonio Skarmeta
2016 IEEE Communications Magazine  
The authors propose a comprehensive architectural design to capture the main security and privacy requirements during the lifecycle of a smart object.  ...  The resulting architecture has been designed, instantiated, and implemented within the scope of different European IoT initiatives, in order to promote the design and development of secure and privacy-aware  ...  Economy and Competitiveness of Spain (including ERDF support).  ... 
doi:10.1109/mcom.2016.7565269 fatcat:q57krciawbcefd5wj6z4ahxqdm

A Comparative Study on Models and Techniques for Securing IoT Applications

Abdullah Mohammed
2019 International Journal of Computer Applications  
With digitization continuing to enter all aspects of daily life, a growing number of devices and appliances are becoming 'smart' and digitally connected.  ...  Deploying and implementing these applications necessitates a range of mechanisms and procedurals of security and privacy to ensure proper working and avoid any threats that may occur.  ...  Most of the research and the scientific research community in recent times has received great attention in the application of access control mechanisms and control of the Internet of Things and began many  ... 
doi:10.5120/ijca2019918362 fatcat:hgrcm5oqkbcozbfne3ltiynf6e

Securing Communication in the IoT- Based Power Constrained Devices in Health Care System

Sandhya K N* Sarma, Hemraj Shobharam Lamkuch, E Chandra Blessie
2021 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Health services dependent on the Internet of Things are supposed to minimise cost, enhance the user's experience and improve their quality of life.  ...  The core part of IoT constitutes sensors and various devices for diagnosis and imaging. Now-a-days sensors are becoming smaller, allowing them to be worn without interfering with daily activities..  ...  Attribute Based signature (ABS) is a very useful technique for the privacy protection of users and suitable for anonymous authentication and privacy access control .  ... 
doi:10.35940/ijitee.g9034.0510721 fatcat:lbyr6aznxfeozdsjbk4pgrupqa

Internet of things security: A top-down survey

Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Hicham Lakhlef
2018 Computer Networks  
Internet of Things (IoT) is one of the promising technologies that has attracted a lot of attention in both industrial and academic fields these years.  ...  Furthermore, some technologies related to networking and cryptocurrency fields such as Software Defined Networking (SDN) and Blockchain are revolutionizing the world of the Internet of Things thanks to  ...  fit well with distributed environments like Internet of Things, and hence the need for a new effective access control mechanism is unavoidable.  ... 
doi:10.1016/j.comnet.2018.03.012 fatcat:xbczp44t6neqxcfy74q6rsvuci

Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things

Othonas Soultatos, George Spanoudakis, Kostantinos Fysarakis, Ioannis Askoxylakis, George Alexandris, Andreas Miaoudakis, E. Nikolaos Petroulakis
2018 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)  
A popular application of ambient intelligence systems constitutes of assisting living services on smart buildings.  ...  Moreover, we provide an application example of the framework in a smart building scenario.  ...  INTRODUCTION Internet of things (IoT) applications and their enabling platforms are often vulnerable to security attacks.  ... 
doi:10.1109/camad.2018.8514937 dblp:conf/camad/SoultatosSFAAMP18 fatcat:wkndmxhgkbh5vfxatdssybirom

A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures and Challenges

Abeer Iftikhar Tahirkheli, Muhammad Shiraz, Bashir Hayat, Muhammad Idrees, Ahthasham Sajid, Rahat Ullah, Nasir Ayub, Ki-Il Kim
2021 Electronics  
To address these, there has been much work done in this domain, whereas research work considering the growing constrained applications provided by the Internet of Things (IoT) and smart city networks are  ...  Cloud Computing (CC) is a promising technology due to its pervasive features, such as online storage, high scalability, and seamless accessibility, in that it plays an important role in reduction of the  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10151811 fatcat:nqkyuoti5nd2pl5lo3hwcmu3xe

Blockchain-Enabled Internet of Medical Things to Combat COVID-19

Hong-Ning Dai, Muhammad Imran, Noman Haider
2020 IEEE Internet of Things Magazine  
Privacy Preservation of IoMT Data: Blockchain intrinsically can achieve some level of privacy preservation through hiding blockchain account addresses.  ...  (LoWPAN), LoRa, and narrowband Internet of Things (NB-IoT).  ... 
doi:10.1109/iotm.0001.2000087 fatcat:wv4uhqczcjbifmr7qol3o47s64

DIFFERENTIAL PRIVACY FOR IOT-ENABLED CRITICAL INFRASTRUCTURE: A COMPREHENSIVE SURVEY

Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, Robin Doss, Mike J. Ryan
2021 IEEE Access  
The rapid evolution of the Internet of Things (IoT) paradigm during the last decade has lead to its adoption in critical infrastructure.  ...  (SGs), Intelligent Transport Systems (ITSs), healthcare and medical systems, and Industrial Internet of Things (IIoT).  ...  Moreover, in smart buildings, the majority of sensor-based devices are connected to the internet for monitoring, controlling and optimizing the resources available.  ... 
doi:10.1109/access.2021.3124309 fatcat:vejtyjyrwffeffi7ob2o2svyja

ECA: An Edge Computing Architecture for Privacy-Preserving in IoT-based Smart City

Mehdi Gheisari, Quoc-Viet Pham, Mamoun Alazab, Xiaobo Zhang, Christian Fernandez-Campusano, Gautam Srivastava
2019 IEEE Access  
Thus, our proposed solution can be widely used for smart cities. INDEX TERMS Privacy-preserving, ontology, smart city, edge computing, Internet of Things, wireless sensor networks.  ...  At first, we propose an ontology that consists of privacy information of devices.  ...  This motivates us to develop a context-aware privacy-preserving scheme for IoT-based smart city.  ... 
doi:10.1109/access.2019.2937177 fatcat:c3k7e6fxpfdcvou4giqe6uurpm
« Previous Showing results 1 — 15 out of 8,674 results