Anonymization Framework for IoT Resource Discovery based on Edge Centric Privacy Model

2020 International Journal of Engineering and Advanced Technology  
As the efficacy of Internet of Things is expeditiously growing, maintaining privacy with respect users and applications has become a significant aspect. Since the data is getting generated at tremendous rate that includes Sensitive data (any data considered as private by the Data-owner) which has to be hidden, especially the data collected from the Crowd-Source. Due to resource-constrained sensing devices, IoT infrastructures use Edge devices for real-time data processing. Protecting sensitive
more » ... ata from malicious activity becomes a key factor, as all the communication flows through insecure channels. To develop security infrastructures for IoT and distributed Edge networks, this article proposes a user-centric security solution. The proposed security solution shifts from a network-centric approach to a user-centric security approach by authenticating users and devices before communication is established. The method presented herein is applied to an amusement park scenario, which is modeled as a typical smart IoT network. Here, data from sensors and social networks can boost smart lighting to provide citizens with an elegant and safe environment. However, it is challenging and infeasible to transfer and process zillions bytes of data using the current cloud-device architecture due to bandwidth constraints of networks, potentially uncontrollable latency of cloud services, and privacy concerns while collecting data from IoT devices. Firstly, a standalone IoT-edge system is developed, and later, an integrated IoT-based edge-cloud system is designed to compare the systems' effectiveness. The implementation results show a close correlation between the standalone edge and dual mode edge system. However, the edge-cloud system provides more flexibility and capability to counter the sensitive data streaming and analytics services within the constrained IoT framework. In this paper we have developed a system that uses fog computing approach to perform various tasks and filters the sensitive data, thus helps in preserving privacy.
doi:10.35940/ijeat.b2109.1210220 fatcat:kl3xz6spmbeurgtm7dlvdxnojy