Data Protection and Privacy Preservation in the Internet of Things
Recently, the concept of the Internet as a set of connected computer devices is changed to a set of connected surrounding things of human’s living space, such as home appliances, machines, transportation, business storage, and goods etc. The number of things in the living space is larger than the number of world population. Research is going on how to make these things to communicate with each other like computer devices communicate through Internet. The communication among these things is referred to as Internet of Things (IoT). Internet of Things helps us seamlessly gather and use information about objects of the real world during their entire lifecycle. The data collection, handling, and mining are accomplished in the IoT systems in completely different form what we know. Protection of user data privacy in the world of Internet of Things is a major challenge. Collaborative activities take place among un-trusted or semi-trusted parties that have never met each other before and therefore the need to protect their privacy. In this work, we explore the concerns of privacy of data as applied to the IoT domain. We would review the existing approaches/solutions for privacy preservation in IoT and discuss our proposed approach.
Outline including a short summary of every section:
- Overview of IoT Technology
- Data privacy challenges in IoT
- Privacy Protection in the Internet of Things: existing approaches
- Privacy by Design
- Privacy enhancing technologies:- data anonymization, aggregation, transformation, differencial privacy, cryptographic computations
- Future directions in IoT privacy
- IoT data is big data
It means that the information provider is only able to infer by observing the use of the system related to each system client (at least, inference should be very hard to conduct). The data collection, handling, and mining are accomplished in the IoT systems in completely different form that we know.
Specific goals and objectives
The goals of the proposed tutorial would be to highlight the challenges which Internet of Things faces as an emerging and ubiquitous environment. The scope of the content, which the speaker proposes to cover would be technical in nature. The specific goal would be to address the core issues of providing security to the IoT environment from the perspective of data protection and privacy. All the security related concerns in this area would be dealt with.
Dr G Geethakumari is a faculty with the Dept. of Computer Science and Information Systems at BITS Pilani, Hyderabad Campus. Before joining BITS, she worked as a faculty in the CSE Dept. at the National Institute of Technology, Warangal. Dr Geetha received her Ph.D. from University of Hyderabad. Her Ph.D. thesis was titled “Grid Computing Security through Access Control Modelling”. Dr. Geetha has many international publications to her credit. Her present areas of research interests include: information security, cloud computing - cloud security challenges and data protection and privacy challenges in the Internet of Things.
Dr Geetha has been in the forefront of technical activities at BITS-Pilani, Hyderabad Campus. She has been the Faculty Advisor for Computer Science Association during 2008-2011. Presently she is the IEEE Student Branch Counselor, BITS-Pilani, Hyderabad Campus. She is also the Coordinator for the Linux User Group, BITS Pilani, Hyderabad Campus. Dr. Geetha is a Member, IEEE as well as Member, IEEE Computer Society. She is also a Professional Member, ACM. She was the Organizing Committee Member for the IEEE INDICON Conference conducted in BITS Pilani, Hyderabad Campus during December 16 - 18, 2011. Dr Geetha was the Publicity Co-Chair for the IEEE Prime Asia Conference hosted by BITS Pilani, Hyderabad Campus during December 5-7, 2012. She was the Organizing Committee Member for the Workshop on Advances in Image Processing and Applications held in BITS Pilani, Hyderabad Campus during October 26 - 27, 2013.
Dr Geetha has given many guest lectures on topics in emerging areas such as cyber security, cloud computing and cloud security. She has been a member of the Technical Program Committees of various IEEE International Conferences. An extract from the paper 'A taxonomy for modelling and analysis of diffusion of (mis)information in social networks', co-authored by Dr Geetha and published in the International Journal of Communication Networks and Distributed Systems, Vol. 13, No. 2, 2014, pp.119-143, by Inderscience Publishers, was selected for a press release on 'Semantic attacks in online social media'.