Skip to main content

Privacy Management in the Internet of Things (IoT)

  • Chapter
  • First Online:
Women Securing the Future with TIPPSS for IoT

Part of the book series: Women in Engineering and Science ((WES))

Abstract

When thinking about privacy management in Internet of Things (IoT) devices, these questions must be considered: What Personal Identifiable Information (PII) is being collected, used, transmitted, and stored? Do the IoT devices collect only the minimum data needed for the intended service(s) they claim to provide? Who has access to the data, and who ultimately owns the data? Are there security requirements that protect and govern the data, and do regulatory mandates ensure the privacy of the data? The security challenges of IoT are as varied as the heterogenous swath of IoT devices; however, the manufacturers and the customers of these IoT devices are the data stewards, and ultimately the keepers of the privacy of the data. Some governments have passed regulations to protect the privacy of its’ citizens’ data, but only a handful of countries have employed that measure as a solution to privacy management.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://www.dol.gov/general/ppii

  2. https://innovationatwork.ieee.org/iot-data-privacy/

  3. European Parliament and Council (2016) General Data Protection Regulation. Official Journal of the European Union, Brussels. https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX%3A32016R0679

  4. https://iot.ieee.org/newsletter/september-2016/

  5. Network World (2018) Identifying the Internet of Things – one device at a time. https://www.networkworld.com/article/3287927/internet-of-things/identifying-the-internet-of-things-one-device-at-a-time.html

  6. Oriwoh E, Al-Khateeb H, Conrad M (2015) Responsibility and non-repudiation in resource-constrained Internet of Things scenarios. https://doi.org/10.13140/RG.2.1.4030.3124

  7. NIST (National Institute of Standards and Technology), NIST Big Data Interoperability Framework: Volume 1, Definitions, Special Publication (NIST SP) - 1500-1. https://www.nist.gov/publications/nist-big-data-interoperability-framework-volume-1-definitions

  8. Gellman, “Fair Information Processing Practices,” 2012. https://www.researchgate.net/publication/279297894_Responsibility_and_Non-repudiation_in_resource-constrained_Internet_of_Things_scenarios

  9. NIST (National Institute of Standards and Technology) (2014) Privacy Engineering Objectives and Risk Model. Kantara Initiative IoT workshop

    Google Scholar 

  10. OFCOM (2015) Promoting investment and innovation in the Internet of Things. OFCOM, London

    Google Scholar 

  11. Payton T, Claypoole T (2014) Privacy in the age of big data: recognizing threats, defending your rights, and protecting your family. Rowman & Littlefield Publishers, Lanham. ProQuest Ebook Central, https://www.proquest.com/libraries/academic/

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Grace Wilson Caudill .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Wilson Caudill, G. (2019). Privacy Management in the Internet of Things (IoT). In: Hudson, F. (eds) Women Securing the Future with TIPPSS for IoT. Women in Engineering and Science. Springer, Cham. https://doi.org/10.1007/978-3-030-15705-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15705-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15704-3

  • Online ISBN: 978-3-030-15705-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics