Abstract
Nowadays, Internet of Things (IOT) attracted researchers due to its smart features. Idea of IOT is to serve best to system users. Data get stored on things, locally on devices and on cloud. Security is the major issue here due to the nature of cloud computing, which opens challenges to researchers. Privacy preserving is a major issue in such things due to cloud services. In this paper, we articulate how Internet of Things works with cloud and discusses challenges of privacy issues in IOT. It also throws light on how IOT is best suited for home automation and work on its main pitfall that is security for smart things. Out paper mainly focuses on privacy preservation challenges and ways to overcome it. However, IOT eliminates person to machine interaction and makes system smart with device-to-device interaction, privacy of this interaction is still not completely guaranteed. Based on this concept, we have designed a software framework, which works in three ways as: privacy preservation, automation, and then fault reporting. Privacy would be provided using the concept of tokenization for anonymity because currently anonymity of users is not preserved by communication technologies. This software framework is evaluated by some case studies and with reference to previous researches. Results of this work surely intercalate new concept in an area of cloud security and Internet of Things, which would provide future research directions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the internet of things: a survey. Commun. Surv. Tutorials IEEE 16(1), 414–454 (2013)
Zaslavsky, A., Perera, C., Georgakopoulos, D.: Sensing as a service and big data. In: International Conference on Advances in Cloud Computing (ACC-2012), Bangalore, India (2012)
Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Sensing as a service model for smart cities supported by internet of things. Trans. Emerg. Telecommun. Technol. (ETT) 25(1), 81–93 (2014)
Rao, B.B.P., Saluja, P., Sharma, N., Mittal, A., Sharma, S.V.: Cloud computing for internet of things & sensing based applications. In: 2012 Sixth International Conference on Sensing Technology (ICST), pp. 374–380 (2012)
Krishnamurthy, B., Wills, C.E.: On the leakage of personally identifiable information via online social networks. In: Proceedings of the 2nd ACM Workshop on Online Social Networks, pp. 7–12, Barcelona, Spain, 17 Aug 2009
Langheinrich, M.: Privacy by design—principles of privacy-aware ubiquitous systems. In: Ubicom 2001: Ubiquitous Computing, pp. 273–291. Springer, Berlin/Heidelberg, Germany (2001)
Nxumalo, Z.C., Tarwireyi, P., Adigun, M.O.: Towards Privacy with Tokenization as a Service. IEEE, 978-1-4799-4998-4/14 © 2014
Sundmaeker, H., Guillemin, P., Friess, P., Woelffle, S.: Vision and challenges for realising the internet of things. Cluster of European Research Projects on the Internet of Things (2010)
Golbeck, J., Mauriello, M.L.: User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns. University of Maryland, Maryland (2014)
Arabo, A., Brown, I., El-Moussa, F.: Privacy in the age of mobility and smart devices in smart homes. In: 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust, pp. 819–826 (2012)
Alcaide, A., Palomar, E., Montero-Castillo, J., Ribagorda, A.: Anonymous authentication for privacy-preserving IoT target-driven applications. Comput. Secur. 111–123 (2013)
Hernández-Ramos, J.L., Bernabe, J.B., Moreno, M.V., Skarmeta, A.F.: Preserving smart objects privacy through anonymous and accountable access control for a M2M-enabled internet of things, 15611–15639 (2015). ISSN 1424-8220. www.mdpi.com/journal/sensors
Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mobile Comput. 7(1), 1–18 (2008)
Liu, F., Jia, Y., Han, W.: A new k-anonymity algorithm towards multiple sensitive attributes. In: IEEE 12th International Conference on Computer and Information Technology, pp. 768–772 (2012)
Zhang, J., Zhao, Y., Yang, Y., Yang, J.: A k-anonymity clustering algorithm based on the information entropy. In: Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design, pp. 319–324 (2014)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-Diversity: Privacy Beyond k-Anonymity, pp. 1–47. ACM (2006)
Tripathy, B.K., Mitra, A.: An algorithm to achieve k-anonymity and l-diversity anonymisation in social networks. In: IEEE Fourth International Conference on Computational Aspects of Social Networks (CASoN), pp. 126–131 (2012)
Ruan, G.: K-Anonymity and Other Cluster-Based Methods, 11 Oct 2007
SHA-1 Collision Search Graz. Retrieved 30 June 2009
Kishore, N., Kapoor, B.: Attacks on and advances in secure hash algorithms. IAENG Int. J. Comput. Sci. 43(3), 326–335 (2016)
Dworkin, M.J.: SHA-3 standard: permutation-based hash and extendable-output functions. No. Federal Inf. Process. Stds. (NIST FIPS)-202 (2015)
Bagheri, N., Ghaedi, N., Sanadhya, S.K.: Differential fault analysis of SHA-3. In: International Conference in Cryptology in India. Springer, Cham (2015)
Vijayarani, S., Janani, R.: Text mining: open source tokenization tools—an analysis. Adv. Comput. Intell. 3(1), 37–47 (2016)
Ahmad, S., Paul, S., Singh, A.P.: Tokenization based service model for cloud computing environment. In: International Conference on Inventive Computation Technologies (ICICT), vol. 3. IEEE (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patil, S., Joshi, S., Patil, D. (2020). Enhanced Privacy Preservation Using Anonymization in IOT-Enabled Smart Homes. In: Satapathy, S., Bhateja, V., Mohanty, J., Udgata, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 159. Springer, Singapore. https://doi.org/10.1007/978-981-13-9282-5_42
Download citation
DOI: https://doi.org/10.1007/978-981-13-9282-5_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9281-8
Online ISBN: 978-981-13-9282-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)