Skip to main content

Enhanced Privacy Preservation Using Anonymization in IOT-Enabled Smart Homes

  • Conference paper
  • First Online:
Smart Intelligent Computing and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 159))

Abstract

Nowadays, Internet of Things (IOT) attracted researchers due to its smart features. Idea of IOT is to serve best to system users. Data get stored on things, locally on devices and on cloud. Security is the major issue here due to the nature of cloud computing, which opens challenges to researchers. Privacy preserving is a major issue in such things due to cloud services. In this paper, we articulate how Internet of Things works with cloud and discusses challenges of privacy issues in IOT. It also throws light on how IOT is best suited for home automation and work on its main pitfall that is security for smart things. Out paper mainly focuses on privacy preservation challenges and ways to overcome it. However, IOT eliminates person to machine interaction and makes system smart with device-to-device interaction, privacy of this interaction is still not completely guaranteed. Based on this concept, we have designed a software framework, which works in three ways as: privacy preservation, automation, and then fault reporting. Privacy would be provided using the concept of tokenization for anonymity because currently anonymity of users is not preserved by communication technologies. This software framework is evaluated by some case studies and with reference to previous researches. Results of this work surely intercalate new concept in an area of cloud security and Internet of Things, which would provide future research directions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the internet of things: a survey. Commun. Surv. Tutorials IEEE 16(1), 414–454 (2013)

    Article  Google Scholar 

  2. Zaslavsky, A., Perera, C., Georgakopoulos, D.: Sensing as a service and big data. In: International Conference on Advances in Cloud Computing (ACC-2012), Bangalore, India (2012)

    Google Scholar 

  3. Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Sensing as a service model for smart cities supported by internet of things. Trans. Emerg. Telecommun. Technol. (ETT) 25(1), 81–93 (2014)

    Article  Google Scholar 

  4. Rao, B.B.P., Saluja, P., Sharma, N., Mittal, A., Sharma, S.V.: Cloud computing for internet of things & sensing based applications. In: 2012 Sixth International Conference on Sensing Technology (ICST), pp. 374–380 (2012)

    Google Scholar 

  5. Krishnamurthy, B., Wills, C.E.: On the leakage of personally identifiable information via online social networks. In: Proceedings of the 2nd ACM Workshop on Online Social Networks, pp. 7–12, Barcelona, Spain, 17 Aug 2009

    Google Scholar 

  6. Langheinrich, M.: Privacy by design—principles of privacy-aware ubiquitous systems. In: Ubicom 2001: Ubiquitous Computing, pp. 273–291. Springer, Berlin/Heidelberg, Germany (2001)

    Chapter  Google Scholar 

  7. Nxumalo, Z.C., Tarwireyi, P., Adigun, M.O.: Towards Privacy with Tokenization as a Service. IEEE, 978-1-4799-4998-4/14 © 2014

    Google Scholar 

  8. Sundmaeker, H., Guillemin, P., Friess, P., Woelffle, S.: Vision and challenges for realising the internet of things. Cluster of European Research Projects on the Internet of Things (2010)

    Google Scholar 

  9. Golbeck, J., Mauriello, M.L.: User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns. University of Maryland, Maryland (2014)

    Google Scholar 

  10. Arabo, A., Brown, I., El-Moussa, F.: Privacy in the age of mobility and smart devices in smart homes. In: 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust, pp. 819–826 (2012)

    Google Scholar 

  11. Alcaide, A., Palomar, E., Montero-Castillo, J., Ribagorda, A.: Anonymous authentication for privacy-preserving IoT target-driven applications. Comput. Secur. 111–123 (2013)

    Article  Google Scholar 

  12. Hernández-Ramos, J.L., Bernabe, J.B., Moreno, M.V., Skarmeta, A.F.: Preserving smart objects privacy through anonymous and accountable access control for a M2M-enabled internet of things, 15611–15639 (2015). ISSN 1424-8220. www.mdpi.com/journal/sensors

  13. Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mobile Comput. 7(1), 1–18 (2008)

    Article  Google Scholar 

  14. Liu, F., Jia, Y., Han, W.: A new k-anonymity algorithm towards multiple sensitive attributes. In: IEEE 12th International Conference on Computer and Information Technology, pp. 768–772 (2012)

    Google Scholar 

  15. Zhang, J., Zhao, Y., Yang, Y., Yang, J.: A k-anonymity clustering algorithm based on the information entropy. In: Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design, pp. 319–324 (2014)

    Google Scholar 

  16. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-Diversity: Privacy Beyond k-Anonymity, pp. 1–47. ACM (2006)

    Google Scholar 

  17. Tripathy, B.K., Mitra, A.: An algorithm to achieve k-anonymity and l-diversity anonymisation in social networks. In: IEEE Fourth International Conference on Computational Aspects of Social Networks (CASoN), pp. 126–131 (2012)

    Google Scholar 

  18. Ruan, G.: K-Anonymity and Other Cluster-Based Methods, 11 Oct 2007

    Google Scholar 

  19. SHA-1 Collision Search Graz. Retrieved 30 June 2009

    Google Scholar 

  20. Kishore, N., Kapoor, B.: Attacks on and advances in secure hash algorithms. IAENG Int. J. Comput. Sci. 43(3), 326–335 (2016)

    Google Scholar 

  21. Dworkin, M.J.: SHA-3 standard: permutation-based hash and extendable-output functions. No. Federal Inf. Process. Stds. (NIST FIPS)-202 (2015)

    Google Scholar 

  22. Bagheri, N., Ghaedi, N., Sanadhya, S.K.: Differential fault analysis of SHA-3. In: International Conference in Cryptology in India. Springer, Cham (2015)

    Chapter  Google Scholar 

  23. Vijayarani, S., Janani, R.: Text mining: open source tokenization tools—an analysis. Adv. Comput. Intell. 3(1), 37–47 (2016)

    Google Scholar 

  24. Ahmad, S., Paul, S., Singh, A.P.: Tokenization based service model for cloud computing environment. In: International Conference on Inventive Computation Technologies (ICICT), vol. 3. IEEE (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shruti Patil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patil, S., Joshi, S., Patil, D. (2020). Enhanced Privacy Preservation Using Anonymization in IOT-Enabled Smart Homes. In: Satapathy, S., Bhateja, V., Mohanty, J., Udgata, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 159. Springer, Singapore. https://doi.org/10.1007/978-981-13-9282-5_42

Download citation

Publish with us

Policies and ethics