Efficient and privacy-preserving access to sensor data for Internet of Things (IoT) based services

Author(s):  
Paramasiven Appavoo ◽  
Mun Choon Chan ◽  
Anand Bhojan ◽  
Ee-Chien Chang
Author(s):  
Lamya Alkhariji ◽  
Nada Alhirabi ◽  
Mansour Naser Alraja ◽  
Mahmoud Barhamgi ◽  
Omer Rana ◽  
...  

Privacy by Design (PbD) is the most common approach followed by software developers who aim to reduce risks within their application designs, yet it remains commonplace for developers to retain little conceptual understanding of what is meant by privacy. A vision is to develop an intelligent privacy assistant to whom developers can easily ask questions to learn how to incorporate different privacy-preserving ideas into their IoT application designs. This article lays the foundations toward developing such a privacy assistant by synthesising existing PbD knowledge to elicit requirements. It is believed that such a privacy assistant should not just prescribe a list of privacy-preserving ideas that developers should incorporate into their design. Instead, it should explain how each prescribed idea helps to protect privacy in a given application design context—this approach is defined as “Explainable Privacy.” A total of 74 privacy patterns were analysed and reviewed using ten different PbD schemes to understand how each privacy pattern is built and how each helps to ensure privacy. Due to page limitations, we have presented a detailed analysis in Reference [3]. In addition, different real-world Internet of Things (IoT) use-cases, including a healthcare application, were used to demonstrate how each privacy pattern could be applied to a given application design. By doing so, several knowledge engineering requirements were identified that need to be considered when developing a privacy assistant. It was also found that, when compared to other IoT application domains, privacy patterns can significantly benefit healthcare applications. In conclusion, this article identifies the research challenges that must be addressed if one wishes to construct an intelligent privacy assistant that can truly augment software developers’ capabilities at the design phase.


2016 ◽  
Vol 2016 ◽  
pp. 1-17 ◽  
Author(s):  
Mihui Kim ◽  
Mihir Asthana ◽  
Siddhartha Bhargava ◽  
Kartik Krishnan Iyyer ◽  
Rohan Tangadpalliwar ◽  
...  

The increasing number of Internet of Things (IoT) devices with various sensors has resulted in a focus on Cloud-based sensing-as-a-service (CSaaS) as a new value-added service, for example, providing temperature-sensing data via a cloud computing system. However, the industry encounters various challenges in the dynamic provisioning of on-demand CSaaS on diverse sensor networks. We require a system that will provide users with standardized access to various sensor networks and a level of abstraction that hides the underlying complexity. In this study, we aim to develop a cloud-based solution to address the challenges mentioned earlier. Our solution, SenseCloud, includes asensor virtualizationmechanism that interfaces with diverse sensor networks, amultitenancymechanism that grants multiple users access to virtualized sensor networks while sharing the same underlying infrastructure, and adynamic provisioningmechanism to allow the users to leverage the vast pool of resources on demand and on a pay-per-use basis. We implement a prototype of SenseCloud by using real sensors and verify the feasibility of our system and its performance. SenseCloud bridges the gap between sensor providers and sensor data consumers who wish to utilize sensor data.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Xiang Yu ◽  
Chun Shan ◽  
Jilong Bian ◽  
Xianfei Yang ◽  
Ying Chen ◽  
...  

With the rapid development of Internet of Things (IoT), massive sensor data are being generated by the sensors deployed everywhere at an unprecedented rate. As the number of Internet of Things devices is estimated to grow to 25 billion by 2021, when facing the explicit or implicit anomalies in the real-time sensor data collected from Internet of Things devices, it is necessary to develop an effective and efficient anomaly detection method for IoT devices. Recent advances in the edge computing have significant impacts on the solution of anomaly detection in IoT. In this study, an adaptive graph updating model is first presented, based on which a novel anomaly detection method for edge computing environment is then proposed. At the cloud center, the unknown patterns are classified by a deep leaning model, based on the classification results, the feature graphs are updated periodically, and the classification results are constantly transmitted to each edge node where a cache is employed to keep the newly emerging anomalies or normal patterns temporarily until the edge node receives a newly updated feature graph. Finally, a series of comparison experiments are conducted to demonstrate the effectiveness of the proposed anomaly detection method for edge computing. And the results show that the proposed method can detect the anomalies in the real-time sensor data efficiently and accurately. More than that, the proposed method performs well when there exist newly emerging patterns, no matter they are anomalous or normal.


Author(s):  
Omar Subhi Aldabbas

Internet of Things (IoT) is a ubiquitous embedded ecosystem known for its capability to perform common application functions through coordinating resources, which are distributed on-object or on-network domains. As new applications evolve, the challenge is in the analysis and usage of multimodal data streamed by diverse kinds of sensors. This paper presents a new service-centric approach for data collection and retrieval. This approach considers objects as highly decentralized, composite and cost effective services. Such services can be constructed from objects located within close geographical proximity to retrieve spatio-temporal events from the gathered sensor data. To achieve this, we advocate Coordination languages and models to fuse multimodal, heterogeneous services through interfacing with every service to achieve the network objective according to the data they gather and analyze. In this paper we give an application scenario that illustrates the implementation of the coordination models to provision successful collaboration among IoT objects to retrieve information. The proposed solution reduced the communication delay before service composition by up to 43% and improved the target detection accuracy by up to 70%, while maintaining energy consumption 20% lower than its best rivals in the literature.


For exchanging messages over opportunistic exchanges in cloud calculating-empowered Internet of Things (IoT), opportunistic Cloud of Things (CoT) is encouraging for customers by means of an emergent conveying policy. In recent times, for predicting upcoming interactions by the determination of enlightening message promoting effectiveness as well as system quantity, several informally-awake structures have been placed onward, influencing consumers’ communal features as well as interaction account. Nevertheless, in the extrapolation procedure as well as communication phase of unprincipled CoT distinct secrecy remains commonly ignored. Towards assuring distinct secrecy as well as improving communication effectiveness, in this broadsheet, we develop a secrecy preservative communication promoting context aimed at unprincipled CoT. For improving transmission effectiveness of incurable customers, we mainly assemble twofold-level design of a cloud server. The proposed method can efficiently safeguard distinct secrecy through incorporating a safety-centered flexibility extrapolation procedure using an overpowering assessment procedure. This paper also introduces data key caching to reduce the latency during the transmission process. The proposed method outperforms the conventional methods.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Dazhi Jiang ◽  
Zhihui He ◽  
Yingqing Lin ◽  
Yifei Chen ◽  
Linyan Xu

As network supporting devices and sensors in the Internet of Things are leaping forward, countless real-world data will be generated for human intelligent applications. Speech sensor networks, an important part of the Internet of Things, have numerous application needs. Indeed, the sensor data can further help intelligent applications to provide higher quality services, whereas this data may involve considerable noise data. Accordingly, speech signal processing method should be urgently implemented to acquire low-noise and effective speech data. Blind source separation and enhancement technique refer to one of the representative methods. However, in the unsupervised complex environment, in the only presence of a single-channel signal, many technical challenges are imposed on achieving single-channel and multiperson mixed speech separation. For this reason, this study develops an unsupervised speech separation method CNMF+JADE, i.e., a hybrid method combined with Convolutional Non-Negative Matrix Factorization and Joint Approximative Diagonalization of Eigenmatrix. Moreover, an adaptive wavelet transform-based speech enhancement technique is proposed, capable of adaptively and effectively enhancing the separated speech signal. The proposed method is aimed at yielding a general and efficient speech processing algorithm for the data acquired by speech sensors. As revealed from the experimental results, in the TIMIT speech sources, the proposed method can effectively extract the target speaker from the mixed speech with a tiny training sample. The algorithm is highly general and robust, capable of technically supporting the processing of speech signal acquired by most speech sensors.


Sign in / Sign up

Export Citation Format

Share Document