Privacy Protection in the Internet of Things Based on Cryptography

2015 ◽  
Vol 713-715 ◽  
pp. 2462-2466
Author(s):  
Xiu Rong Li ◽  
Shuang Zheng ◽  
Ya Li Liu

In this paper, we describe some privacy threats in the Internet of Things and some research works on privacy protection. We present a new scheme base on cryptosystem to protect privacy in the Internet of Things. The scheme includes location privacy protection, data privacy homomorphism mechanism and information hiding technology, and secure multi-party computation on data privacy.

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Lei Zhang ◽  
Yu Huo ◽  
Qiang Ge ◽  
Yuxiang Ma ◽  
Qiqi Liu ◽  
...  

Various applications of the Internet of Things assisted by deep learning such as autonomous driving and smart furniture have gradually penetrated people’s social life. These applications not only provide people with great convenience but also promote the progress and development of society. However, how to ensure that the important personal privacy information in the big data of the Internet of Things will not be leaked when it is stored and shared on the cloud is a challenging issue. The main challenges include (1) the changes in access rights caused by the flow of manufacturers or company personnel while sharing and (2) the lack of limitation on time and frequency. We propose a data privacy protection scheme based on time and decryption frequency limitation that can be applied in the Internet of Things. Legitimate users can obtain the original data, while users without a homomorphic encryption key can perform operation training on the homomorphic ciphertext. On the one hand, this scheme does not affect the training of the neural network model, on the other hand, it improves the confidentiality of data. Besides that, this scheme introduces a secure two-party agreement to improve security while generating keys. While revoking, each attribute is specified for the validity period in advance. Once the validity period expires, the attribute will be revoked. By using storage lists and setting tokens to limit the number of user accesses, it effectively solves the problem of data leakage that may be caused by multiple accesses in a long time. The theoretical analysis demonstrates that the proposed scheme can not only ensure safety but also improve efficiency.


Author(s):  
Paul Fremantle ◽  
Philip Scott

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area.


2017 ◽  
Author(s):  
Paul Fremantle ◽  
Philip Scott

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area.


Author(s):  
Jarogniew Rykowski ◽  
Wojciech Cellary

In this Chapter a new way of payments for Internet of Things services is proposed, based on a stream of anonymous pico-payments realized by means of pico-coins. System architecture and information flow are presented, showing fully automated way of contextual payments which protect customers' privacy. With the proposed stream of pico-payments, two basic problems of efficient and widely acceptable payment method for the Internet of Things are solved: privacy protection, and toleration of frequent unexpected disconnections.


2020 ◽  
Vol 17 (5) ◽  
pp. 2388-2395
Author(s):  
M. Vivek Anand ◽  
S. Vijayalakshmi

IoT is changing the way for a world, where many of our daily objects will be connected with each other and will interact with their environment in order to collect information and automate certain tasks. IoT requires seamless authentication, data privacy, security, robustness against attacks, easy deployment, and self-maintenance. Protecting data in the internet of things is essential for making the IoT environment secure. In order to secure the data on the internet of things, the blockchain will provide distributed peer to peer networks. Blockchain-based internet of things is making a secure environment in the IoT environment. Data are stored in the form of images in IoT devices that are captured in various locations in the IoT environment for processing. Images are stored as data in the blockchain and it acts as a transaction. This paper expresses the environment of blockchain-based internet of things with image validation. This paper will explain this domain with an example of a criminal’s image identification with image processing techniques to provide better service to the cyber intelligence agency to find criminals easily. The identification of criminals is done by comparing the images of the criminals’ identification.


Sign in / Sign up

Export Citation Format

Share Document