Loading

Demystifying User Data Privacy in the World of IOT
Shruti Patil1, Shashank Joshi2

1Shruti Patil, Ph.D. research scholar, Bharati Vidyapeeth Deemed University, College of Engineering, (Assistant Professor, Symbiosis Institute of Technology, Symbiosis International (Deemed University)), Pune, India.
2Dr.Shashank Joshi, Professor, Bharati Vidyapeeth Deemed University College of Engineering,Pune India

Manuscript received on 16 August 2019 | Revised Manuscript received on 20 August 2019 | Manuscript published on 30 August 2019 | PP: 4412-4418 | Volume-8 Issue-10, August 2019 | Retrieval Number: J98350881019/2019©BEIESP | DOI: 10.35940/ijitee.J9835.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet of Things (IoT) would touch upon almost all aspects of everyday life, as a consequence of which, everything (i.e. living and non-living things) will have a counterpart virtual identities on the internet which would be readable, addressable and locatable. Although it would empower its users with 24×7 connectivity around the global world, unknowingly they would also provide it permission to peep into user’s personal world, which can generate a huge risk on the usability of IoT by users. Thus analyzing the framework of IOT from the perspective of user data protection is a very crucial self-test which is required for IoT implementation. Often the term security and privacy are used interchangeably, but in the IoT environment, both these concept would play a crucial but differentiating role. In this paper, we have scanned the IoT environment with the perspective of privacy requirements, possible threats and the mitigating solutions which are currently in use.
Keywords: Data Privacy, Anonymization, Differential Privacy, Security, Access Control.

Scope of the Article: Security, Trust and Privacy