Affiliation:
1. School of Engineering, Computer & Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand
2. College of Science and Engineering, Flinders University, Adelaide, Australia
Abstract
Despite the rapid growth and advancement in the
Internet of Things (IoT
), there are critical challenges that need to be addressed before the full adoption of the IoT. Data privacy is one of the hurdles towards the adoption of IoT as there might be potential misuse of users’ data and their identity in IoT applications. Several researchers have proposed different approaches to reduce privacy risks. However, most of the existing solutions still suffer from various drawbacks, such as huge bandwidth utilization and network latency, heavyweight cryptosystems, and policies that are applied on sensor devices and in the cloud. To address these issues, fog computing has been introduced for IoT network edges providing low latency, computation, and storage services. In this survey, we comprehensively review and classify privacy requirements for an in-depth understanding of privacy implications in IoT applications. Based on the classification, we highlight ongoing research efforts and limitations of the existing privacy-preservation techniques and map the existing IoT schemes with Fog-enabled IoT schemes to elaborate on the benefits and improvements that Fog-enabled IoT can bring to preserve data privacy in IoT applications. Lastly, we enumerate key research challenges and point out future research directions.
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Reference222 articles.
1. A survey on security and privacy issues in Internet-of-Things;Yang Y.;IEEE Internet of Things Journal,2017
2. Connected IoT Devices Forecast. Help Net Security 2019 [cited 2019; 41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025]. Available from https://www.helpnetsecurity.com/2019/06/21/connected-iot-devices-forecast/.
3. Classification of optimization problems in Fog computing;Bellendorf J.;Future Generation Computer Systems,2020
4. Fog computing and its role in the Internet of Things;Bonomi F.;Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing,2012
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ConPrEF: A Context-based Privacy Enforcement Framework for Edge Computing;2023 IEEE International Conference on Edge Computing and Communications (EDGE);2023-07
2. Secure Deduplication with Dynamic Key Management in Fog Enabled Internet of Things;2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC);2023-06
3. Impact of Using a Privacy Model on Smart Buildings Data for CO$$_2$$ Prediction;Data and Applications Security and Privacy XXXVII;2023