CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Privacy in IoT: Expectations, Causes of Concerns, and Reasons for Concern Mitigation

by Naushin Nower
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 25
Year of Publication: 2019
Authors: Naushin Nower
10.5120/ijca2019919718

Naushin Nower . Privacy in IoT: Expectations, Causes of Concerns, and Reasons for Concern Mitigation. International Journal of Computer Applications. 177, 25 ( Dec 2019), 37-42. DOI=10.5120/ijca2019919718

@article{ 10.5120/ijca2019919718,
author = { Naushin Nower },
title = { Privacy in IoT: Expectations, Causes of Concerns, and Reasons for Concern Mitigation },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2019 },
volume = { 177 },
number = { 25 },
month = { Dec },
year = { 2019 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number25/31055-2019919718/ },
doi = { 10.5120/ijca2019919718 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:46:54.737670+05:30
%A Naushin Nower
%T Privacy in IoT: Expectations, Causes of Concerns, and Reasons for Concern Mitigation
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 25
%P 37-42
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet of things (IoT) connects billions of devices, people and services, and exchanges data among them. Moreover, IoT has scalability (in terms of the number of devices and sensors), proximity, ubiquity (mass development) and connectedness property which easily violates an individual's privacy by collecting and using personal data. Thus, there is an urgent need for a privacy-preserving tool to ensure an individual's privacy requirements with transparency and control. To develop these tools it is important to understand people's privacy expectations, implications and requirements of IoT to understand how people feel about their privacy requirements. In this paper, a rigorous analysis is performed on existing different surveys and interviews to find out individual's privacy expectations from IoT sensors, privacy concerns and reasons for privacy concerns mitigations. The finding suggests that although privacy preferences are diverse and context-dependent, still some general factors that affect all.

References
  1. Ahmed, Ejaz, et al. "The role of big data analytics in Internet of Things." Computer Networks 129 (2017): 459-471.
  2. Ukil, Arijit, Soma Bandyopadhyay, and Arpan Pal. "IoT-privacy: To be private or not to be private." 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2014.
  3. Policy Brief: IoT Privacy for PolicyMakers, 19 September 2019, 2019 Internet Society, https://www.internetsociety.org/policybriefs/iot-privacy-for-policymakers/ last access on 11.10.19
  4. Lee, In, and Kyoochun Lee. "The Internet of Things (IoT): Applications, investments, and challenges for enterprises." Business Horizons 58.4 (2015): 431-440.
  5. Ukil, Arijit, Soma Bandyopadhyay, and Arpan Pal. "Privacy for IoT: Involuntary privacy enablement for smart energy systems." 2015 IEEE International Conference on Communications (ICC). IEEE, 2015.
  6. Osia, Seyed Ali, et al. "A hybrid deep learning architecture for privacy-preserving mobile analytics." arXiv preprint arXiv:1703.02952 (2017).
  7. Rahulamathavan, Yogachandran, et al. "Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption." 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, 2017.
  8. Perera, Charith, et al. "Big data privacy in the internet of things era." IT Professional 17.3 (2015): 32-39.
  9. Psychoula, Ismini, et al. "Users' Privacy Concerns in IoT Based Applications." 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2018.
  10. Motti, Vivian Genaro, and Kelly Caine. "Users’ privacy concerns about wearables." International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2015.
  11. Zheng, Serena, et al. "User perceptions of smart home IoT privacy." Proceedings of the ACM on Human-Computer Interaction 2.CSCW (2018): 200.
  12. Naeini, P. E., Bhagavatula, S., Habib, H., Degeling, M., Bauer, L., Cranor, L., &Sadeh, N. (2017, July). Privacy Expectations and Preferences in an IoT World. In Symposium on Usable Privacy and Security (SOUPS).
  13. Montanari, A., et al. (2017) A Study of Bluetooth Low Energy Performance for Human Proximity Detection in the Workplace. 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kona, 13-17 March 2017, 90-99.
  14. Montanari, Alessandro, et al. "Detecting Emerging Activity-Based Working Traits through Wearable Technology." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1.3 (2017): 86.
  15. Brown, Chloë, et al. "Tracking serendipitous interactions: How individual cultures shape the office." Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. ACM, 2014.
  16. Jill A. Fisher, Torin Monahan, "Tracking the social dimensions of RFID systems in hospitals." International journal of medical informatics 77.3 (2008): 176-183.
  17. Kurkovsky, Stan, EwaSyta, and Bernardo Casano. "Continuous RFID-enabled authentication: Privacy implications." IEEE Technology and Society Magazine 30.3 (2011): 34-41.
  18. Rosenbaum, Benjamin P. "Radio frequency identification (RFID) in health care: privacy and security concerns limiting adoption." Journal of medical systems 38.3 (2014): 19.
  19. Mathur, Akhil, et al. "Tiny habits in the giant enterprise: understanding the dynamics of a quantified workplace." Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing.ACM, 2015.
  20. Zeng, Eric, Shrirang Mare, and Franziska Roesner. "End User Security & Privacy Concerns with Smart Homes." Symposium on Usable Privacy and Security (SOUPS). 2017.
  21. Gorm, Nanna, and Irina Shklovski. "Sharing steps in the workplace: Changing privacy concerns over time." Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 2016.
  22. Chung, C. F., Jensen, N., Shklovski, I. A., & Munson, S. (2017, May). Finding the Right Fit: Understanding Health Tracking in Workplace Wellness Programs. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems(pp. 4875-4886). ACM.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of things Privacy Concerns