Li, Chao, and Balaji Palanisamy. “Privacy in Internet of Things: from Principles to Technologies.” IEEE Internet of Things Journal (2018).

A. Problem Statement

The paper targets the problem of privacy in the Internet of Things (IoT) from a technical and a legal standpoint. Particularly, how does privacy technology work at each IoT layer?

B. Problem Significance

Nowadays, all sensitive data are everywhere like connected cars and smart health application where store huge amount information about us. Not just the data from these objects, there is a problem the web traffic, metadata, between the objects in your home and the cloud services that are behind can tell your lifestyle. Most people are not happy that their privacy has been leaked, or they are worried about what their data will be used for. Nowadays, all sensitive data are everywhere like connected cars and smart health application where store huge amount information about us. Not just the data from these objects, there is a problem the web traffic, metadata, between the objects in your home and the cloud services that are behind can tell your lifestyle. Most people are not happy that their privacy has been leaked, or they are worried about what their data will be used for.

C. State of the Art

IoT was originally referred to as “embedded internet”. RFID, sensors, and actuators are embedded in physical objects which can talk to the Internet. Privacy enhancing technologies (PETs) help people prevent information from being leaked, or know more about what their information is being used for. Privacy by Design (PbD) means that put PETs directly into the design of software and system.
k-anonymous and differential privacy are introduced here when dealing with data in the perception layer. For K individuals, first, remove his identity attribute. For other attributes, see whether the attribute classification below it is greater than K. If it is greater than K, modify it. If not, just leave it. Differential privacy is the integration of individual analysis into a trend or a large population study. We can use Epsilon to process the data, adding Gaussian noise, which in my understanding is like an image plus a Gaussian blur effect.
Encryption still uses AES, RSA and SHA-2, which are well known to everyone.

Differential privacy和k-anonymous 的定义还没有能比较通俗易懂的说明白,欢迎大家评论赐教!

D. Contributions

This paper is very comprehensive about PETs, from historical development to definition as well as traditional technologies and state-of-the-art. In particular, how the various layers of IoT work and what they do to meet the privacy requirements. Their analysis has shown differential privacy and Tor demonstrate a great potential for use in the IoT.
And IoT architecture can be divided into 4 layers and PbD has 8 strategies. Each layer is responsible for implementing different strategies, as is shown in Table I.

TABLE I
IOT LAYERED ARCHITECTURE AND THE CORRESPONDING STRATEGIES*
IoT Layered Architecture Strategies
Perception Layer Minimize, Aggregate, Hide, Separate
Networking Layer Hide and Minimize
Middleware Layer Inform, Control, Demonstrate, Enforce
Application Layer

The paper compares k-anonymity and differential privacy with IoT specific 8 challenges in perception layer, differential privacy is a winner because of composability feature to reduce information and increase the granularity. However, for healthy devices that require accurate data, differential privacy will not work well. And the encryption of the perception layer should take into account the capacity of IoT devices. Some traditional algorithms cannot meet the requirements because of high-cost. Attribute-Based Encryption (ABE) still has its own problems with key distribution, and in the future, this aspect can comply with the design requirements of NIST.

8大策略和8大挑战请看原文

In the networking layer, the communication secured by IPsec or TLS in the transport layer can only hide the content of messages. It is still good for us to use anonymization in the layer. And Virtual Private Network (VPN) and the onion router (Tor) can help with it. The Tor design is wonderful that each node only knows the IP of its predecessor and successor. But still, need to work out voice over the internet because Tor does not support UDP.
In the middleware layer, interaction-enhancing PETs fulfilling Inform and Control strategies. As for Inform strategy, I think it is important to let people know clearly privacy policies. For Control strategy, I agree that we should focus on designing a centralized platform. A Trusted Third Party (TTP) play an important role in compliance-enhancing. TTP can distribute keys, check whether the policy preference sticks with data or not.
It talks about the risks faced by the application layer and the issues to be aware of when designing an app.

E. Remaining Questions

k-anonymous is not a good way to high-dimensional data sets, but differential privacy is only usable for large datasets because of the injected noise. What method will we use in a medium data set? Are we mixing the two technologies in the perception layer? Or still use different methods depending on
the purpose, such as general-use for differential privacy, personal data analysis still uses k-anonymous?

读书笔记(七)--IoT Security相关推荐

  1. 3D游戏设计读书笔记七

    3D游戏设计读书笔记七 智能巡逻兵 提交要求: 游戏设计要求: 创建一个地图和若干巡逻兵(使用动画): 每个巡逻兵走一个3~5个边的凸多边型,位置数据是相对地址.即每次确定下一个目标位置,用自己当前位 ...

  2. 《算法导论》读书笔记(七)

    <算法导论>读书笔记之第16章 贪心算法-活动选择问题 前言:贪心算法也是用来解决最优化问题,将一个问题分成子问题,在现在子问题最优解的时,选择当前看起来是最优的解,期望通过所做的局部最优 ...

  3. PHP程序设计读书笔记七

    一.比较字符串: 1."=="和"==="的区别: "=="在比较之前会先把非字符串类型的操作数转换成字符串,所以"3" ...

  4. 《深入理解计算机系统》读书笔记七:浮点数表示

    浮点数存储规则 根据国际标准IEEE(电气和电子工程协会)规定,任何一个浮点数NUM的二进制数可以写为:  NUM = (-1)^S*M*2^E;//(S表示符号,E表示阶乘,M表示有效数字)  ①当 ...

  5. 《深入理解Java虚拟机》读书笔记七

    第八章 虚拟机字节码执行引擎 1.运行时栈帧结构 概述: 栈帧是用于支持虚拟机进行方法调用的和方法执行的数据结构,他是虚拟机运行时数据区中的虚拟机栈的栈元素,栈帧存储了方法的局部变量,操作数栈,动态连 ...

  6. Effective Java读书笔记七:泛型(部分章节需要重读)

    第23条:请不要在新代码中使用原生态类型 从java1.5发行版本开始,Java就提供了一种安全的替代方法,称作无限制的通配符类型,如果要使用范型,但是确定或者不关心实际的参数类型,就可以用一个问号代 ...

  7. 《Go语言程序设计》读书笔记(七) 包

    Go语言有超过100个的标准包(可以用 go list std|wc-l命令查看标准包的具体数目),标准库为大多数的程序提供了必要的基础构件.在Go的社区,有很多成熟的包被设计.共享.重用和改进,目前 ...

  8. 《Go 语言程序设计》读书笔记 (七) Goroutine 与系统线程的区别

    goroutine和线程的区别 动态栈 每一个OS线程都有一个固定大小的内存块(一般会是2MB)来做栈,这个栈会用来存储当前正在被调用或挂起(指在调用其它函数时)的函数的内部变量.这个固定大小的栈同时 ...

  9. Head First设计模式读书笔记七 第八章 模板方法模式

    本文示例代码材料源自Head First设计模式 以前整理自己整理的链接: https://blog.csdn.net/u011109881/article/details/60594985 简介 模 ...

  10. Programming Ruby 读书笔记(七)

    关于赋值 1.ruby中可以使用链接赋值语句,示例如下: a = b = 1 + 2 + 3        #a = b = 6 a = (b = 1 + 2) + 3     #a = 6; b = ...

最新文章

  1. 开局一段扯,数据全靠编?真被一篇“神论文”气到了
  2. 奶茶妹妹亏本甩卖悉尼豪宅 当年与刘强东澳洲办盛大婚礼
  3. 前端学习(2514):实战
  4. 【HihoCoder - 1502】最大子矩阵(二维前缀和,尺取)
  5. UVA 11733 Airports
  6. 是什么让你萌发了跳槽的念头?
  7. 安装you-get和ffmpeg for Mac
  8. @Autowired与@Resource用法
  9. 7--CAD矩形与正多边形
  10. 图解图库JanusGraph系列-一文知晓“图数据“底层存储结构(JanusGraph data model)
  11. 清华差生10年奋斗经历:各种反省各种彻悟
  12. python 屏幕找图 点击,使用Python脚本在windows屏幕找图
  13. python求级数的值_如何在Numpy中计算Fourier级数?
  14. 一到冬天就手脚冰凉是怎么回事?宝宝手脚冰凉怎么办?
  15. Ubuntu20.04的主题美化
  16. ku115上实现adc12dj3200 配置,jesd204b接口,单通道采集模式
  17. EasyGBS摄像机网页直播之问题解决:海康设备通过TCP接入到EasyGBS, 设备不推流问题解析
  18. 商城退换货快递下单上门取件API物流查询接口接入技术文档
  19. 更改Itunes备份路径-最简便方法(win7)
  20. 网桥的端口上直连的计算机,无线网桥怎么跟很电脑连接调试呢

热门文章

  1. linux双屏原理,Linux下双屏显示设置
  2. linux 多显卡 多显示器,Ubuntu 14.04安装AMD显卡驱动双屏显示器完全解决方案
  3. 计算机专业考注册测绘师经验,测绘工程专业就业前景怎么样,武汉大学学子告诉你...
  4. CSS第三级选择器 Selectors Level 3 文档翻译
  5. 实现Google测试框架及输出彩色的文字
  6. 软件项目管理——谈谈软件定价
  7. .jar和sources.jar及javadoc.jar三者的关系
  8. 小米净水器更换滤芯步骤和水龙头亮黄灯的解决办法
  9. linux 详解邮件服务器
  10. RobotFramework操作xlsx表格