Anonymization Framework for IoT Resource Discovery based on Edge Centric Privacy Model
- 1. Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bangalore, India 560-001.
- 2. Cloud Computing and Distributed Systems (CLOUDS) Lab, School of Computing and Information Systems, The University of Melbourne, Melbourne, Victoria, Australia - VIC 3053.
- 3. Bangalore University, Bangalore, India 560-001.
- 4. Department of Computer Science and Engineering, Florida International University, Miami, Florida USA 33199.
- 5. Consciousness Studies Program, National Institute of Advanced Studies, Indian Institute of Science, Bangalore, India 560-012.
Contributors
- 1. Publisher
Description
As the efficacy of Internet of Things is expeditiously growing, maintaining privacy with respect users and applications has become a significant aspect. Since the data is getting generated at tremendous rate that includes Sensitive data (any data considered as private by the Data-owner) which has to be hidden, especially the data collected from the Crowd-Source. Due to resource-constrained sensing devices, IoT infrastructures use Edge devices for real-time data processing. Protecting sensitive data from malicious activity becomes a key factor, as all the communication flows through insecure channels. To develop security infrastructures for IoT and distributed Edge networks, this article proposes a user-centric security solution. The proposed security solution shifts from a network-centric approach to a user-centric security approach by authenticating users and devices before communication is established. The method presented herein is applied to an amusement park scenario, which is modeled as a typical smart IoT network. Here, data from sensors and social networks can boost smart lighting to provide citizens with an elegant and safe environment. However, it is challenging and infeasible to transfer and process zillions bytes of data using the current cloud-device architecture due to bandwidth constraints of networks, potentially uncontrollable latency of cloud services, and privacy concerns while collecting data from IoT devices. Firstly, a standalone IoT-edge system is developed, and later, an integrated IoT-based edge-cloud system is designed to compare the systems’ effectiveness. The implementation results show a close correlation between the standalone edge and dual mode edge system. However, the edge-cloud system provides more flexibility and capability to counter the sensitive data streaming and analytics services within the constrained IoT framework. In this paper we have developed a system that uses fog computing approach to perform various tasks and filters the sensitive data, thus helps in preserving privacy.
Files
B21091210220.pdf
Files
(1.3 MB)
Name | Size | Download all |
---|---|---|
md5:67a4f531c42f9b7fe9f5a6959f83c612
|
1.3 MB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 2249-8958 (ISSN)
Subjects
- ISSN
- 2249-8958
- Retrieval Number
- 100.1/ijeat.B21091210220