Cargando…
Device-Based Security to Improve User Privacy in the Internet of Things †
The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several bene...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6111884/ https://www.ncbi.nlm.nih.gov/pubmed/30110880 http://dx.doi.org/10.3390/s18082664 |
_version_ | 1783350754472361984 |
---|---|
author | Belem Pacheco, Luis Alberto Pelinson Alchieri, Eduardo Adilio Mendez Barreto, Priscila América Solís |
author_facet | Belem Pacheco, Luis Alberto Pelinson Alchieri, Eduardo Adilio Mendez Barreto, Priscila América Solís |
author_sort | Belem Pacheco, Luis Alberto |
collection | PubMed |
description | The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security. |
format | Online Article Text |
id | pubmed-6111884 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-61118842018-08-30 Device-Based Security to Improve User Privacy in the Internet of Things † Belem Pacheco, Luis Alberto Pelinson Alchieri, Eduardo Adilio Mendez Barreto, Priscila América Solís Sensors (Basel) Article The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security. MDPI 2018-08-14 /pmc/articles/PMC6111884/ /pubmed/30110880 http://dx.doi.org/10.3390/s18082664 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Belem Pacheco, Luis Alberto Pelinson Alchieri, Eduardo Adilio Mendez Barreto, Priscila América Solís Device-Based Security to Improve User Privacy in the Internet of Things † |
title | Device-Based Security to Improve User Privacy in the Internet of Things † |
title_full | Device-Based Security to Improve User Privacy in the Internet of Things † |
title_fullStr | Device-Based Security to Improve User Privacy in the Internet of Things † |
title_full_unstemmed | Device-Based Security to Improve User Privacy in the Internet of Things † |
title_short | Device-Based Security to Improve User Privacy in the Internet of Things † |
title_sort | device-based security to improve user privacy in the internet of things † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6111884/ https://www.ncbi.nlm.nih.gov/pubmed/30110880 http://dx.doi.org/10.3390/s18082664 |
work_keys_str_mv | AT belempachecoluisalberto devicebasedsecuritytoimproveuserprivacyintheinternetofthings AT pelinsonalchierieduardoadilio devicebasedsecuritytoimproveuserprivacyintheinternetofthings AT mendezbarretopriscilaamericasolis devicebasedsecuritytoimproveuserprivacyintheinternetofthings |