Studi Literatur: Analisis Privasi Pada Internet of Things

Suparman Suparman(1*)

(1) 
(*) Corresponding Author

Abstract


Potensi ancaman terhadap privasi terkait dengan lingkungan Internet of Things menjadi sebuah perhatian yang harus diperhatikan dan diberikan perlindungan mengingat data atau informasi tersebut bisa disalahgunakan untuk kepentingan yang tidak dapat dipertangungjawabkan. Tulisan ini menjelaskan dan melaporkan secara sistematis tinjauan literatur mengenai teknologi dan motode yang digunakan dalam melindungi privasi serta menganalisis solusi yang digunakan. Kami menemukan sangat sedikit yang memenuhi solusi untuk melindungi privasi tersebut dan secara khusus kami menemukan sebagian besar asumsi kesadaran pengguna dalam menjaga privasi mereka, sehingga bisa menjadi topik penelitian berikutnya untuk mengetahui keterkaitan metode dalam melindungi privasi terhadap prilaku kesadaran pengguna.

Full Text:

PDF

References


I. D. Addo, S. I. Ahamed, S. S. Yau, and A. Buduru. A reference architecture for improving security and privacy in internet of things applications. In Mobile Services (MS), 2014 IEEE International Conference on, pages 108–115. IEEE, 2014.

W. Tan, K. Xu, and D. Wang. An anti-tracking source-location privacy protection protocol in wsns based on path extension. Internet of Things Journal, IEEE, 1(5):461–471, 2014.

I. Nakagawa, Y. Hashimoto, M. Goto, M. Hiji, Y. Kicuchi, M. Fukumoto, and S. Shimojo. Dht extension of m-cloud–scalable and distributed privacy preserving statistical computation on public cloud. In Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual, volume 3, pages 682–683. IEEE, 2015.

C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, and X. Shen. Cpal: A conditional privacy-preserving authentication with access linkability for roaming service. Internet of Things Journal, IEEE, 1(1):46–57, 2014.

M. Florian, S. Finster, and I. Baumgart. Privacy-preserving cooperative route planning. Internet of Things Journal, IEEE, 1(6):590–599, 2014.

H. C. Pohls, V. Angelakis, S. Suppan, K. Fischer, G. Oikonomou, E. Z. Tragos, R. Diaz Rodriguez, and T. Mouroutis. Rerum: Building a reliable iot upon privacy-and security-enabled smart objects. In Wireless Communications and Networking Conference Workshops (WCNCW), 2014 IEEE, pages 122–127. IEEE, 2014.

S. N. Premnath and Z. J. Haas. Security and privacy in the internetof-things under time-and-budget-limited adversary model. Wireless Communications Letters, IEEE, 4(3):277–280, 2015.

T. Gong, H. Huang, P. Li, K. Zhang, and H. Jiang. A medical healthcare system for privacy protection based on iot. In Parallel Architectures, Algorithms and Programming (PAAP), 2015 Seventh International Symposium on, pages 217–222. IEEE, 2015.

D. Banerjee, B. Dong, M. Taghizadeh, and S. Biswas. Privacy-preserving channel access for internet of things. Internet of Things Journal, IEEE, 1(5):430–445, 2014.

V. Sivaraman, H. H. Gharakheili, A. Vishwanath, R. Boreli, and O. Mehani. Network-level security and privacy control for smarthome iot devices. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference on, pages 163–167. IEEE, 2015

T. Bose, S. Bandyopadhyay, A. Ukil, A. Bhattacharyya, and A. Pal. Why not keep your personal data secure yet private in iot?: Our lightweight approach. In Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015 IEEE Tenth International Conference on, pages 1–6. IEEE, 2015.

K.-S. Wong and M. H. Kim. Towards self-awareness privacy protection for internet of things data collection. Journal of Applied Mathematics, 2014.

A. F. Skarmeta, J. L. Hernandez-Ramos, and M. Moreno. A decentralized approach for security and privacy challenges in the internet of things. In Internet of Things (WF-IoT), 2014 IEEE World Forum on, pages 67–72. IEEE, 2014.

X. Wang, J. Zhang, E. M. Schooler, and M. Ion. Performance evaluation of attribute-based encryption: Toward data privacy in the iot. In Communications (ICC), 2014 IEEE International Conference on, pages 725–730. IEEE, 2014.

M. Enev. Machine Learning based Attacks and Defenses in Computer Security: Towards Privacy and Utility Balance in Emerging Technology Environments. PhD thesis, University of Washington, Seattle, WA, August, 2014.

T. Bose, S. Bandyopadhyay, A. Ukil, A. Bhattacharyya, and A. Pal. Why not keep your personal data secure yet private in iot?: Our lightweight approach. In Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015 IEEE Tenth International Conference on, pages 1–6. IEEE, 2015.

A. Samani, H. H. Ghenniwa, and A. Wahaishi. Privacy in internet of things: A model and protection framework. Procedia Computer Science, 52:606–613, 2015.

A. Huertas Celdran, G. Clemente, J. Felix, M. Gil Perez, and G. Martinez Perez. Secoman: A semantic-aware policy framework for developing privacy-preserving and context-aware smart applications. IEEE Systems Journal, 99:1–14, 2013.

V. Sivaraman, H. H. Gharakheili, A. Vishwanath, R. Boreli, and O. Mehani. Network-level security and privacy control for smarthome iot devices. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference on, pages 163–167. IEEE, 2015.

Y. Yao, L. T. Yang, and N. N. Xiong. Anonymity-based privacypreserving data reporting for participatory sensing. IEEE Internet of Things Journal, 2(5):381–390, 2015.

A. Ukil, S. Bandyopadhyay, and A. Pal. Sensitivity inspector: Detecting privacy in smart energy applications. In Computers and Communication (ISCC), 2014 IEEE Symposium on, pages 1–6. IEEE, 2014.

A. Ukil, S. Bandyopadhyay, and A. Pal. Privacy for iot: Involuntary privacy enablement for smart energy systems. In Communications (ICC), 2015 IEEE International Conference on, pages 536–541. IEEE, 2015.

A. Ukil, S. Bandyopadhyay, and A. Pal. Iot-privacy: To be private or not to be private. In Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on, pages 123–124. IEEE, 2014.

C. Kang, F. Abbas, and H. Oh. Protection scheme for iot devices using introspection. In Network of the Future (NOF), 2015 6th International Conference on the, pages 1–5. IEEE, 2015.

Y. Liu, X. Gong, and C. Xing. A novel trust-based secure data aggregation for internet of things. In Computer Science & Education (ICCSE), 2014 9th International Conference on, pages 435–439. IEEE, 2014.

A. Arabo. Privacy-aware iot cloud survivability for future connected home ecosystem. In Computer Systems and Applications (AICCSA), 2014 IEEE/ACS 11th International Conference on, pages 803–809. IEEE, 2014.

Romi Satria Wahono. A Systematic Literature Review of Software Defect Prediction: Research Trends, Datasets, Methods and Frameworks, Journal of Software Engineering, Vol. 1, No. 1, 2015.

J. H. Ziegeldorf, O. G. Morchon, and K. Wehrle. Privacy in the internet of things: threats and challenges. Security and Communication Networks, 7(12):2728–2742, 2014.


Refbacks

  • There are currently no refbacks.