Skip to main content
Top

2020 | OriginalPaper | Chapter

A Framework for Privacy Policy Compliance in the Internet of Things

Author : Constantinos Ioannou

Published in: Research Challenges in Information Science

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet of Things (IoT) structures are pervasive, incredibly complex, heterogeneous, based on various architectures and infrastructure. IoT exposes users to a number of different privacy threats that are related to leakage of personal information and loss of service. User privacy is the most important aspect of IoT environments as user’s data are transmitted among connected devices without user’s intervention. Therefore, the challenges that IoT privacy and security analysts are facing is relating to having difficulties to analyse and design such complex, heterogeneous systems by guaranteeing the protection of the exchanged user data. Accordingly, tools to support and guide the analyst are needed, in order to make them to design IoT systems that are compliant with privacy policies. In this paper, preliminary results are provided for designing a tool-supported, theoretical framework, including a privacy policy language and a model for the analysis of IoT systems to enforce the protection of user data in IoT environments. In this work, the literature review is illustrated for identifying the concepts and relationships needed for such a framework, an outline our preliminary design of it and the included components.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Elyasaf, A., Marron, A., Sturm, A., Weiss, G.: A context-based behavioral language for IoT. In: MODELS Workshops, pp. 485–494 (2018) Elyasaf, A., Marron, A., Sturm, A., Weiss, G.: A context-based behavioral language for IoT. In: MODELS Workshops, pp. 485–494 (2018)
5.
go back to reference Kammüller, F., Augusto, J.C., Jones, S.: Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 401–406. IEEE, June 2017 Kammüller, F., Augusto, J.C., Jones, S.: Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 401–406. IEEE, June 2017
6.
go back to reference Aivaloglou, E., Gritzalis, S., Skianis, C.: NETp1-08: requirements and challenges in the design of privacy-aware sensor networks. In: IEEE Globecom 2006, pp. 1–5 (2006) Aivaloglou, E., Gritzalis, S., Skianis, C.: NETp1-08: requirements and challenges in the design of privacy-aware sensor networks. In: IEEE Globecom 2006, pp. 1–5 (2006)
7.
go back to reference McGraw, D.: Comprehensive privacy and security: critical for health information technology. White paper, May 2008 (2008) McGraw, D.: Comprehensive privacy and security: critical for health information technology. White paper, May 2008 (2008)
8.
go back to reference Goldstein, M.M.: Health information privacy and health information technology in the US correctional setting. Am. J. Public Health 104(5), 803–809 (2014)CrossRef Goldstein, M.M.: Health information privacy and health information technology in the US correctional setting. Am. J. Public Health 104(5), 803–809 (2014)CrossRef
9.
go back to reference Alqassem, I., Svetinovic, D.: A taxonomy of security and privacy requirements for the Internet of Things (IoT). In: 2014 IEEE International Conference on Industrial Engineering and Engineering Management, Bandar Sunway, pp. 1244–1248 (2014) Alqassem, I., Svetinovic, D.: A taxonomy of security and privacy requirements for the Internet of Things (IoT). In: 2014 IEEE International Conference on Industrial Engineering and Engineering Management, Bandar Sunway, pp. 1244–1248 (2014)
10.
go back to reference AL-mawee, W.: Privacy and security issues in IoT healthcare applications for the disabled users a survey (2012) AL-mawee, W.: Privacy and security issues in IoT healthcare applications for the disabled users a survey (2012)
11.
go back to reference Porambage, P., Ylianttila, M., Schmitt, C., Kumar, P., Gurtov, A., Vasilakos, A.V.: The quest for privacy in the Internet of Things (2016) Porambage, P., Ylianttila, M., Schmitt, C., Kumar, P., Gurtov, A., Vasilakos, A.V.: The quest for privacy in the Internet of Things (2016)
12.
go back to reference Piras, L., et al.: Defend architecture: a privacy by design platform for GDPR compliance. In: 16th International Conference on Trust, Privacy and Security in Digital Business (TrustBus) (2019) Piras, L., et al.: Defend architecture: a privacy by design platform for GDPR compliance. In: 16th International Conference on Trust, Privacy and Security in Digital Business (TrustBus) (2019)
13.
go back to reference Al Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications (2015) Al Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications (2015)
14.
go back to reference Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey (2010) Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey (2010)
15.
go back to reference Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of Things (IoT) security: current status, challenges and prospective measures, Vancouver (2010) Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of Things (IoT) security: current status, challenges and prospective measures, Vancouver (2010)
16.
go back to reference Madhura, P.M., Jain, P., Ranjith, J., Bilurkar, N.: A survey on internet of things: security and privacy issues. IJITR 3(3), 2069–2074 (2015) Madhura, P.M., Jain, P., Ranjith, J., Bilurkar, N.: A survey on internet of things: security and privacy issues. IJITR 3(3), 2069–2074 (2015)
18.
go back to reference March, S.T., Storey, V.C.: Design science in the information systems discipline: an introduction to the special issue on design science research. MIS Q. 32(4), 725–730 (2008)CrossRef March, S.T., Storey, V.C.: Design science in the information systems discipline: an introduction to the special issue on design science research. MIS Q. 32(4), 725–730 (2008)CrossRef
Metadata
Title
A Framework for Privacy Policy Compliance in the Internet of Things
Author
Constantinos Ioannou
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-50316-1_43

Premium Partner