A Solution for Controlling and Managing User Profiles based on Data Privacy for IoT Applications

10/18/2019
by   Valderi R. Q. Leithardt, et al.
0

IoT is an emerging area in which we expect to have billions of devices connected to the Internet by 2020. IoT applications can offer many benefits to environments, society and the economy through the interconnection and cooperation of smart objects. However, there are many privacy challenges, such as authentication, authorization, and confidentiality of personal data. With this in mind, we have developed a solution for managing user profiles based on privacy and evolution. For that, we define the criteria and characteristics for each environment. The contribution of the work also applies to the evolution of the UbiPri Middleware, with a module implemented and tested according to the rules of environments so that they can modify the user's profile over time according to their frequency in the environment. The modified profile can be raised, reduced and blocked. This implementation has been validated using scripts that perform probabilistic simulation and user authentication. From the rules assigned to the environments, it was possible to perceive the high adaptability of the implementation, and it can be easily adjusted to any IoT environment that wants to treat the authentication and privacy of environments and users. The results obtained were satisfactory and could be useful for both the evolution of the UbiPri Middleware and other related works.

READ FULL TEXT
research
03/13/2021

Incorporating Individual and Group Privacy Preferences in the Internet of Things

This paper presents a new privacy negotiation mechanism for an IoT envir...
research
08/01/2019

The House That Knows You: User Authentication Based on IoT Data

Home-based Internet of Things (IoT) devices have gained in popularity an...
research
01/21/2019

Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications

The unprecedented proliferation of smart devices together with novel com...
research
12/17/2021

Continuously Testing Distributed IoT Systems: An Overview of the State of the Art

The continuous testing of small changes to systems has proven to be usef...
research
09/09/2020

Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale

In this paper we provide evidence of an emerging criminal infrastructure...
research
11/13/2019

Enabling Opportunistic Users in Multi-Tenant IoT Systems using Decentralized Identifiers and Permissioned Blockchains

In this work, we leverage advances in decentralized identifiers and perm...
research
08/08/2021

An Anonymous On-Street Parking Authentication Scheme via Zero-Knowledge Set Membership Proof

The amount of information generated grows as more and more sensor and Io...

Please sign up or login with your details

Forgot password? Click here to reset