Reference Hub6
An Improvised Framework for Privacy Preservation in IoT

An Improvised Framework for Privacy Preservation in IoT

Muzzammil Hussain, Neha Kaliya
Copyright: © 2018 |Volume: 12 |Issue: 2 |Pages: 18
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522543077|DOI: 10.4018/IJISP.2018040104
Cite Article Cite Article

MLA

Hussain, Muzzammil, and Neha Kaliya. "An Improvised Framework for Privacy Preservation in IoT." IJISP vol.12, no.2 2018: pp.46-63. http://doi.org/10.4018/IJISP.2018040104

APA

Hussain, M. & Kaliya, N. (2018). An Improvised Framework for Privacy Preservation in IoT. International Journal of Information Security and Privacy (IJISP), 12(2), 46-63. http://doi.org/10.4018/IJISP.2018040104

Chicago

Hussain, Muzzammil, and Neha Kaliya. "An Improvised Framework for Privacy Preservation in IoT," International Journal of Information Security and Privacy (IJISP) 12, no.2: 46-63. http://doi.org/10.4018/IJISP.2018040104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Data privacy is now-a-days a special issue in era of Internet of Things because of the big data stored and transmitted by the public/private devices. Different types and levels of privacy can be provided at different layers of IoT architecture, also different mechanisms operate at different layers of IoT architecture. This article presents the work being done towards the design of a generic framework to integrate these privacy preserving mechanisms at different layers of IoT architecture and can ensure privacy preservation in a heterogeneous IoT environment. The data is classified into different levels of secrecy and appropriate rules and mechanisms are applied to ensure this privacy. The proposed framework is implemented and evaluated for its performance with security and execution time or primary parameters. Various scenarios are also evaluated, and a comparison is done with an existing mechanism ABE (Attribute Based Encryption). It has been found that the proposed work takes less time and is more secure due to short key length and randomness of the parameters used in encryption algorithm.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.