2019
DOI: 10.3390/sym11060774
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective

Abstract: The Internet of Things (IoT) makes our lives much easier, more valuable, and less stressful due to the development of many applications around us including smart cities, smart cars, and smart grids, offering endless services and solutions. Protecting IoT data of such applications at rest either on the objects or in the cloud is an indispensable requirement for achieving a symmetry in the handling and protection of the IoT, as we do with data created by persons and applications. This is because unauthorised acc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 36 publications
(22 citation statements)
references
References 97 publications
(139 reference statements)
0
22
0
Order By: Relevance
“…In [4], the authors propose a comprehensive list of security and privacy guidelines only for IoT data at rest, such as searching on encrypted data, ensuring authorized access, encrypting data storage, and minimizing duplicated copies. Moreover, the authors investigate all possible attacks and threats against data at rest and identify a set of protection measures which can be used to implement their guidelines.…”
Section: Framework-based Solutionsmentioning
confidence: 99%
See 3 more Smart Citations
“…In [4], the authors propose a comprehensive list of security and privacy guidelines only for IoT data at rest, such as searching on encrypted data, ensuring authorized access, encrypting data storage, and minimizing duplicated copies. Moreover, the authors investigate all possible attacks and threats against data at rest and identify a set of protection measures which can be used to implement their guidelines.…”
Section: Framework-based Solutionsmentioning
confidence: 99%
“…The other factor is the lack of frameworks that provide widely agreed upon security and privacy guidelines for IoT assets ( physical objects, protocols, data at rest, and software proposed in our earlier work [21]), along with their protection measures [3]. Such guidelines and their suitable implementation techniques would pave the road for IoT stakeholders like developers and manufacturers to build secure IoT systems by integrating such guidelines into their systems from the start [4]. In spite of the importance of such frameworks of security and privacy guidelines for IoT to enhance its security and privacy by design according to [4], a few research studies have been proposed in this regard [3,4,[22][23][24].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Along with this, technologies are constantly evolving. New types of threats appear [2], and the security of computer networks is evolving into the security of the Internet of Things [3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%