2021
DOI: 10.1007/s12652-021-02959-7
|View full text |Cite
|
Sign up to set email alerts
|

Incorporating individual and group privacy preferences in the internet of things

Abstract: This paper presents a new privacy negotiation mechanism for an IoT environment that is both efficient and practical to cope with the IoT special need of seamlessness. This mechanism allows IoT users to express and enforce their personal privacy preferences in a seamless manner while interacting with IoT deployments. A key contribution of the paper is that it addresses the privacy concerns of individual users as well as a group of users where privacy preferences of all individual users are combined into a group… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 23 publications
0
1
0
Order By: Relevance
“…The authors stressed the need for the privacy preservation of groups of people who can spread infection due to their activities. Alanezi et al [156] discussed the group as well as individual privacy preservation in IoT scenarios. The developed prototype can provide strong resilience against both individual and group privacy issues in IoT environments.…”
Section: Group Privacy: a New Dimension Of Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…The authors stressed the need for the privacy preservation of groups of people who can spread infection due to their activities. Alanezi et al [156] discussed the group as well as individual privacy preservation in IoT scenarios. The developed prototype can provide strong resilience against both individual and group privacy issues in IoT environments.…”
Section: Group Privacy: a New Dimension Of Privacymentioning
confidence: 99%
“…Wu et al [146] Theoretical Suggests a method for self-identity protection across social networks × × Reviglio et al [147] Theoretical Highlights pertinent threats to group privacy in data mining × Gstrein et al [148] Theoretical Discusses many group privacy issues in datafication paradox × Mavriki et al [149] Theoretical Discusses implications of group privacy on general public × Mavriki et al [150] Technical Discusses group privacy issues in e-health applications with examples × Heinrichs et al [151] Theoretical Highlight group privacy issues caused by the AI tools × Mühlhoff et al [152] Theoretical Suggests a group privacy protection in predictive analytics × Mavriki et al [153] Theoretical Suggests protecting the interests of groups in big data era × Kikuchi et al [154] Theoretical Highlights the need of group privacy protection in purchase records × Flood et al [155] Theoretical Discusses group privacy issues in COVID-19 contact tracing apps × Alanezi et al [156] Technical Solves the group privacy problem in IoT scenarios using diversity concept Wickrama et al [157] Theoretical Discusses group privacy issues in smart homes environments × Kim et al [158] Theoretical Discusses AI effects on group privacy and their implications × Kim et al [159] Theoretical Highlights threats to group privacy in social networks analysis and mining × Russo et al [160] Technical Suggests a privacy protection method to access online social network services × Labs et al [161] Theoretical Highlights privacy issues in COVID-19 era (surveillance related) × Alshawi et al [162] Theoretical Describes group privacy-related issues in COVID-19 tracing apps × Sean et al [163] Theoretical Describes privacy concerns in group chat tools × Petrén et al [164] Technical Describes DP effect on group privacy (or decisions) preservation Erickson et al [165] Theoretical Describes many potential group privacy issues in Femtech app × Perino et al [166] Theoretical Highlights AI effect on users privacy and change in privacy landscape × Tadic et al [167] Technical Develops a practical tool for solving group privacy issues online Sfar et al [18] Technical Proposed a generalized privacy protection solution for e-health sector × Zhang et al [168] Theoretical Highlights the concept of visual privacy in deep learning systems...…”
Section: Threats To Group Privacy Discussedmentioning
confidence: 99%
“…A smartphone gateway application is provided to handle various communication protocols and manage IoT devices. We also adopted the smartphone for representing user interests in the IoT environment in our previous work [19] but our focus in this work is on the IoT deployment owner interests represented by the edge server in our architecture. Finally, the Hypercat [20] and SGS [21] are also solutions directed at enhanced IoT interoparability.…”
Section: Related Work a General Literature Reviewmentioning
confidence: 99%