2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2014
DOI: 10.1109/infcomw.2014.6849186
|View full text |Cite
|
Sign up to set email alerts
|

IoT-Privacy: To be private or not to be private

Abstract: Privacy breaching attacks pose considerable challenges in the development and deployment of Internet of Things (IoT) applications. Though privacy preserving data mining (PPDM) minimizes sensitive data disclosure probability, sensitive content analysis, privacy measurement and user's privacy awareness issues are yet to be addressed. In this paper, we propose a privacy management scheme that enables the user to estimate the risk of sharing private data like smart meter data. Our focus is to develop robust sensit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
47
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 101 publications
(50 citation statements)
references
References 6 publications
(6 reference statements)
0
47
0
Order By: Relevance
“…They argue that privacy aspects should be considered very seriously because the IoT applications often work with sensitive data and personal data. There are also papers that focus mainly on privacy in IoT, such as [24], [25]. These papers analyze possible threats and challenges.…”
Section: Related Workmentioning
confidence: 99%
“…They argue that privacy aspects should be considered very seriously because the IoT applications often work with sensitive data and personal data. There are also papers that focus mainly on privacy in IoT, such as [24], [25]. These papers analyze possible threats and challenges.…”
Section: Related Workmentioning
confidence: 99%
“…Outlier detection is an interesting research method applied to various domains [14]. Given a series of Ω , , the challenge we face is to distinctly differentiate noisy and clean segments.…”
Section: Outlier Detection For Noisy Segment Identificationmentioning
confidence: 99%
“…However, different aspects like security, privacy, quality of service guarantees while capturing and processing the sensitive data like health parameters are to be addressed [5,9,13,14] along with building precise sensors and analytics solution.…”
Section: Introductionmentioning
confidence: 99%
“…Firstly, we derive distribution pattern of φ κ through sample excess kurtosis (κ) measurement. For κ > 3, (leptokurtic distribution), modified Rosner filtering is executed to minimize swamping effect [3], [2]. Instead of sample mean, we use sample median for Rosner backward selection method.…”
Section: Sensitivity Detectormentioning
confidence: 99%
“…how much the probability of finding Ω, given φ, i.e. the information leakage transfer function = privacy quantification value = ρ= [3]. We normalize ρ to privacy score [1,10].…”
Section: Privacy Quantification and Alert Generatormentioning
confidence: 99%