2020
DOI: 10.1109/access.2020.3023659
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Identifiers for IoT: A Systematic Literature Review

Abstract: The Internet of Things (IoT) paves the way for smart applications such as in E-health, Ehomes, transportation, or energy production. However, IoT technologies also pose privacy challenges for their users, as they allow the tracking and monitoring of the users' behavior and context. The EU General Data Protection Regulation (GDPR) mandates data controller to follow a data protection by design and default approach by implementing for instance pseudonymity for achieving data minimisation. This paper provides a sy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 49 publications
0
9
0
Order By: Relevance
“…Akil et al [1] present a systematic literature review on the use of privacy-preserving identifiers implementing pseudonymity in identity management systems for IoT published from 2009 to 2019. Privacy-preserving identifiers are information containers used to identify or authorize a user and/or a device without necessarily revealing the identity or other personal details of the device holders.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Akil et al [1] present a systematic literature review on the use of privacy-preserving identifiers implementing pseudonymity in identity management systems for IoT published from 2009 to 2019. Privacy-preserving identifiers are information containers used to identify or authorize a user and/or a device without necessarily revealing the identity or other personal details of the device holders.…”
Section: Related Workmentioning
confidence: 99%
“…More precisely, our work differs from the current work in the following respects: (i) we retrieve and analyze a larger number of primary studies compared to the other studies; (ii) we follow a systematic procedure to carry out our study. No study, except the works of Alkil et al [1], followed a systematic procedure. Alkil et al [1] presented fewer research questions, retrieved fewer primary studies, and considered fewer search engines compared to our work; (iii) we focus only on PP techniques for IoT devices.…”
Section: A Differences Between the Related Work And Our Smsmentioning
confidence: 99%
See 2 more Smart Citations
“…In light of the above requirements, data pseudonymisation plays an important role in data protection. From an engineering perspective, a pseudonym is defined as an identifier of a subject, which is different from the subject's real name [32,1], whereas the types of pseudonyms may be distinguished by the context of use [32]. Typically, a pseudonym replaces a data subject's identifier, with the latter one being able to explicitly identify the data subject within a specific context; for example, the original identifier can be a combination of first name and last name, an e-mail address, or even a device/network identifier (e.g.…”
Section: Pseudonymisation and Data Protection: Legal Frameworkmentioning
confidence: 99%