Abstract

This paper proposes an approach which safeguards confidentiality to avoid disclosures of features within a multiple IoT situation, that is, a setup of objects in networks that communicate with each other. Two ideas derived from the theory of databases, namely k-anonymity and t-certitude, form our basis. They are used to cluster the objects to provide a unitary view of them and their characteristics. In fact, the use of anonymity and t-closeness robustly ensures privacy for derived groups. Furthermore, description of the object grouping scheme that preserves privacy, which represents the core of our approach was studied. Eventually, we illustrated the corresponding security model and analyzed the associated properties. The study also provided important advantages for the protection of user privacy in all those situations where knowledge of object features may help an attacker to obtain information about user habits and behavior. This study prevents not only the disclosure of information but also the divulgation of features. This is a major strength of our approach as malicious analyzes of the characteristics of objects can interfere with the privacy of people.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.