Designing Privacy-aware Internet of Things Applications

@article{Perera2020DesigningPI,
  title={Designing Privacy-aware Internet of Things Applications},
  author={Charith Perera and Arosha K. Bandara and Blaine A. Price and Bashar Nuseibeh},
  journal={ArXiv},
  year={2020},
  volume={abs/1703.03892}
}
Internet of Things (IoT) applications typically collect and analyse personal data that can be used to derive sensitive information about individuals. [...] Key Result A key finding of our research is that the PbD framework significantly increases both novice and expert software engineers' ability to design privacy into IoT applications.Expand
Augmenting Software Engineering Processes Towards Designing Privacy Aware Internet of Things Applications
TLDR
It is anticipated that this proposed tool will save many engineering hours which engineers would otherwise need to spend on developing privacy expertise and applying it, and the usefulness of this tool towards privacy education and privacy compliance is highlighted. Expand
Deriving privacy and security considerations for CORE
TLDR
This work addresses the challenge of providing IoT systems engineers with a framework to elicit privacy and security design considerations, specifically for indoor adaptive smart environments, with a new ambient intelligence indoor adaptive environment framework (CORE) which leverages multiple forms of data. Expand
Deriving Privacy and Security Considerations for CORE: An Indoor IoT Adaptive Context Environment
TLDR
This work addresses the challenge of providing IoT systems engineers with a framework to elicit privacy and security design considerations, specifically for indoor adaptive smart environments, with a new ambient intelligence indoor adaptive environment framework (CORE) which leverages multiple forms of data. Expand
Towards an integrated privacy protection framework for IoT: contextualising regulatory requirements with industry best practices
TLDR
This paper lays the foundations for the future development of a framework for addressing privacy issues for IoT applications based on both the experimental analysis of data flows on an IoT Smart Home testbed and a systematic analysis of other frameworks. Expand
Exploring the relationships between privacy by design schemes and privacy laws: a comparative analysis
TLDR
The detailed results of the conducted framework analysis method were presented to attain a comprehensive view of different data protection laws and highlighted the disparities, in order to assist developers in adhering to the regulations across different regions, along with creating a Combined Privacy Law Framework (CPLF). Expand
Privacy Laws and Privacy by Design Schemes for the Internet of Things
TLDR
A systematic analysis of the privacy and data protection laws that are used across different continents is conducted and the key principles and individuals’ rights of the Combined Privacy Law Framework (CPLF) were mapped with Privacy by Design schemes developed previously by different researchers to investigate the gaps in existing schemes. Expand
Synthesising Privacy by Design Knowledge Toward Explainable Internet of Things Application Designing in Healthcare
TLDR
The research challenges that must be addressed are identified if one wishes to construct an intelligent privacy assistant that can truly augment software developers’ capabilities at the design phase. Expand
An integrated framework for privacy protection in IoT - Applied to smart healthcare
TLDR
This work proposes an integrated solution for assisting the average users of IoT applications to protect their privacy effectively and allows users to take advantage of their private data by making pragmatic data sharing deals with smart services (or data consumers) in the ecosystem. Expand
Security and Privacy Requirements for the Internet of Things
TLDR
This article focuses on design notations, models, and languages that facilitate capturing non-functional requirements (i.e., security and privacy) in existing non-IoT application designs, enabling their use and integration into IoT applications. Expand
Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges
TLDR
This work attempts to look at the requirements currently specified for a secure IIoT ecosystem in industry standards, such as Industrial Internet Consortium (IIC) and OpenFog Consortium, and to what extent currentIIoT connectivity protocols and platforms hold up to the standards with regard to security and privacy. Expand
...
1
2
3
4
...

References

SHOWING 1-10 OF 114 REFERENCES
Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms
TLDR
This paper proposes a set of guidelines, a privacy by-design framework, that can be used to assess privacy capabilities and gaps of existing IoT applications as well as middleware platforms. Expand
Twenty Security Considerations for Cloud-Supported Internet of Things
TLDR
This paper focuses on security considerations for IoT from the perspectives of cloud tenants, end-users, and cloud providers, in the context of wide-scale IoT proliferation, working across the range of IoT technologies. Expand
A Survey on Internet of Things From Industrial Market Perspective
TLDR
This survey is intended to serve as a guideline and a conceptual framework for context-aware product development and research in the IoT paradigm and provides a systematic exploration of existing IoT products in the marketplace and highlights a number of potentially significant research directions and trends. Expand
Privacy Guidelines for Internet of Things: A Cheat Sheet
TLDR
This document presents 30 different privacy guidelines that can be used to both design and assess IoT applications and IoT middleware platforms and presents the questions that software architects need to think about when designing or assessing a platform or application. Expand
Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents
TLDR
The Article concludes that all ten privacy incidents might have been avoided by the application of these privacy engineering and usability principles and suggests that the main challenge to effective privacy by design is not the lack of design guidelines but that business concerns often compete with and overshadow privacy concerns. Expand
The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey
TLDR
This paper surveys over one hundred IoT smart solutions in the marketplace and examines them closely in order to identify the technologies used, functionalities, and applications, and suggests a number of potentially significant research directions. Expand
Context Aware Computing for The Internet of Things: A Survey
TLDR
This paper surveys context awareness from an IoT perspective and addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT. Expand
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
TLDR
This paper presents a comprehensive framework to model privacy threats in software-based systems and provides an extensive catalog of privacy-specific threat tree patterns that can be used to detail the threat analysis outlined above. Expand
Engineering Privacy
TLDR
The paper uses a three-layer model of user privacy concerns to relate them to system operations and examine their effects on user behavior, and develops guidelines for building privacy-friendly systems. Expand
Internet of Things (IoT): A vision, architectural elements, and future directions
TLDR
This paper presents a Cloud centric vision for worldwide implementation of Internet of Things, and expands on the need for convergence of WSN, the Internet and distributed computing directed at technological research community. Expand
...
1
2
3
4
5
...