A Privacy Aware Architecture for IoT Enabled Systems

The Internet of Things has been used widely for the development of many different types of smart systems. But the constant monitoring of activities and behaviours and the collection along with the use of confidential data have led to increasing concerns about privacy which have indeed become one of the main barriers to technology acceptance and adoption. The development of new personalised technologies increases the use of sensitive data which should be kept hidden from third parties. The current methods are not sufficient and effective to assess and mitigate the significant privacy risks exposed by IoT and to support the design and adoption of privacy-aware smart systems. In this context, this paper proposes an architecture for privacy preservation which enables fine-grained control over data, anonymization and authentication. In particular, we introduce a privacy aware IoT architecture that utilises physical unclonable functions and deep learning to ensure the privacy of the collected IoT data.

[1]  S. Devadas,et al.  Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.

[2]  Liming Chen,et al.  Users' Privacy Concerns in IoT Based Applications , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[3]  Ke Xu,et al.  Cleaning the Null Space: A Privacy Mechanism for Predictors , 2017, AAAI.

[4]  Wenjing Lou,et al.  FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks , 2009, IEEE INFOCOM 2009.

[5]  Timothy W. Finin,et al.  Semantic approach to automating management of big data privacy policies , 2016, 2016 IEEE International Conference on Big Data (Big Data).

[6]  Mahadev Satyanarayanan,et al.  Assisting Users in a World Full of Cameras: A Privacy-Aware Infrastructure for Computer Vision Applications , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[7]  Jan Sliwa A Generalized Framework for Multi-party Data Exchange for IoT Systems , 2016, 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA).

[8]  Vitaly Shmatikov,et al.  Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[9]  J. Cheon,et al.  Survey on Identity based and Hierarchical Identity based Encryption Schemes , 2016 .

[10]  Liming Chen,et al.  Privacy modelling and management for assisted living within smart homes , 2017, 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom).

[11]  Yadu N. Babuji,et al.  Cloud Kotta: Enabling secure and scalable data analytics in the cloud , 2016, 2016 IEEE International Conference on Big Data (Big Data).

[12]  Ian Goodfellow,et al.  Deep Learning with Differential Privacy , 2016, CCS.

[13]  Martín Abadi,et al.  Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data , 2016, ICLR.

[14]  Pengtao Xie,et al.  Crypto-Nets: Neural Networks over Encrypted Data , 2014, ArXiv.

[15]  Bhiksha Raj,et al.  Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models , 2013, IEEE Transactions on Audio, Speech, and Language Processing.

[16]  MengChu Zhou,et al.  A Privacy-Preserving Message Forwarding Framework for Opportunistic Cloud of Things , 2018, IEEE Internet of Things Journal.

[17]  Andreas Holzinger,et al.  Users' Perceptions and Attitudes Towards Smart Home Technologies , 2018, ICOST.

[18]  Liming Chen,et al.  A Deep Learning Approach for Privacy Preservation in Assisted Living , 2018, 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[19]  Bhiksha Raj,et al.  Privacy preserving probabilistic inference with Hidden Markov Models , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[20]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[21]  Vinod Vaikuntanathan,et al.  Can homomorphic encryption be practical? , 2011, CCSW '11.

[22]  Maryline Laurent-Maknavicius,et al.  Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.

[23]  Hong Liu,et al.  Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.

[24]  Michael Naehrig,et al.  Private Predictive Analysis on Encrypted Medical Data , 2014, IACR Cryptol. ePrint Arch..

[25]  Srinivas Devadas,et al.  Identification and authentication of integrated circuits , 2004, Concurr. Pract. Exp..

[26]  Helen J. Wang,et al.  SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser , 2015, 2015 IEEE Symposium on Security and Privacy.

[27]  Yuguang Fang,et al.  EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis , 2018, IEEE Internet of Things Journal.

[28]  Antonino Mazzeo,et al.  Authenticating IoT Devices with Physically Unclonable Functions Models , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).

[29]  Alessandro Acquisti,et al.  Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions , 2016, SOUPS.

[30]  Costas J. Spanos,et al.  Privacy-Enhanced Architecture for Occupancy-Based HVAC Control , 2016, 2017 ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS).

[31]  Mianxiong Dong,et al.  When Weather Matters: IoT-Based Electrical Load Forecasting for Smart Grid , 2017, IEEE Communications Magazine.

[32]  Mahadev Satyanarayanan,et al.  Privacy Mediators: Helping IoT Cross the Chasm , 2016, HotMobile.

[33]  Maximilian Hofer,et al.  Physical Unclonable Functions in Theory and Practice , 2012 .

[34]  Eui-Nam Huh,et al.  Cloud of Things: Integration of IoT with Cloud Computing , 2016 .

[35]  Shiho Moriai,et al.  Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[36]  Prem Prakash Jayaraman,et al.  Internet of things: from internet scale sensing to smart services , 2016, Computing.

[37]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[38]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.