Big Data Research

The social Internet of Things (SIoT) shares large amounts of data that are then processed by other Internet of Thing (IoT) devices, which results in the generation, collection, and treatment of databases to be analyzed afterwards with Big Data techniques. This paradigm has given rise to users’ concerns about their privacy, particularly with regard to whether users have to use a smart handling (self-establishment and self-management) in order to correctly install the SIoT, ensuring the privacy of the SIot-generated content and data. In this context, the present study aims to identify and explore the main perspectives that define user privacy in the SIoT; our ultimate goal is to accumulate new knowledge on the adoption and use of the concept of privacy “by default” in the scientific literature. To this end, we undertake a literature review of the main contributions on the topic of privacy in SIoT and Big Data processing. Based on the results, we formulate the following five areas of application of SIoT, including 29 key points relative to the concept of privacy “by default”: (i) SIoT data collection and privacy; (ii) SIoT security; (iii) threats for SIoT devices; (iv) SIoT devices mandatory functions; and (v) SIoT and Big Data processing and analytics. In addition, we outline six research propositions and discuss six challenges for the SIoT industry. The results are theorized for the future development of research on SIoT privacy by “default” and Big Data processing. © 2021 The Authors. Published by Elsevier

[1]  Jose Ramon Saura,et al.  Ethical design in social media: Assessing the main performance measurements of user online behavior modification , 2021 .

[2]  Igor G. Olaizola,et al.  Data Science Methodologies: Current Challenges and Future Approaches , 2021, Big Data Res..

[3]  José Ramón Saura,et al.  Evaluating security and privacy issues of social networks based information systems in Industry 4.0 , 2021, Enterp. Inf. Syst..

[4]  Miguel-Ángel Galindo-Martín,et al.  Effects of sociocultural and economic factors on social entrepreneurship and sustainable development , 2021, Journal of Innovation & Knowledge.

[5]  Brij B. Gupta,et al.  IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network , 2021, IEEE Internet of Things Journal.

[6]  José Ramón Saura,et al.  Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy , 2021, Technological Forecasting and Social Change.

[7]  Jose Ramon Saura,et al.  From user-generated data to data-driven innovation: A research agenda to understand user privacy in digital markets , 2021, Int. J. Inf. Manag..

[8]  Imed Romdhani,et al.  Big data and IoT-based applications in smart environments: A systematic review , 2021, Comput. Sci. Rev..

[9]  Gwanggil Jeon,et al.  A Framework for Pandemic Prediction Using Big Data Analytics , 2021, Big Data Research.

[10]  Saeed Rouhani,et al.  Big data platforms: in the lens of selection and evaluation approach , 2021, J. Decis. Syst..

[11]  Arundhati Walia,et al.  Social IoT , 2020, Enabling the Internet of Things.

[12]  ClarkeSiobhán,et al.  A Survey on IoT Big Data , 2020, ACM Comput. Surv..

[13]  Lei Chen,et al.  A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT , 2020, Wirel. Commun. Mob. Comput..

[14]  K. Al-Omoush,et al.  The impact of social capital and collaborative knowledge creation on e-business proactiveness and organizational agility in responding to the COVID-19 crisis , 2020, Journal of Innovation & Knowledge.

[15]  Madjid Tavana,et al.  IoT-based enterprise resource planning: Challenges, open issues, applications, architecture, and future research directions , 2020, Internet Things.

[16]  Jose Ramon Saura,et al.  Using Data Sciences in Digital Marketing: Framework, methods, and performance metrics , 2020, Journal of Innovation & Knowledge.

[17]  M. Sheikhmohammady,et al.  The impact of social capital and social interaction on customers’ purchase intention, considering knowledge sharing in social commerce context , 2020, Journal of Innovation & Knowledge.

[18]  Brij B. Gupta,et al.  Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..

[19]  Rajeswari Sridhar,et al.  Social Internet of Things (SIoT): Techniques, Applications and Challenges , 2020, 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184).

[20]  Alex Martynenko,et al.  IoT, Big Data, and Artificial Intelligence in Agriculture and Food Industry , 2020, IEEE Internet of Things Journal.

[21]  Anand Paul,et al.  Trustworthy intelligent industrial monitoring architecture for early event detection by exploiting social IoT , 2020, SAC.

[22]  Jinho Choi,et al.  IoT Connectivity Technologies and Applications: A Survey , 2020, IEEE Access.

[23]  Giancarlo Fortino,et al.  Agent-based Internet of Things: State-of-the-art and research challenges , 2020, Future Gener. Comput. Syst..

[24]  Wolfgang Kerber DATA SHARING IN IOT ECOSYSTEMS AND COMPETITION LAW: THE EXAMPLE OF CONNECTED CARS , 2019 .

[25]  L. Yang,et al.  A survey on data provenance in IoT , 2019, World Wide Web.

[26]  Shingo Yamaguchi,et al.  MQTT-driven Remote Temperature Monitoring System for IoT-based Smart Homes , 2019, 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE).

[27]  Jianfeng Ma,et al.  Differentially Privacy-preserving Social IoT , 2019, 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP).

[28]  Sokol Kosta,et al.  Security and Storage Issues in Internet of Floating Things Edge-Cloud Data Movement , 2019, PPAM.

[29]  Indratmo,et al.  Systematic Review of the Literature on Big Data in the Transportation Domain: Concepts and Applications , 2019, Big Data Res..

[30]  Yunpeng Gao,et al.  Social Security and Privacy for Social IoT Polymorphic Value Set: A Solution to Inference Attacks on Social Networks , 2019, Secur. Commun. Networks.

[31]  Gabriel-Miro Muntean,et al.  Design, Implementation and Analysis of a Twitter-Based Social IoT Network , 2019, 2019 International Conference on Sensing and Instrumentation in IoT Era (ISSI).

[32]  Xiaoying Gan,et al.  When Crowdsourcing Meets Social IoT: An Efficient Privacy-Preserving Incentive Mechanism , 2019, IEEE Internet of Things Journal.

[33]  Brij B. Gupta,et al.  IoT transaction processing through cooperative concurrency control on fog–cloud computing environment , 2019, Soft Computing.

[34]  Rajkumar Buyya,et al.  Social Internet of Things (SIoT): Foundations, thrust areas, systematic review and future directions , 2019, Comput. Commun..

[35]  Dimitri Konstantas,et al.  A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective , 2019, J. Sens. Actuator Networks.

[36]  Rajhans Mishra,et al.  Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges , 2019, Enterp. Inf. Syst..

[37]  Lianbing Deng,et al.  A novel CNN based security guaranteed image watermarking generation scenario for smart city applications , 2019, Inf. Sci..

[38]  Karen R. Sollins,et al.  IoT Big Data Security and Privacy Versus Innovation , 2019, IEEE Internet of Things Journal.

[39]  Ana Reyes-Menendez,et al.  Comparing a Traditional Approach for Financial Brand Communication Analysis With a Big Data Analytics Technique , 2019, IEEE Access.

[40]  Xiaojiang Du,et al.  Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective , 2019, Secur. Commun. Networks.

[41]  Josef Drexl,et al.  IoT Connectivity Standards: How Adaptive is the Current SEP Regulatory Framework? , 2018, IIC - International Review of Intellectual Property and Competition Law.

[42]  Subrat Kar,et al.  Utilizing Social Networks Data for Trust Management in a Social Internet of Things Network , 2018, MobiCom.

[43]  Brij B. Gupta,et al.  An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols , 2018, Concurr. Comput. Pract. Exp..

[44]  Antonio Alfredo Ferreira Loureiro,et al.  Mobile Matrix: Routing under mobility in IoT, IoMT, and Social IoT , 2018, Ad Hoc Networks.

[45]  Shui Yu,et al.  Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective , 2018, IEEE Communications Magazine.

[46]  Xiaoyan Wang,et al.  Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things , 2018, IEEE Communications Magazine.

[47]  Franco Zambonelli,et al.  An Argumentation-Based Perspective Over the Social IoT , 2018, IEEE Internet of Things Journal.

[48]  Enzo Baccarelli,et al.  Fog of Social IoT: When the Fog Becomes Social , 2018, IEEE Network.

[49]  Shalini Batra,et al.  Ensemble based spam detection in social IoT using probabilistic data structures , 2018, Future Gener. Comput. Syst..

[50]  Bart P. Knijnenburg,et al.  A Data-Driven Approach to Developing IoT Privacy-Setting Interfaces , 2018, IUI.

[51]  Abdelsalam Helal,et al.  A framework for inter-thing relationships for programming the social IoT , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).

[52]  Athanasios V. Vasilakos,et al.  The role of big data analytics in Internet of Things , 2017, Comput. Networks.

[53]  Ejaz Ahmed,et al.  Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges , 2017, Future Gener. Comput. Syst..

[54]  Haoxiang Wang,et al.  Efficient IoT-based sensor BIG Data collection-processing and analysis in smart buildings , 2017, Future Gener. Comput. Syst..

[55]  Fahim Arif,et al.  Smart urban planning using big data analytics based internet of things , 2017, UbiComp/ISWC Adjunct.

[56]  Nima Jafari Navimipour,et al.  A Systematic Literature Review of the Data Replication Techniques in the Cloud Environments , 2017, Big Data Res..

[57]  Lujo Bauer,et al.  Privacy Expectations and Preferences in an IoT World , 2017, SOUPS.

[58]  B. B. Gupta,et al.  Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.

[59]  Ricardo Neisse,et al.  Security and privacy issues for an IoT based smart home , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[60]  Yutaka Ishibashi,et al.  An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework , 2017, Future Gener. Comput. Syst..

[61]  M. Adams,et al.  Big Data and Individual Privacy in the Age of the Internet of Things , 2017 .

[62]  Yacine Challal,et al.  A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.

[63]  Ibrar Yaqoob,et al.  Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges , 2017, IEEE Access.

[64]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[65]  Athanasios V. Vasilakos,et al.  IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges , 2017, IEEE Internet of Things Journal.

[66]  Iakovos S. Venieris,et al.  Cognitive friendship and goal management for the social IoT , 2017, Comput. Electr. Eng..

[67]  Noël Crespi,et al.  Exploitation of social IoT for recommendation services , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[68]  David Billard,et al.  PISCES: A framework for privacy by design in IoT , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[69]  Nilay Khare,et al.  Big data privacy: a technological perspective and review , 2016, Journal of Big Data.

[70]  Rachelle Bosua,et al.  The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective , 2016, Comput. Law Secur. Rev..

[71]  Rajkumar Buyya,et al.  Mobile Cloud Business Process Management System for the Internet of Things , 2015, ACM Comput. Surv..

[72]  Haesung Lee,et al.  Survey and Analysis of Information Sharing in Social IoT , 2015, 2015 8th International Conference on Disaster Recovery and Business Continuity (DRBC).

[73]  Nicolas Hanusse,et al.  Large interactive visualization of density functions on big data infrastructure , 2015, 2015 IEEE 5th Symposium on Large Data Analysis and Visualization (LDAV).

[74]  Mahdi H. Miraz,et al.  A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT) , 2015, 2015 Internet Technologies and Applications (ITA).

[75]  In Lee,et al.  The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .

[76]  O VikasB,et al.  Internet of Things (IoT): A Survey on Privacy Issues and Security , 2015 .

[77]  Mumbai,et al.  Internet of Things (IoT): A Literature Review , 2015 .

[78]  Christian Esposito,et al.  A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing , 2015, Knowl. Based Syst..

[79]  Jyotsna P. Gabhane,et al.  A survey based on Smart Homes system using Internet-of-Things , 2015, 2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC).

[80]  George K. Karagiannidis,et al.  Efficient Machine Learning for Big Data: A Review , 2015, Big Data Res..

[81]  S. Katsikas,et al.  The evolution of privacy-by-default in Social Networks , 2014, Proceedings of the 18th Panhellenic Conference on Informatics.

[82]  Harsh Kupwade Patil,et al.  Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.

[83]  Noël Crespi,et al.  A semantic service creation platform for Social IoT , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[84]  Woo-Soo Jeong,et al.  An Analysis of the Economic Effects for the IoT Industry , 2013 .

[85]  Peggy Valcke,et al.  Guidelines for Privacy-Friendly Default Settings , 2013 .

[86]  Steve Hodges,et al.  Prototyping Connected Devices for the Internet of Things , 2013, Computer.

[87]  Mamun Bin Ibne Reaz,et al.  A Review of Smart Homes—Past, Present, and Future , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[88]  Roy H. Campbell,et al.  Towards Security and Privacy for Pervasive Computing , 2002, ISSS.

[89]  H. Øverby,et al.  Digital Markets , 2021, Introduction to Digital Economics.

[90]  Christian Esposito,et al.  Blockchain-based authentication and authorization for smart city applications , 2021, Inf. Process. Manag..

[91]  Susan P. Williams,et al.  Conceptualizing the Internet of Things Data Supply , 2020, CENTERIS/ProjMAN/HCist.

[92]  Karin Hedström,et al.  A systematic review of Social Internet of Things: concepts and application areas , 2019, AMCIS.

[93]  Mohamed Hamed N. Taha,et al.  Security Threats of Social Internet of Things in the Higher Education Environment , 2019, Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications.

[94]  Francesco Palmieri,et al.  Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes , 2018, Future Gener. Comput. Syst..

[95]  David Goad,et al.  IoT Design Challenges and the Social IoT Solution , 2017, AMCIS.

[96]  Imed Romdhani,et al.  Security Concerns in Social IoT , 2017 .

[97]  Dimitris Mourtzis,et al.  Industrial Big Data as a Result of IoT Adoption in Manufacturing , 2016 .

[98]  Aditya Dev Mishra,et al.  Big data analytics for security and privacy challenges , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).

[99]  Flora Amato,et al.  A Recommendation System for Browsing of Multimedia Collections in the Internet of Things , 2013, Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence.

[100]  Dynamic Management of Tra ffi c Signals through Social IoT Dynamic Management of Tra ffi c Signals through Social IoT , 2022 .

[101]  Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing , 2022 .