Identification of IoT Actors

The Internet of Things (IoT) is a leading trend with numerous opportunities accompanied by advantages as well as disadvantages. Parallel with IoT development, significant privacy and personal data protection challenges are also growing. In this regard, the General Data Protection Regulation (GDPR) is often considered the world’s strongest set of data protection rules and has proven to be a catalyst for many countries around the world. The concepts and interaction of the data controller, the joint controllers, and the data processor play a key role in the implementation of the GDPR. Therefore, clarifying the blurred IoT actors’ relationships to determine corresponding responsibilities is necessary. Given the IoT transformation reflected in shifting computing power from cloud to the edge, in this research we have considered how these computing paradigms are affecting IoT actors. In this regard, we have introduced identification of IoT actors according to a new five-computing layer IoT model based on the cloud, fog, edge, mist, and dew computing. Our conclusion is that identifying IoT actors in the light of the corresponding IoT data manager roles could be useful in determining the responsibilities of IoT actors for their compliance with data protection and privacy rules.

[1]  Yuan Tian,et al.  A Review of Techniques and Methods for IoT Applications in Collaborative Cloud-Fog Environment , 2020, Secur. Commun. Networks.

[2]  Wolfie Christl,et al.  Corporate Surveillance In Everyday Life. How Companies Collect, Combine, Analyze, Trade, and Use Personal Data on Billions , 2017 .

[3]  Jason P. Jue,et al.  All One Needs to Know about Fog Computing and Related Edge Computing Paradigms , 2019 .

[4]  Christoph Grimm,et al.  An Introduction to the Internet of Things , 2020, IoT Platforms, Use Cases, Privacy, and Business Models.

[5]  S. Kanimozhi Suguna,et al.  Applications of the Internet of Things with the Cloud Computing Technologies: A Review , 2019 .

[6]  Gyu Myoung Lee,et al.  Personal Data Trading Scheme for Data Brokers in IoT Data Marketplaces , 2019, IEEE Access.

[7]  E. Ronco,et al.  The enhanced Telecom Operations Map™ (eTOM) Business Process Framework , 2002 .

[8]  Brenda Leticia Flores Ríos,et al.  Tracking the Evolution of the Internet of Things Concept Across Different Application Domains , 2017, Sensors.

[9]  Gibson B. N. Barbosa,et al.  The Internet of Things: Definitions, Key Concepts, and Reference Architectures , 2020, The Cloud-to-Thing Continuum.

[10]  Ivana Podnar Žarko,et al.  A Regulatory View on Smart City Services , 2019, Sensors.

[11]  K. Scarfone,et al.  IoT device cybersecurity capability core baseline , 2020 .

[12]  K. Scarfone,et al.  Foundational cybersecurity activities for IoT device manufacturers , 2020 .

[13]  Partha Pratim Ray,et al.  An Introduction to Dew Computing: Definition, Concept and Implications , 2018, IEEE Access.

[14]  Sotiris Karabetsos,et al.  A Review of Machine Learning and IoT in Smart Transportation , 2019, Future Internet.

[15]  Dawood Al-Abri,et al.  Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns , 2019, International Journal of Advanced Computer Science and Applications.

[16]  Marjan Gusev,et al.  Dew Computing and Transition of Internet Computing Paradigms , 2019 .

[17]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[18]  Soumya Kanti Datta,et al.  Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing , 2017, 2017 Global Internet of Things Summit (GIoTS).

[19]  Zhou Cheng,et al.  Overview of the Internet of Things , 2011 .

[20]  Jerome Henry,et al.  IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things , 2017 .

[21]  Zheng Li,et al.  An Introduction and Comparison of the Application of Cloud and Fog in IoT , 2019 .

[22]  Fernando Boavida,et al.  Opportunistic fog computing: Feasibility assessment and architectural proposal , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[23]  Karolj Skala,et al.  Views on the role and importance of dew computing in the service and control technology , 2016, 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[24]  Matt Cicciari The internet of word-things , 2016 .

[25]  Rajkumar Buyya,et al.  Feasibility of Fog Computing , 2017, Scalable Computing and Communications.

[26]  Mufti Mahmud,et al.  Toward a Heterogeneous Mist, Fog, and Cloud-Based Framework for the Internet of Healthcare Things , 2019, IEEE Internet of Things Journal.

[27]  Gyu Myoung Lee,et al.  Competitive Data Trading Model With Privacy Valuation for Multiple Stakeholders in IoT Data Markets , 2020, IEEE Internet of Things Journal.

[28]  Shuchi Sinha,et al.  Analysis of Stakeholders Within IoT Ecosystem , 2018 .

[29]  R. Posner The Federal Trade Commission , 1969 .