Privacy Information Security Classification for Internet of Things Based on Internet Data

A lot of privacy protection technologies have been proposed, but most of them are independent and aim at protecting some specific privacy. There is hardly enough deep study into the attributes of privacy. To minimize the damage and influence of the privacy disclosure, the important and sensitive privacy should be a priori preserved if all privacy pieces cannot be preserved. This paper focuses on studying the attributes of the privacy and proposes privacy information security classification (PISC) model. The privacy is classified into four security classifications by PISC, and each classification has its security goal, respectively. Google search engine is taken as the research platform to collect the related data for study. Based on the data from the search engine, we got the security classifications of 53 pieces of privacy.

[1]  Christoph P. Mayer Electronic Communications of the EASST Volume 17 ( 2009 ) Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 ( WowKiVS 2009 ) Security and Privacy Challenges in the Internet of Things , 2008 .

[2]  Helen Gill,et al.  Cyber-Physical Systems , 2019, 2019 IEEE International Conference on Mechatronics (ICM).

[3]  Jingsha He,et al.  Secure Localization in Wireless Sensor Networks with Mobile Beacons , 2012, Int. J. Distributed Sens. Networks.

[4]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[5]  Geoff Mulligan,et al.  The Internet of Things: Here Now and Coming Soon , 2010 .

[6]  Srijith Krishnan Nair,et al.  Self Managed Security Cell, a Security Model for the Internet of Things and Services , 2009, 2009 First International Conference on Advances in Future Internet.

[7]  Liu Yuan Privacy and Security in the Exploitation of Internet of Things , 2011 .

[8]  Lui Sha,et al.  Cyber-Physical Systems: A New Frontier , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[9]  Michael J. Corby The Case for Privacy , 2007, Information Security Management Handbook, 6th ed..

[10]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[11]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[12]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[13]  Ian Goldberg,et al.  A pseudonymous communications infrastructure for the internet , 2000 .

[14]  Qi Li,et al.  Privacy Information Security Classification Study in Internet of Things , 2014, 2014 International Conference on Identification, Information and Knowledge in the Internet of Things.

[15]  Deborah Estrin,et al.  Internet Predictions , 2010, IEEE Internet Comput..

[16]  Kevin Aquilina,et al.  Public security versus privacy in technology law: A balancing act? , 2010, Comput. Law Secur. Rev..