{"title":"Framework for privacy preservation in iot through classification and access control mechanisms","authors":"Neha Kaliya, M. Hussain","doi":"10.1109/I2CT.2017.8226166","DOIUrl":null,"url":null,"abstract":"Rising technologies as wireless technologies, Sensing technologies and Communication technologies transformed the Internet into an integrated network of things termed as Internet-of-Things (IoT). IoT is a network of things connected over by Internet, all the pros and cons of internet are also inherited to IoT applications. Hence, security and privacy of user data is a serious issue in IoT. In this paper, we proposed a mechanism that classifies data into a structural format based on its origin and user and access control lists are created. Using the classification of data and access control lists, data is secured to ensure privacy of data.","PeriodicalId":343232,"journal":{"name":"2017 2nd International Conference for Convergence in Technology (I2CT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 2nd International Conference for Convergence in Technology (I2CT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I2CT.2017.8226166","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
Rising technologies as wireless technologies, Sensing technologies and Communication technologies transformed the Internet into an integrated network of things termed as Internet-of-Things (IoT). IoT is a network of things connected over by Internet, all the pros and cons of internet are also inherited to IoT applications. Hence, security and privacy of user data is a serious issue in IoT. In this paper, we proposed a mechanism that classifies data into a structural format based on its origin and user and access control lists are created. Using the classification of data and access control lists, data is secured to ensure privacy of data.