IoT Security Challenges and Solutions for Data at Rest: A Systematic Literature Review

Chisomo Tolani, Dr. Jyoti Pareek
{"title":"IoT Security Challenges and Solutions for Data at Rest: A Systematic Literature Review","authors":"Chisomo Tolani, Dr. Jyoti Pareek","doi":"10.48175/ijarsct-18175","DOIUrl":null,"url":null,"abstract":"The rapid expansion of the Internet of Things (IoT) has significantly transformed both consumer and industrial domains, driving the urgent need for robust security measures to protect data at rest. SLR investigates into the challenges associated with securing IoT devices and data, exploring the limitations of existing security frameworks and the intricate requirements imposed by global data protection regulations such as GDPR. The researcher review current approaches, including privacy-by-design principles and the deployment of symmetrical data protection frameworks, as highlighted in recent studies. Through a comprehensive analysis of literature and existing technologies, we identify critical gaps in the protection strategies and propose enhanced methods for ensuring data security and privacy in IoT systems. The findings emphasize the role of developers in integrating privacy considerations early in the development process and the impact of regulatory complexities on the practical implementation of data protection measures. Furthermore, the paper evaluates innovative security solutions, such as full stack security architectures and adversarial training models, assessing their effectiveness in real-world applications. This study aims to provide a deeper understanding of the IoT security landscape and to suggest actionable strategies for improving data protection practices across the IoT ecosystem","PeriodicalId":510160,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":" 361","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Research in Science, Communication and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.48175/ijarsct-18175","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The rapid expansion of the Internet of Things (IoT) has significantly transformed both consumer and industrial domains, driving the urgent need for robust security measures to protect data at rest. SLR investigates into the challenges associated with securing IoT devices and data, exploring the limitations of existing security frameworks and the intricate requirements imposed by global data protection regulations such as GDPR. The researcher review current approaches, including privacy-by-design principles and the deployment of symmetrical data protection frameworks, as highlighted in recent studies. Through a comprehensive analysis of literature and existing technologies, we identify critical gaps in the protection strategies and propose enhanced methods for ensuring data security and privacy in IoT systems. The findings emphasize the role of developers in integrating privacy considerations early in the development process and the impact of regulatory complexities on the practical implementation of data protection measures. Furthermore, the paper evaluates innovative security solutions, such as full stack security architectures and adversarial training models, assessing their effectiveness in real-world applications. This study aims to provide a deeper understanding of the IoT security landscape and to suggest actionable strategies for improving data protection practices across the IoT ecosystem
静态数据的物联网安全挑战与解决方案:系统性文献综述
物联网 (IoT) 的快速发展极大地改变了消费和工业领域,迫切需要强大的安全措施来保护静态数据。SLR 研究了与保护物联网设备和数据安全相关的挑战,探讨了现有安全框架的局限性以及 GDPR 等全球数据保护法规提出的复杂要求。研究人员回顾了当前的方法,包括按设计保护隐私原则和部署对称数据保护框架,这在最近的研究中得到了强调。通过对文献和现有技术的全面分析,我们找出了保护策略中的关键差距,并提出了确保物联网系统数据安全和隐私的增强方法。研究结果强调了开发人员在开发过程中尽早纳入隐私考虑因素的作用,以及监管的复杂性对数据保护措施实际实施的影响。此外,论文还评估了创新的安全解决方案,如全栈安全架构和对抗训练模型,并评估了它们在实际应用中的有效性。本研究旨在加深对物联网安全形势的了解,并为改善整个物联网生态系统的数据保护实践提出可行的策略建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信