George Drosatos, K. Rantos, D. Karampatzakis, T. Lagkas, P. Sarigiannidis
{"title":"工业物联网中的隐私保护解决方案","authors":"George Drosatos, K. Rantos, D. Karampatzakis, T. Lagkas, P. Sarigiannidis","doi":"10.1109/DCOSS49796.2020.00044","DOIUrl":null,"url":null,"abstract":"Industrial Internet of Things (IIoT) is a relatively new area of research that utilises multidisciplinary and holistic approaches to develop smart solutions for complex problems in industrial environments. Designing applications for the IIoT is a non trivial issue and requires to address, among many others, technology concerns, the protection of personal data, and the privacy of individuals. In this review paper, we identify privacy-preserving solutions that have been proposed in the literature to safeguard the privacy of individuals being part, or interacting with, the IIoT environment. As such, it considers two main categories of the analysed protocols, i.e., the privacy-preserving data management and processing solutions, and the privacy-preserving authentication methods.","PeriodicalId":198837,"journal":{"name":"2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS)","volume":"15 2","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Privacy-preserving solutions in the Industrial Internet of Things\",\"authors\":\"George Drosatos, K. Rantos, D. Karampatzakis, T. Lagkas, P. Sarigiannidis\",\"doi\":\"10.1109/DCOSS49796.2020.00044\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Industrial Internet of Things (IIoT) is a relatively new area of research that utilises multidisciplinary and holistic approaches to develop smart solutions for complex problems in industrial environments. Designing applications for the IIoT is a non trivial issue and requires to address, among many others, technology concerns, the protection of personal data, and the privacy of individuals. In this review paper, we identify privacy-preserving solutions that have been proposed in the literature to safeguard the privacy of individuals being part, or interacting with, the IIoT environment. As such, it considers two main categories of the analysed protocols, i.e., the privacy-preserving data management and processing solutions, and the privacy-preserving authentication methods.\",\"PeriodicalId\":198837,\"journal\":{\"name\":\"2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS)\",\"volume\":\"15 2\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DCOSS49796.2020.00044\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DCOSS49796.2020.00044","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy-preserving solutions in the Industrial Internet of Things
Industrial Internet of Things (IIoT) is a relatively new area of research that utilises multidisciplinary and holistic approaches to develop smart solutions for complex problems in industrial environments. Designing applications for the IIoT is a non trivial issue and requires to address, among many others, technology concerns, the protection of personal data, and the privacy of individuals. In this review paper, we identify privacy-preserving solutions that have been proposed in the literature to safeguard the privacy of individuals being part, or interacting with, the IIoT environment. As such, it considers two main categories of the analysed protocols, i.e., the privacy-preserving data management and processing solutions, and the privacy-preserving authentication methods.