Review Article

Towards Privacy Preserving IoT Environments: A Survey

Table 3

Summary of privacy preserving proposed solutions in IoT environments.

SolutionSummaryReferences

Authentication and Authorization(i) Lightweight authentication and key establishment mechanisms[6468]
(ii) Frameworks based on device fingerprinting techniques
(iii) Context-aware access control models and enforcing mechanisms

Edge Computing and plug in architecture(i) Software modules on the edge to overcome privacy concerns[6974]
(ii) Privacy aware systems to allow user control over data
(iii) Decentralized architectures based on Personal-Cloud Butlers

Data Anonymizing and denaturing(i) Data brokers and separation algorithms to offer flexibility to service providers, yet respect user-predefined access rules [7584]
(ii) Generalization to mask personal data
(iii) Frameworks that provide emotion analytics lifecycle to allow denaturing

Digital Forgetting and Data Summarization(i) Delete encrypted data when decryption key is deleted [8590]
(ii) Acquire only the strictly needed data rather than all data
(iii) Apply knowledge discovery in databases and data mining technologies