Review Article
Towards Privacy Preserving IoT Environments: A Survey
Table 3
Summary of privacy preserving proposed solutions in IoT environments.
| Solution | Summary | References |
| Authentication and Authorization | (i) Lightweight authentication and key establishment mechanisms | [64–68] | (ii) Frameworks based on device fingerprinting techniques | (iii) Context-aware access control models and enforcing mechanisms |
| Edge Computing and plug in architecture | (i) Software modules on the edge to overcome privacy concerns | [69–74] | (ii) Privacy aware systems to allow user control over data | (iii) Decentralized architectures based on Personal-Cloud Butlers |
| Data Anonymizing and denaturing | (i) Data brokers and separation algorithms to offer flexibility to service providers, yet respect user-predefined access rules | [75–84] | (ii) Generalization to mask personal data | (iii) Frameworks that provide emotion analytics lifecycle to allow denaturing |
| Digital Forgetting and Data Summarization | (i) Delete encrypted data when decryption key is deleted | [85–90] | (ii) Acquire only the strictly needed data rather than all data | (iii) Apply knowledge discovery in databases and data mining technologies |
|
|