Name:-Sutar Vaishnavi Dattatray ROLL NO:-5079 Subject:-Internet of Things (Credit Activity)

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 5

NAME:-SUTAR VAISHNAVI DATTATRAY

ROLL NO:-5079
SUBJECT:-INTERNET OF THINGS ( CREDIT ACTIVITY)
PRIVACY CONTROL IN IOT

Internet of Things privacy is the special considerations required to protect the information of individuals
from exposure in the IoT environment, in which almost any physical or logical entity or object can be given
a unique identifier and the ability to communicate autonomously over the Internet or similar network.

As endpoints (things) in the IoT environment transmit data autonomously, they also work in conjunction
with other endpoints and communicate with them. Interoperability of things is essential to the IoT’s
functioning so that, for example, networked elements of a home work together smoothly.
• The data transmitted by a given endpoint might not cause any privacy issues on its own. However, when
even fragmented data from multiple endpoints is gathered, collated and analyzed, it can yield sensitive
information.
PRIVACY CONTROL IN IOT

• The idea of networking appliances and other objects is relatively new, especially in terms of the global
connectivity and autonomous data transfer that are central to the Internet of Things. As such, security
has not traditionally been considered in product design, which can make even everyday household
objects points of vulnerability. Researchers at Context Information Security, for example, found a
vulnerability in a Wi-Fi-enabled light bulb that allowed them to request its Wi-Fi credentials and use
those credentials to get network access. 

• Michael Jordon, research director at Context Information Security commented on the need to address
the security and privacy issues related to the Internet of Things: “IoT security needs to be taken
seriously, particularly before businesses start to connect mission critical devices and systems.”
SECURITY IN IOT

Internet-of-Things (IoT) has been considered as a necessary part of our daily life with billions of IoT devices collecting data through wireless
technology and can interoperate within the existing Internet infrastructure. The new fog computing paradigm allows storing and processing
data at the network edge or anywhere along the cloud-to-endpoint continuum, and it also overcomes the limitations
System and software security is a crucial component to a device operating at its optimum from authentication and anti-virus protection to
vulnerability exploitation and modifications. The system and software contain more security issues when meeting the real IoT-Fog devices.
For wildly used Android devices, Z. Peng et al. gave a paper entitled “Hydra-Bite: Static Taint Immunity, Split, and Complot Based
Information Capture Method for Android Device.” The authors researched the Android system’s application layer to use the permission split
and reconstruct module to split traditional privacy stealing Trojan, and constructed a collaborative application group. The newly proposed
Hydra-Bite could resist the detecting and killing of multiple antivirus programs, which has higher information capture rate and stronger anti-
killing performance. To achieve the isolation and access control for virtual machines and IoT devices, J. Dong et al. proposed a paper entitled
“Task-Oriented Multilevel Cooperative Access Control Scheme for Environment with Virtualization and IoT.” In the scheme, each user of the
platform created tasks which could be divided into multiple levels to limit access between virtual machines and IoT terminal

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy