A Survey on Privacy Preservation Techniques in IoT Systems

Read the full article See related articles

Listed in

This article is not in any list yet, why not save it to one of your lists.
Log in to save this article

Abstract

We are living in the era of IoT systems where this technology supports our daily life in various aspects, whether it is our daily used Apple watches, our smart home systems, or our laptops. The goal is to make our everyday activities more convenient and more accessible by means of connectivity anytime, anywhere. The growth of IoT-based systems booms in the post-2020s with advanced network technologies like 5G and Edge Computing. The IoT-based systems are comparatively cost-effective and convenient to apply, especially in remote operations where manual intervention is impossible. Like other technologies, IoT applications also come with flaws and concerns. One of the main severe concerns nowadays is privacy and security issues related to IoT systems. Knowingly or unknowingly, we are being monitored by smart sensors or edge devices almost every moment, and our personal and professional sensitive information is being exposed to untrusted third parties like Google or Amazon. This is becoming a serious concern with the rapid expansion of IoT-based systems. In this survey paper, we have tried to categorically list and present the state-of-the-art techniques for privacy preservation in IoT-based systems in various application fields. Our work is a summary based on the 39 papers and two online reports that we chose to analyze to understand the current situation, privacy attacks, how to handle the sensitive data of the clients without breaching privacy and future directives in this fast-growing IoT-based systems.

Article activity feed