Escolar Documentos
Profissional Documentos
Cultura Documentos
Karthik Ravi
1PI14CS048
5th sem, CSE
1PI14CS048
ABSTRACT
Data today is more critical than ever
IoT, cloud computing, and data analytics
are making it easy to effectively collect
data (big data)
For Data to be used to their full power, data
security and privacy are critical
We discuss relevant concepts and
approaches for data security and privacy
1PI14CS048
INTRODUCTION
Data are today more critical and relevant than ever.
Technological advances and novel applications, such as sensors,
smart mobile devices, cloud systems, data analytics, social
networks, Internet of Things (IoT), are making possible to
collect, store, and process huge amounts of data, referred to as
big data,
The combination of big data and IoT technologies - that we
refer to as pervasive big data (PBD) technologies
As our reliance on PBD technologies increases, the security and
privacy of data managed by PBD systems become crucial.
1PI14CS048
Literature Survey
Database SecurityConcepts, Approaches, and Challenges
Literature Survey
Efficient k-Anonymization Using Clustering Techniques
Literature Survey
OWASP Internet of Things Project
The OWASP Internet of Things Project is designed to help manufacturers, developers, and
consumers better understand the security issues associated with the Internet of Things, and to
enable users in any context to make better security decisions when building, deploying, or
assessing IoT technologies.
The project looks to define a structure for various IoT sub-projects such as Attack Surface
Areas, Testing Guides and Top Vulnerabilities.
Data Privacy:
By Correlating big data sets one can extract private information
For data privacy we need to look at:
Techniques to control what is extracted
Support for both personal privacy and population privacy
Privacy implications on data quality.
Data ownership : stake holders (eg law enforcement agency accessing
user data without users knowledge legally)
Data lifecycle framework.
Data acquisition (eg recording without permission)
Data sharing (eg sharing without permission)
IoT Risks
IoT Risks
IoT vulnerabilities arise due to the lack of adoption of well-known security
techniques, such as encryption, authentication, access control
This is also due to the variety of hardware platforms and limited computing
resources of IoT devices
Information is typically collected from devices and then uploaded to cloud
platforms or transmitted to mobile devices
This info is very rich and contains meta-data (eg location, time) thus making
it easy to infer personal habits, and behaviour of individuals using these
devices
Such information needs to carefully protected
Users should be provided with suitable, easy to use tools for protecting their
privacy and support anonymity
Cryptographic Protocols.
Application Security.
Network Security.
Conclusion
In this paper we has discussed research directions in big data
confidentiality and privacy, and IoT data security
References
[1] E. Bertino, R. Sandhu, Database Security Concepts, Approaches, and
Challenges, IEEE Trans. Dependable Sec. Comput. 2(1):2-19 (2005)
[2] J.-W. Byun, A. Kamra, E. Bertino, N. Li, Efficiently k- Anonymization Using
Clustering Techniques, Proceedings of the 12th International Conference on Database
Systems for Advanced Applications (DASFAA 2007), Bangkok, Thailand, April 9-12,
2007. LNCS, Springer.
[3] https://www.owasp.org/index.php/OWASP_Internet_of_Things_Proj ect