Privacy-Preserving Internet of Things: Techniques and Applications
Andrew J1, Karthikeyan J2

1Andrew J*, Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India.
2Karthikeyan J, School of Information Technology Engineering, VIT University, Vellore, India.
 Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 3229-3234 | Volume-8 Issue-6, August 2019. | Retrieval Number: F8830088619/2019©BEIESP | DOI: 10.35940/ijeat.F8830.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Privacy has become an imperative term in the recent technology developments. Lots of data are being collected through every digital activity of users. The expeditious development of IoT applications have raised the concern about the privacy of the IoT systems. The data collected via IoT sensors can reveal the daily behavior of the users, location, and other sensitive information. Hence, it is necessary to preserve the privacy of data collected by IoT devices. A large number of techniques and approaches have been implemented and used in different IoT based applications such as cloud computing based IoT, fog computing based IoT, blockchain based IoT and trajectory applications. In this paper, we present a detailed investigation of the existing approaches to preserve the privacy of data in IoT applications. The techniques like k-anonymity, secure multiparty computation, attribute based encryption and homomorphic encryption are analyzed. Finally, a comparative analysis of privacy preserving techniques with its applications are presented.
Keywords: Privacy-preserving, IoT, Fog Computing, Cloud Computing, K-anonymity, Homomorphic Encryption, secure multi-party computation, attribute based encryption.