
A study On : Confidentiality Approach to Prevent Features Disclosure in IoT Situations
Author(s) -
Frimpong Atta Junior Osei,
Sidique Gawusu,
Xuezhi Wen,
Yu Zheng,
Daniel Appiah Kumah
Publication year - 2020
Publication title -
international journal of scientific research in computer science, engineering and information technology
Language(s) - English
Resource type - Journals
ISSN - 2456-3307
DOI - 10.32628/cseit2063146
Subject(s) - anonymity , computer science , confidentiality , object (grammar) , closeness , computer security , internet privacy , scheme (mathematics) , unitary state , core (optical fiber) , artificial intelligence , mathematics , mathematical analysis , telecommunications , political science , law
This paper proposes an approach which safeguards confidentiality to avoid disclosures of features within a multiple IoT situation, that is, a setup of objects in networks that communicate with each other. Two ideas derived from the theory of databases, namely k-anonymity and t-certitude, form our basis. They are used to cluster the objects to provide a unitary view of them and their characteristics. In fact, the use of anonymity and t-closeness robustly ensures privacy for derived groups. Furthermore, description of the object grouping scheme that preserves privacy, which represents the core of our approach was studied. Eventually, we illustrated the corresponding security model and analyzed the associated properties. The study also provided important advantages for the protection of user privacy in all those situations where knowledge of object features may help an attacker to obtain information about user habits and behavior. This study prevents not only the disclosure of information but also the divulgation of features. This is a major strength of our approach as malicious analyzes of the characteristics of objects can interfere with the privacy of people.