Challenges and Concerns of Privacy in Internet of Things

International Journal of Computer Science and Engineering
© 2016 by SSRG - IJCSE Journal
Volume 3 Issue 2
Year of Publication : 2016
Authors : Gousiya Begum, Dr.M.Ramabai, Dr.M.Chandra Mohan

How to Cite?

Gousiya Begum, Dr.M.Ramabai, Dr.M.Chandra Mohan, "Challenges and Concerns of Privacy in Internet of Things," SSRG International Journal of Computer Science and Engineering , vol. 3,  no. 2, pp. 22-27 , 2016. Crossref,


Many conventional cryptographic systems have homomorphic properties, yet there was no need of homomorphisms and little attention was paid to it. The ability to process encrypted data led to a renewed interest in Homomorphisms and a new cryptographic primitive, Fully Homomorphic Encryption (FHE) emerged. With time, question arose as to whether FHE is possible or not which has now modified as whether FHE is applicable or not. This paper provides a brief survey focusing on the development of HE to FHE and discussing all relevant research works in this direction in one section. The second section discusses the applications of FHE. The last section describes briefly some of the research works aiming at Searching/Sorting through FHE.


IoT(Internet of Things), BIGDATA, privacy.


[1] Dr. Ovidiu Vermesan, Dr. Peter Friess,"Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems", River Publishers
[2] Andrea Molinari, Vincenzo Maltese, Lorenzino Vaccari, Andrea Almi , Eleonora Bassi,”Smart Cities White Papers Big Data and Open Data for a Smart City”, IEEE TN
[3] U.S. Federal Trade Commissioner Julie Brill,” Privacy and Data Security in the Age of Big Data and the Internet of Things”, Washington Governor Jay Insleeā€Ÿs Cyber Security and Privacy Summit, January 5, 2016
[4] “Simplified IoT Architecture”, October 2, 2014
[5] Shanzhi Chen, HuiXu, DakeLiu, Bo Hu, and Hucheng Wang, “A Vision of IoT: Applications, Challenges and Opportunities With China Perspective”, IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 4, AUGUST 2014
[6] R. Kranenburg and A. Bassi, “IoT challenges,” Commun. Mobile Comput.,vol. 1, no. 1, pp. 1–5, 2012.
[7] Y. Chen et al., “Time-reversal wireless paradigm for green Internet of Things: An overview,” IEEE Internet Things J., vol. 1, no. 1, pp. 81–98, Feb. 2014.
[8] S. Lanzisera et al., “Communicating power supplies: Bringing the internet to the ubiquitous energy gateways of electronic devices,” IEEE Internet Things Journal., vol. 1, no. 2, pp. 153–160, Apr. 2014.
[9] H. Ning et al., “Cyberentity security in the Internet of Things,” Computer, vol. 46, no. 4, pp. 46–53, Apr. 2013.
[10] J. Golbeck and M. L. Mauriello, “User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns,” University of Maryland, Maryland, 2014.
[11] D. Miorandi, S. Sicari, F. D. Pellegrini and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks , vol. 10, no. 7, pp. 1497- 1516, 2012.
[12] H. Sundmaeker, P. Guillemin, P. Friess and S. Woelffle, “Vision and Challenges for Realising the Internet of Things,” Cluster of European Research Projects on the Internet of Things, 2010.
[13] European Commission, “Proposal For A Regulation Of The European Parliament And Of The Council,” European Commission, Brussels, 2012.
[14] TRUSTe, “Internet of Things Industry Brings Data Explosion, but Growth Could be Impacted by Consumer Privacy Concerns,” TRUSTe Research, 29.05.2014. Available: things-industry-brings-data-explosion-but-growth-couldbe- impacted-by-consumer-privacy-concerns/.
[15] A. B. Brush, E. Filippov, D. Huang, J. Jung, R. Mahajan, F. Martinez, K. Mazhar, A. Phanishayee, A. Samuel, J. Scott and R. P. Singh, “Lab of Things: A Platform for Conducting Studies with Connected Devices in Multiple Homes,” in Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication, New York, NY, USA, 2013.