Designing privacy-aware internet of things applications

Journal article


Perera, Charith, Barhamgi, Mahmoud, Bandara, Arosha K., Ajmal, Muhammad, Price, Blaine and Nuseibeh, Bashar 2019. Designing privacy-aware internet of things applications. Elsevier Information Sciences. https://doi.org/10.1016/j.ins.2019.09.061
AuthorsPerera, Charith, Barhamgi, Mahmoud, Bandara, Arosha K., Ajmal, Muhammad, Price, Blaine and Nuseibeh, Bashar
Abstract

Internet of Things (IoT) applications typically collect and analyse personal data that can be used to derive sensitive information about individuals. However, thus far, privacy concerns have not been explicitly considered in software engineering processes when designing IoT applications. With the advent of behaviour driven security mechanisms, failing to address privacy concerns in the design of IoT applications can also have security implications. In this paper, we explore how a Privacy-by-Design (PbD) framework, formulated as a set of guidelines, can help software engineers integrate data privacy considerations into the design of IoT applications. We studied the utility of this PbD framework by studying how software engineers use it to design IoT applications. We also explore the challenges in using the set of guidelines to influence the IoT applications design process. In addition to highlighting the benefits of having a PbD framework to make privacy features explicit during the design of IoT applications, our studies also surfaced a number of challenges associated with the approach. A key finding of our research is that the PbD framework significantly increases both novice and expert software engineers’ ability to design privacy into IoT applications.

KeywordsInformation Systems and Management; Artificial Intelligence; Computer Science Applications
Year2019
JournalElsevier Information Sciences
PublisherElsevier BV
ISSN0020-0255
Digital Object Identifier (DOI)https://doi.org/10.1016/j.ins.2019.09.061
Web address (URL)http://hdl.handle.net/10545/624931
hdl:10545/624931
Publication dates28 Sep 2019
Publication process dates
Deposited25 Jun 2020, 15:36
Accepted24 Sep 2019
ContributorsCardiff University, Universite Claude Bernard Lyon, Open University, United Kingdom and University of Derby
File
File Access Level
Open
Permalink -

https://repository.derby.ac.uk/item/921y7/designing-privacy-aware-internet-of-things-applications

Download files

  • 68
    total views
  • 0
    total downloads
  • 5
    views this month
  • 0
    downloads this month

Export as

Related outputs

Large-scale Data Integration Using Graph Probabilistic Dependencies (GPDs)
Zada, Muhammad Sadiq Hassan, Yuan, Bo, Anjum, Ashiq, Azad, Muhammad Ajmal, Khan, Wajahat Ali and Reiff-Marganiec, Stephan 2020. Large-scale Data Integration Using Graph Probabilistic Dependencies (GPDs). IEEE. https://doi.org/10.1109/bdcat50828.2020.00028
Persation: an IoT based personal safety prediction model aided solution
Alofe, Olasunkanmi Matthew, Fatema, Kaniz, Azad, Muhammad Ajmal and Kurugollu, Fatih 2020. Persation: an IoT based personal safety prediction model aided solution. International Journal of Computing and Digital Systems.
Privacy-preserving crowd-sensed trust aggregation in the user-centeric internet of people networks
Azad, Muhammad, Perera, Charith, Bag, Samiran, Barhamgi, Mahmoud and Hao, Feng 2020. Privacy-preserving crowd-sensed trust aggregation in the user-centeric internet of people networks. ACM Transactions on Cyber-Physical Systems. https://doi.org/10.1145/3446431
Authentic-caller: Self-enforcing authentication in a next generation network
Azad, Muhammad Ajmal, Bag, Samiran, Perera, Charith, Barhamgi, Mahmoud and Hao, Feng 2019. Authentic-caller: Self-enforcing authentication in a next generation network. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/tii.2019.2941724
CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles
Rathee, Geetanjali, Ahmad, F., Kurugollu, Fatih, Azad, Muhammad, Iqbal, Razi and Imran, Muhammad 2020. CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles. IEEE Transactions on Intelligent Transportation Systems. https://doi.org/10.1109/TITS.2020.3004718
A first look at privacy analysis of COVID-19 contact tracing mobile applications
Azad, Muhammad Ajmal, Arshad, Junaid, Akmal, Syed Muhammad Ali, Riaz, Farhan, Abdullah, Sidrah, Imran, Muhammad and Ahmad, F. 2020. A first look at privacy analysis of COVID-19 contact tracing mobile applications. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3024180
PriVeto: a fully private two round veto protocol.
Samiran, Bag, Muhammad Ajmal, Azad and Feng, Hao 2018. PriVeto: a fully private two round veto protocol. IET Information Security. https://doi.org/10.1049/iet-ifs.2018.5115
M2M-REP: Reputation system for machines in the internet of things.
Azad, Muhammad Ajmal, Bag, Samiran, Hao, Feng and Salah, Khaled 2018. M2M-REP: Reputation system for machines in the internet of things. Computers & Security. 79, pp. 1-16. https://doi.org/10.1016/j.cose.2018.07.014
Consumer-facing technology fraud: Economics, attack methods and potential solutions
Mohammed Aamir, Ali, Muhammad AJmal, Azad, Mario Parreno, Centeno, Feng, Hao and Aad Van, Moorsel 2019. Consumer-facing technology fraud: Economics, attack methods and potential solutions. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2019.03.041
TrustVote: Privacy-preserving node ranking in vehicular networks
Muhammad AJmal, Azad, Samiran, Bag, Simon, Parkinson and Feng, Hao 2018. TrustVote: Privacy-preserving node ranking in vehicular networks. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2018.2880839
Pervasive blood pressure monitoring using Photoplethysmogram (PPG) Sensor
Riaz, Farhan, Azad, Muhammad, Arshad, Junaid, Imran, Muhammad, Hassan, Ali and Rehmad, Saad 2019. Pervasive blood pressure monitoring using Photoplethysmogram (PPG) Sensor. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2019.02.032