Route Map of Privacy Preservation to IOT

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Data anonymization is the main feature of privacy preservation, and it assists in eradicating the privacy hazard in data preparation in various applications including IoT. Pseudonymity and Anonymization are two significant security factors that were adopted when sensitive data are shared.  In medical field, data is usually distributed horizontally with diverse regions carrying a similar set of characteristics for various anonymization techniques. Accordingly, this paper intends to formulate a review on privacy preservation in IoT. Here, the literature analyses on diverse techniques associated with data hiding, data preservation and data anonymization along with data restoration properties. It reviews 60 research papers and states the significant analysis. Initially, the analysis depicts the chronological review of the overall contribution of different types of anonymization protocols in diverse applications. Subsequently, the analysis also focuses on various features such as applications, measures, key generation and data preservation in healthcare, etc. Furthermore, this paper provides the detailed performance study regarding data hiding and restoration process in each contribution. Finally, it extends the various research issues which can be useful for the researchers to accomplish further research on data preservation in IoT.


  • Keywords

    IoT, Privacy preservation, Data hiding, Data Restoration, Performance measures

  • References

      [1] A. K. Ilavarasi1 and B. Sathiyabhama, "An evolutionary feature set decomposition based anonymization for classification workloads: Privacy Preserving Data Mining", Cluster Computing, pp 1-11, 30 august 2017.
      [2] Peipei Sui, Xianxian Li, "A privacy-preserving approach for multimodal transaction data integrated analysis", Neurocomputing, vol. 253, pp. 56-64, 30 August 2017.
      [3] Dhasarathan Chandramohan, Thirumal Vengattaraman, Ponnurangam Dhavachelvan, "A secure data privacy preservation for on-demand cloud service", Journal of King Saud University - Engineering Sciences, vol. 29, no. 2, pp. 144-150, April 2017.
      [4] Soohyung Kim, Hyukki Lee, Yon Dohn Chung, "Privacy-preserving data cube for electronic medical records: An experimental evaluation", International Journal of Medical Informatics, vol. 97, pp. 33-42, January 2017.
      [5] Bingwen Feng, Jian Weng, Wei Lu, Bei Pei, "Steganalysis of content-adaptive binary image data hiding", Journal of Visual Communication and Image Representation, vol. 46, pp. 119-127, July 2017.
      [6] Shaowei Weng, Guohao Zhang, Jeng-Shyang Pan, Zhili Zhou, "Optimal PPVO-based reversible data hiding", Journal of Visual Communication and Image Representation, vol. 48, pp. 317-328, October 2017.
      [7] Zhi-Guo Chen , Ho-Seok Kang, Shang-Nan Yin and Sung-Ryul Kim, "An efficient privacy protection in mobility social network services with novel clustering-based anonymization", EURASIP journal on Wireless communications and networking, 2016.
      [8] Nan-I Wu, Min-Shiang Hwang, "Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images", Displays, vol. 49, pp. 116-123, September 2017.
      [9] Dawen Xu, Rangding Wang, Yani Zhu, "Tunable data hiding in partially encrypted H.264/AVC videos", Journal of Visual Communication and Image Representation, vol. 45, pp. 34-45, May 2017.
      [10] Jen-Chun Chang, Yi-Zhi Lu, Hsin-Lung Wu, "A separable RDHscheme for encrypted JPEG bitstreams", Signal Processing, vol. 133, pp. 135-143, April 2017.
      [11] Smita Agrawal, Manoj Kumar, "Mean value based RDHin encrypted images", Optik - International Journal for Light and Electron Optics, vol. 130, pp. 922-934, February 2017.
      [12] Kuo-Liang Chung, Chih-Yi Chiu, Tzu-Yu Yu, Po-Lin Huang, "Temporal and spatial correlation-based RDHfor RGB CFA videos", Information Sciences, vol. 420, pp. 386-402, December 2017.
      [13] Shuang Yi, Yicong Zhou, "Binary-block embedding for RDHin encrypted images", Signal Processing, vol. 133, pp. 40-51, April 2017.
      [14] Wenguang He, Jie Cai, Gangqiang Xiong, Ke Zhou, "Improved RDHusing pixel-based pixel value grouping", Optik - International Journal for Light and Electron Optics, 6 September 2017.
      [15] Somya Upadhyay, Chetana Sharma, Pravishti Sharma, Prachi Bharadwaj, K.R. Seeja, "Privacy preserving data mining with 3-D rotation transformation", Journal of King Saud University - Computer and Information Sciences, 28 November 2016.
      [16] Yan Li, Changxin Bai, Chandan K. Reddy, "A distributed ensemble approach for mining healthcare data under privacy constraints", Information Sciences, vol. 330, pp. 245-259, 10 February 2016.
      [17] HaydenWimmer, Victoria Y. Yoon, Vijayan Sugumaran, "Amulti-agent systemto support evidence based medicine and clinical decision making via data sharing and data privacy", Decision Support Systems, 24 May 2016.
      [18] Debanjan Sadhya, Sanjay Kumar Singh, "Privacy preservation for soft biometrics based multimodal recognition system", Computers & Security, vol. 58, pp. 160-179, May 2016.
      [19] Elahe Ghasemi Komishani, Mahdi Abadi, Fatemeh Deldar, "PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression", Knowledge-Based Systems, vol. 94, pp. 43-59, 15 February 2016.
      [20] Rong Jiang, Rongxing Lu, Kim-Kwang Raymond Choo, "Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data", Future Generation Computer Systems, 12 May 2016.
      [21] Samiha Marwan, Ahmed Shawish, Khaled Nagaty,"DNA-based cryptographic methods for data hiding in DNA media", Biosystems, vol. 150, pp. 110-118, December 2016.
      [22] Zhenxing Qian, Shu Dai, Fei Jiang, Xinpeng Zhang, "Improved joint RDHin encrypted images", Journal of Visual Communication and Image Representation, vol. 40, Part B, pp. 732-738, October 2016.
      [23] Liquan Chen, Zijuan Fan, Jie Huang, "Data hiding capacity of spatial domain bit replacement steganography in an MIMO-OFDM coding channel", AEU - International Journal of Electronics and Communications, vol. 70, no. 9, pp. 1295-1303, September 2016.
      [24] Iyad F. Jafar, Khalid A. Darabkh, Raed T. Al-Zubi, Ramzi R. Saifan,"An efficient RDHalgorithm using two steganographic images", Signal Processing, vol. 128, pp. 98-109, November 2016.
      [25] Yuling Liu, Xinxin Qu, Guojiang Xin, " A ROI-based RDHscheme in encrypted medical images", Journal of Visual Communication and Image Representation, vol. 39, pp. 51-57, August 2016.
      [26] Mritha Ramalingam, Nor Ashidi Mat Isa , "A data-hiding technique using scene-change detection for video steganography", Computers & Electrical Engineering, vol. 54, pp. 423-434, August 2016.
      [27] Iyad F. Jafar, Khalid A. Darabkh, Ramzi R. Saifan, "SARDH: A novel sharpening-aware RDHalgorithm", Journal of Visual Communication and Image Representation, vol. 39, pp. 239-252, August 2016.
      [28] M. Prakash, G. Singaravel, "An approach for prevention of privacy breach and information leakage in sensitive data mining", Computers & Electrical Engineering, vol. 45, pp. 134-140, July 2015.
      [29] Unil Yun, Jiwon Kim, "A fast perturbation algorithm using tree structure for privacy preserving utility mining", Expert Systems with Applications, vol. 42, no. 3, pp. 1149-1165, 15 February 2015.
      [30] Yiannis Kokkinos, Konstantinos G. Margaritis, "Confidence ratio affinity propagation in ensemble selection of neural network classifiers for distributed privacy-preserving data mining", Neurocomputing, vol. 150, Part B, pp. 513-528, 20 February 2015.
      [31] Bowonsak Srisungsittisunti, Juggapong Natwichai,"An incremental privacy-preservation algorithm for the (k, e)-Anonymous model", Computers & Electrical Engineering, vol. 41, pp. 126-141, January 2015.
      [32] Thai-Son Nguyen, Chin-Chen Chang, "A RDHscheme based on the Sudoku technique", Displays, vol. 39, pp. 109-116, October 2015.
      [33] Wien Hong, Tung-Shou Chen, Jeanne Chen, "RDHusing Delaunay triangulation and selective embedment",Information Sciences, vol. 308, pp. 140-154, 1 July 2015.
      [34] Chuan Qin, Xinpeng Zhang, "Effective RDHin encrypted image with privacy protection for image content", Journal of Visual Communication and Image Representation, vol. 31, pp. 154-164, August 2015.
      [35] Qian Mao, Fan Li, Chin-Chen Chang, "RDHwith oriented and minimized distortions using cascading trellis coding", Information Sciences, vol. 317, pp. 170-180, 1 October 2015.
      [36] Chih-Wei Shiu, Yu-Chi Chen, Wien Hong, "Encrypted image-based RDHwith public key cryptography from difference expansion", Signal Processing: Image Communication, vol. 39, Part A, pp. 226-233, November 2015.
      [37] Jimmy Ming-Tai Wu; Justin Zhan; Jerry Chun-Wei Lin, "Ant Colony System Sanitization Approach to Hiding Sensitive Itemsets",IEEE Journals & Magazines, vol. 5, pp. 10024 - 10039, 2017.
      [38] Lei Xu; Chunxiao Jiang; Yan Chen; Jian Wang; Yong Ren,"A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining", IEEE Journals & Magazines, vol. 49, no. 2, pp. 54-62, 2016.
      [39] Jun Zhou; Zhenfu Cao; Xiaolei Dong; Xiaodong Lin,"PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems", IEEE Journals & Magazines, vol. 9, no. 7, pp. 1332 - 1344, 2015.
      [40] Yuan Hong; Jaideep Vaidya; Haibing Lu; Panagiotis Karras; Sanjay Goel, "Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility", IEEE Journals & Magazines, vol.12, no. 5, pp. 504 - 518, 2015
      [41] Tianqing Zhu; Ping Xiong; Gang Li; Wanlei Zhou, "Correlated Differential Privacy: Hiding Information in Non-IID Data Set", IEEE Journals & Magazines, vol. 10, no. 2, pp. 229 - 242, 2015
      [42] Xuyun Zhang; Laurence T. Yang; Chang Liu; Jinjun Chen, "A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud", IEEE Journals & Magazines, vol. 25, no. 2, pp. 363 - 373, 2014.
      [43] Tamir Tassa; Dror J. Cohen, "Anonymization of Centralized and Distributed Social Networks by Sequential Clustering", IEEE Journals & Magazines, vol. 25, no. 2, pp. 311 - 324, 2013.
      [44] David S?nchez; Montserrat Batet; Alexandre Viejo,"Automatic General-Purpose Sanitization of Textual Documents", IEEE Journals & Magazines, vol. 8, no. 6, pp. 853 - 862, 2013.
      [45] Chen Xiaoyun; Su Yujie; Tang Xiaosheng; Huang Xiaohong; Ma Yan, " On measuring the privacy of anonymized data in multiparty network data sharing", IEEE Journals & Magazines, vol. 10, no. 5, pp. 120 - 127, 2013.
      [46] Mingxuan Yuan; Lei Chen; Philip S. Yu; Ting Yu, "Protecting Sensitive Labels in Social Network Data Anonymization", IEEE Journals & Magazines, vol. 25, no. 3, pp. 633 - 647, 2013.
      [47] Larry A. Dunning; Ray Kresman, "Privacy Preserving Data Sharing With Anonymous ID Assignment", IEEE Journals & Magazines, vol. 8, no. 2, pp. 402 - 413, 2013.
      [48] Lidan Shou; Xuan Shang; Ke Chen; Gang Chen; Chao Zhang,"Supporting Pattern-Preserving Anonymization for Time-Series Data", IEEE Journals & Magazines, vol. 25, no. 4, pp. 877 - 892, 2013.
      [49] Adeela Waqar, Asad Raza, Haider Abbas, Muhammad Khurram Khan,"A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata", Journal of Network and Computer Applications, vol.36, no.1, pp. 235-248, January 2013.
      [50] Rui Chen, Benjamin C.M. Fung, Noman Mohammed, Bipin C. Desai, Ke Wang, "Privacy-preserving trajectory data publishing by local suppression", Information Sciences, vol. 231, pp. 83-97, 10 May 2013.
      [51] Xuyun Zhang, Chang Liu, Surya Nepal, Jinjun Chen, "An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud", Journal of Computer and System Sciences, vol. 79, no. 5, pp. 542-555, August 2013.
      [52] R. Vidya Banu, N. Nagaveni, "Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario",Information Sciences, vol. 232, pp. 437-448, 20 May 2013.
      [53] J. Jesu Vedha Nayahi, V. Kavitha, "Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop",Future Generation Computer Systems, vol. 74, pp. 393-408, September 2017.
      [54] Soohyung Kim, Yon Dohn Chung, "An anonymization protocol for continuous and dynamic privacy-preserving data collection", Future Generation Computer Systems, 8 September 2017.
      [55] David F. Nettleton, Juli?n Salas, "A data driven anonymization system for information rich online social network graphs", Expert Systems with Applications, vol. 55, pp. 87-105, 15 August 2016.
      [56] Florian Kohlmayer, Fabian Prasser, Claudia Eckert, Klaus A. Kuhn, "A flexible approach to distributed data anonymization", Journal of Biomedical Informatics, vol. 50, pp. 62-76, August 2014.
      [57] Jiuyong Li, Jixue Liu, Muzammil Baig, Raymond Chi-Wing Wong, "Information based data anonymization for classification utility", Data & Knowledge Engineering, vol.70, no. 12, pp. 1030-1045, December 2011.
      [58] Guillermo Navarro-Arribasa,, Vicen￧ Torraa, Arnau Erolab, Jordi Castell¢-Roca, "User k-anonymity for privacy preserving data mining of query logs", Information Processing and Management, 8 February 2011.
      [59] Grigorios Loukides, Aris Gkoulalas-Divanis,"Utility-preserving transaction data anonymization with low information loss", Expert Systems with Applications, vol. 39, pp. 9764-9777, no. 10, August 2012.
      [60] Chin-Chen Chang, Ying-Hsuan Huang, Hsin-Yi Tsai, Chuan Qin, "Prediction-based RDHusing the difference of neighbouring pixels", AEU - International Journal of Electronics and Communications, vol. 66, no. 9, pp. 758-766, September 2012.
      [61] Fadi Al-Turjman, "Information-centric framework for the Internet of Things (IoT): Traffic modelling & optimization", Future Generation Computer Systems, In press, accepted manuscript, Available online 1 September 2017.
      [62] Angel Perles, Eva P←rez-Mar?n, Ricardo Mercado, J. Damian Segrelles, Fernando J. Garcia-Diego, "An energy-efficient internet of things (IoT) architecture for preventive conservation of cultural heritage", Future Generation Computer Systems, 26 July 2017.
      [63] Payton Lin, Dau-Cheng Lyu, Fei Chen, Syu-Siang Wang, Yu Tsao, "Multi-style learning with denoising autoencoders for acoustic modeling in the internet of things (IoT)", Computer Speech & Language, vol. 46, pp. 481-495, November 2017.
      [64] Gang Sun, Victor Chang, Muthu Ramachandran, Zhili Sun, Dan Liao, "Efficient location privacy algorithm for Internet of Things (IoT) services and applications" Journal of Network and Computer Applications, vol. 89, pp. 3-13, 1 July 2017.
      [65] Koko Friansa, Irsyad Nashirul Haq, Bening Maria Santi, Deddy Kurniadi, Brian Yuliarto,"Development of Battery Monitoring System in Smart Microgrid Based on Internet of Things (IoT)", Procedia Engineering, vol. 170, pp. 482-487, 2017.
      [66] Vlad Krotov, "The Internet of Things and new business opportunities", Business Horizons, 12 September 2017.
      [67] Oladayo Bello, Sherali Zeadally, Mohamad Badra, "Network layer inter-operation of Device-to-Device communication technologies in Internet of Things (IoT)", Ad Hoc Networks, vol. 57, pp. 52-62, 15 March 2017.
      [68] In Lee, Kyoochun Lee, "The Internet of Things (IoT): Applications, investments, and challenges for enterprises",Business Horizons, vol. 58, no. 4, pp. 431-440, July-August 2015.
      [69] Maria Ganzha, Marcin Paprzycki, Wies?aw Paw?owski, Pawe? Szmeja, Katarzyna Wasielewska, " Semantic interoperability in the Internet of Things: An overview from the INTER-IoT perspective", Journal of Network and Computer Applications, vol. 81, pp. 111-124, 1 March 2017.
      [70] Hyung-Jun Yim, Dongmin Seo, Hanmin Jung, Moon-Ki Back, Kyu-Chul Lee, "Description and classification for facilitating interoperability of heterogeneous data/events/services in the Internet of Things", Neurocomputing, vol. 256, pp. 13-22, 20 September 2017.
      [71] Wen-Chung Kuo, Chun-Cheng Wang, Hong-Ching Hou, "Signed digit data hiding scheme", Information Processing Letters, vol. 116, no. 2, pp. 183-191, February 2016.
      [72] Wen-Chung Kuo, Chun-Cheng Wang, Yu-Chih Huang, "Binary power data hiding scheme", AEU - International Journal of Electronics and Communications, vol. 69, no. 11, pp. 1574-1581, November 2015.
      [73] Thai-Son Nguyen, Chin-Chen Chang, Wen-Chi Chang, "High capacity RDHscheme for encrypted images", Signal Processing: Image Communication, vol. 44, pp. 84-91, May 2016.
      [74] Shaohui Liu, Seungmin Rho, Worku Jifara, Feng Jiang, Chun Liu, "A hybrid framework of data hiding and encryption in H.264/SVC", Discrete Applied Mathematics, 21 September 2016.
      [75] 75. Reza Moradi Rad, KokSheik Wong, Jing-Ming Guo, "RDHby adaptive group modification on histogram of prediction errors", Signal Processing, vol. 125, pp. 315-328, August 2016.
      [76] Yunxia Liu, Leiming Ju, Mingsheng Hu, Hongguo Zhao, Zhijuan Jia, "A new data hiding method for H.264 based on secret sharing", Neurocomputing, vol. 188, 5 May 2016, pp. 113-119.
      [77] Hai-yang Ding, Yi-xian Yang, "Data hiding in color halftone images based on new conjugate property", Computers & Electrical Engineering, 1 July 2016.
      [78] Neethu Thomas, Shiney Thomas, "A Low Distortion RDHTechnique Using Improved PPVO Predictor", Procedia Technology, vol. 24, pp. 1317-1324, 2016.
      [79] Heng Yao, Chuan Qin, Zhenjun Tang, Ying Tian, "Guided filtering based color image reversible data hiding", Journal of Visual Communication and Image Representation, vol. 43, pp. 152-163, February 2017.
      [80] Hsiang-Cheh Huang, Feng-Cheng Chang, "Hierarchy-based reversible data hiding", Expert Systems with Applications, vol. 40, no. 1, pp. 34-43, January 2013.
      [81] Kuan Zhang, Xiaohui Liang, Mrinmoy Baura, Rongxing Lu, Xuemin (Sherman) Shen, "PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs", Information Sciences, vol. 284, pp. 130-141, 10 November 2014.
      [82] Ra?l Pardo, Musard Balliu, Gerardo Schneider, "Formalising privacy policies in social networks", Journal of Logical and Algebraic Methods in Programming, vol. 90, pp. 125-157, August 2017.
      [83] Yuan Chi, Jun Hong, Anna Jurek, Weiru Liu, Dermot O'Reilly, "Privacy preserving record linkage in the presence of missing values", Information Systems, vol. 71, pp. 199-210, November 2017.
      [84] Xuyun Zhang, Chang Liu, Surya Nepal, Jinjun Chen, "An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud", Journal of Computer and System Sciences, vol. 79, no. 5, pp. 542-555, August 2013.
      [85] Nirali Nanavati, Devesh Jinwala, "Privacy Preservation for Global Cyclic Associations in Distributed Databases", Procedia Technology, vol. 6, pp. 962-969, 2012.
      [86] Farzana Rahman, Md Zakirul Alam Bhuiyan, Sheikh Iqbal Ahamed, "A privacy preserving framework for RFID based healthcare systems", Future Generation Computer Systems, vol. 72, pp. 339-352, July 2017.
      [87] Alsharif Abuadbba, Ibrahim Khalil, Mohammed Atiquzzaman, "Robust privacy preservation and authenticity of the collected data in cognitive radio network-Walsh-Hadamard based steganographic approach", Pervasive and Mobile Computing, vol. 22, pp. 58-70, September 2015.
      [88] Rajen Akalu, "Privacy, consent and vehicular ad hoc networks (VANETs)", Computer Law & Security Review, 3 July 2017.
      [89] Kun Xie, Xueping Ning, Xin Wang, Shiming He, Zheng Qin, "An efficient privacy-preserving compressive data gathering scheme in WSNs", Information Sciences, vol. 390, pp. 82-94, June 2017.
      [90] Jos← M. de Fuentes, Lorena Gonz?lez-Manzano, Juan Tapiador, Pedro Peris-Lopez, "PRACIS: Privacy-preserving and aggregatable cyber security information sharing", Computers & Security, vol. 69, pp. 127-141, August 2017.




Article ID: 11076
DOI: 10.14419/ijet.v7i2.7.11076

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.