A Game of Fog and Mirrors: Privacy in the World of Internet of Things | SpringerLink
Skip to main content

A Game of Fog and Mirrors: Privacy in the World of Internet of Things

  • Conference paper
  • First Online:
Mobile Web and Intelligent Information Systems (MobiWIS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12814))

Abstract

Privacy challenges are a growing point of research in both political science and computer science as the pervasive nature of IoT devices turns Orwell’s dystopic state into a potential reality. This research maps out potential scenarios for IoT privacy challenges in the interdisciplinary effort to understand what it means to have privacy in world of internet-enabled sensors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sharma, C.: Iot data privacy framework. http://www.chetansharma.com/publications/iot-data-privacy-framework/. Accessed 9 Feb 2021

  2. Weiser, M.: Ubiquitous computing. Computer 26(10), 71–72 (1993) https://doi.org/10.1109/2.237456

  3. Carv, C.: https://getcarv.com/. Accessed 2 July 2021

  4. Oxford University Press: privacy, n. https://www.oed.com/view/Entry/151596?redirectedFrom=privacy. Accessed 11 Feb 2021

  5. European Union: Gdpr data privacy. https://gdpr.eu/data-privacy/. Accessed 11 Feb 2021

  6. Bentham, J., Bozovic, M.: The Panopticon Writings. Verso, New York (1995)

    Google Scholar 

  7. Chow, R.: The last mile for IoT privacy. IEEE Sec. Priv. 15(6), 73–76 (2017)

    Article  Google Scholar 

  8. Foucault, M.: Discipline and Punish: The Birth of the Prison. Pantheon Books, New York (1977)

    Google Scholar 

  9. Privacy International. Timeline IoT in court: https://privacyinternational.org/timelineiotincourt. Accessed 12 Feb 2021

  10. Orwell, G.: Centennial ed. Tandem Library, 1950 (1984)

    Google Scholar 

  11. Alwarafy, A., Al-Thelaya, K.A., Abdallah, M., Schneider, J., Hamdi, M.: A survey on security and privacy issues in edge computing-assisted internet of things. IEEE Internet Things J. 8(6), 1 (2020)

    Google Scholar 

  12. Tanczer, L.M., Steenmans, I., Elsden, M., Blackstock, J., Carr, M.: Emerging risks in the IoT ecosystem: who’s afraid of the big bad smart fridge? Living Internet Things: Cybersec. IoT 2018, 1–9 (2018)

    Google Scholar 

  13. Macropoulos, C., Martin, K.M.: Balancing privacy and surveillance in the cloud. IEEE Cloud Comput. 2(4), 14–21 (2015)

    Article  Google Scholar 

  14. Kounoudes, A.D., Kapitsaki, G.M.: A mapping of IoT user-centric privacy preserving approaches to the GDPR. Internet Things 11, 100179 (2020)

    Google Scholar 

  15. Thorburn, R., Margheri, A., Paci, F.: Towards an integrated privacy protection framework for IoT: contextualising regulatory requirements with industry best practices. In: Living in the Internet of Things (IoT 2019), pp. 1–6 (2019)

    Google Scholar 

  16. Davies, N., Taft, N., Satyanarayanan, M., Clinch, S., Amos, B.: Privacy mediators: helping IoT cross the chasm. In: Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, Series HotMobile 2016. Association for Computing Machinery, New York, pp. 39–44 (2016). https://doi.org/10.1145/2873587.2873600

  17. Bi, M., Wang, Y., Cai, Z., Tong, X.: A privacy-preserving mechanism based on local differential privacy in edge computing. China Commun. 17(9), 50–65 (2020)

    Article  Google Scholar 

  18. Brendan, M., Daniel, R.: Federated learning. https://ai.googleblog.com/2017/04/federated-learning-collaborative.html. Accessed 9 Feb 2021

  19. Jane, W.: BBC|Amazon faces spying claims over AI cameras in vans. https://www.bbc.com/news/technology-55938494. Accessed 4 Feb 2021

  20. Parkin, S., Patel, T., Lopez-Neira, I., Tanczer, L.: Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse. In: Proceedings of the New Security Paradigms Workshop, Series NSPW 2019. Association for Computing Machinery, New York, pp. 1–15 (2019). https://doi.org/10.1145/3368860.3368861

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tor-Morten Grønli .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Parker, A.F., Grønli, TM., Younas, M. (2021). A Game of Fog and Mirrors: Privacy in the World of Internet of Things. In: Bentahar, J., Awan, I., Younas, M., Grønli, TM. (eds) Mobile Web and Intelligent Information Systems. MobiWIS 2021. Lecture Notes in Computer Science(), vol 12814. Springer, Cham. https://doi.org/10.1007/978-3-030-83164-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-83164-6_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-83163-9

  • Online ISBN: 978-3-030-83164-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics