Loading...

IoT: User Privacy and Solutions

With Internet of thing (IoT) on the move more and more devices are getting connected each day. This technology will ease up the life to a level we never even dreamed about. Its forecasts are positive and so are business opportunities associated with it, that's why everybody in the market is after this technology.

We don't know exactly how many devices will be connected together by 2020 but a rough estimate says it will be over 20 billion. With the advent of IPv6 we will have zillions of IP addresses which means every single particle on this earth can have an IP address. This innovation in computer networking paved the way to roll out IoT, which is a gigantic network of billions of devices on earth.

In the world of IoT everyone will be after data. The data which a network of a vast number of interconnected sensors will generate, will be used by the manufacturer's to provide services, solutions and products to their consumers. IoT is expected to attract a market of trillions of dollars or may be more than that.

This is a technology made upon gathering information about humans. So the first question that ultimately comes in every consumer mind is whether my privacy is intact in this system or not? Well in IoT privacy is redefined. It no longer means that nobody is allowed to gather your personal information. In IoT privacy means that your personal information will remain in the hands of your trusted ally only. As long as it's in their hands, your privacy will remain intact.

Everyone of us owns his privacy and nobody willing to share this with anyone else. Getting monitored via your devices by your service provider may not be a big concern, but leakage of such data to any illegitimate party is the biggest concern in the mind of consumers. Privacy and security should not be an afterthought in IoT in order to be reach out and accepted by the masses.

In our opinion, privacy and security of data will be one of the biggest challenges in IoT. Take an example of a smart home, for example, can somebody guarantee that the home data that devices installed there will generate will be handled by the right people, and for the right purposes? The answer to this is yet to be given by so many parties monitoring that house. We can extend this question to smart buildings, smart schools, smart cities and so on.

In IoT there will be lots of companies that will know lot about you without even realizing you that you are being monitored by so many folks round the clock . A smart phone nowadays is not a phone anymore, it's a multipurpose computer that stays and go wherever you go, collects and transmits every of your data like, your banking information, your shopping habits, your weekly schedule, your health status and much more. All this data will be utilized by companies who provide services related to banking, shopping and health care. A smart phone represents just a single entity that supplies your data to cloud of companies monitoring you. In IoT there will be many such devices associated with a single person.

But we should never fear great new innovations, not Internet of Things. See if the ancient people gave up using fire because of its negative effects like it burns, kills, turns everything into an ash, we wouldn't be befitted today by its positive effects. Today we know fire is best servant and worse master that's why we use it with full safety to enjoy its benefits. This same principle should be applied to every new innovations including IoT.

IoT no doubt presents complex security challenges in data privacy and safety. As I said earlier as long as our data is within the hands of legitimate authorities, we are safe else not. It's a simple binary scenario not very complex. Traditionally cyber security experts say that as we make a device secure, we make it less usable. And to secure the things we have to think with evil mind i.e. from the perspective of hackers. Because from these hackers and bad guys we have to save our privacy and to keep them away best solution is start thinking their way, to device ideas for safety.

With so many entry points in IoT infrastructure, it will be a dreamland for hackers. As the incentives for breaking into this world are far from imagination. Just think how it would be if your perfect IoT world got hacked when you don't even know about it. Just imagine what you can gain with that level of control and information access if you would be a hacker, that's why hackers also classify it as cliff top. On getting successful hackers may get access to your whole home security system, or got an access to your car locking system. These are just a few samples.

This can be taken as an exciting time for innovation in the field of "security of privacy" in IoT. As in IoT we have to secure devices that don't support firewalls, don't have encryption capabilities built into them, embedded devices that don't have operating systems running over them.

The two corner stone's of security in IoT will be Authentication and Encryption. Authentication is a onetime process between the client and its server before actual communication starts. Authentication enables both client and its server to validate each other before starting transmission. Encryption is an ongoing process that remains there until the whole data is transmitted. There are many devices in IoT which are unable to perform encryption.

One of new product introduced to implement encryption in IoT is BitBox ( http://www.bitcircle.com/). It is designed to connect and collect data from all your Iot devices. Each piece of data will be individually encrypted before transmitting to a third party cloud. Any eavesdropper getting your data has to decrypt each piece of data. This is just one example of implementing encryption in IoT devices.

There is a well known saying in cyber world that there is no such thing as security, there are just levels of insecurity. We can't shut down all current and future loopholes in IoT. But to minimize risk associated with it, we see it as a never ending job. As Bad guys will never refrain from finding vulnerabilities and getting inside this technology. That's why privacy and security of user data will remain a main concern. Some say it will be a very complex social issue.



Tags: IoT   Privacy  

Contact Me

Online

Contact: Internet Of Things and Stuff.

Address: Baltimore, MD, USA

Contact Me Report Abuse

Error 404 - page not found

Ohh... You have requested the page that is no longer there.

View By Countries

We use cookies on our site to improve your experience

PLEASE READ CAREFULLY BEFORE USING THIS WEBSITE:

We use cookies on our site to improve your experience.This site uses cookies to store information on your computer or device. This policy explains how we use cookies and may be amended, from time to time, without notice. To ensure that you are using this site with full and up-to-date information of how we use cookies please review this policy regularly as any amended policy will be updated on the site. By using this site you agree to the placement of cookies on your computer and or device in accordance with the terms of this policy. If you do not wish to accept cookies from this site please either disable cookies or refrain from using this site.

What are Cookies?

A cookie is a text-only string of information that a website transfers to the cookie file of the browser on your computer's hard disk or other devices so that the website can recognize you when you revisit and remember certain information about you. This can include which pages you have visited, choices you have made from menus, any specific information you have entered into forms and the time and date of your visit.

Types of Cookies

There are two main types of cookies:

Session cookies: these are temporary cookies that expire at the end of a browser session; that is, when you leave the site. Session cookies allow the website to recognize you as you navigate between pages during a single browser session and allow you to use the website most efficiently. For example, session cookies enable a website to remember that a user has placed items in an online shopping basket.

Persistent cookies: in contrast to session cookies, persistent cookies are stored on your equipment between browsing sessions until expiry or deletion. They therefore enable the website to "recognize" you on your return remember your preferences and tailor services to you.

In addition to session cookies and persistent cookies, there may be other cookies which are set by the website which you have chosen to visit, such as this website, in order to provide us or third parties with information.

Our use of Cookies

We currently use, and may use in the future, the following types of cookies on this website.

We use session cookies to:

help us maintain security and verify your details whilst you use the website as you navigate from page to page, which enables you to avoid having to re-enter your details each time you enter a new page.

We use persistent cookies to:

help us recognize you as a unique user when you return to our website so that you do not have to input your details multiple times as you move between our pages or services

remember how you have customised your use of this site, such as your preferred currency and time zone

collect and compile anonymous, aggregated information for statistical and evaluation purposes to help us understand how users use the website and help us improve the structure of our website.

Many cookies are designed to give you optimal usage of the web. For example, we use cookies to enable you to improve your user experience when using our website, e.g. a cookie which recognizes if your browser supports specific technology features. This helps, for example, in enabling web pages to be loaded more quickly when you request the download of a large file.

In addition to cookies which send information to us, we also use cookies which collect information and send it to third parties. An example of this is Google Analytics. Please check the relevant third party website for more information about their use of cookies. Where this site allows such cookies to be set or you access other websites from this site using the links provided, the operators of these websites will use cookies in accordance with their own cookies policy, which may differ from ours.

As with first party cookies, you are able to block third party cookies through your browser settings.

Some of our cookies may collect and store your personal information, such as your name or email address. We are committed to respecting and protecting your privacy and will ensure that all personal information collected by us is kept and treated in accordance with our privacy policy.

Refusing Cookies on this Site

Most browsers are initially set to accept cookies. However, you have the ability to disable cookies if you wish, generally through changing your internet software browsing settings. It may also be possible to configure your browser settings to enable acceptance of specific cookies or to notify you each time a new cookie is about to be stored on your computer or device enabling you to decide whether to accept or reject the cookie. To manage your use of cookies there are various resources available to you, for example the "Help" section on your browser may assist you. You can also disable or delete the stored data used by technology similar to cookies, such as Local Shared Objects or Flash cookies, by managing your browser's "add-on settings" or visiting the website of its manufacturer. As our cookies allow you to access some of our website's essential features we recommend that you leave cookies enabled, otherwise, if cookies are disabled, it may mean that you experience reduced functionality or will be prevented from using this site altogether.