Foundations and Trends® in Privacy and Security > Vol 7 > Issue 1

Advances in Secure IoT Data Sharing

By Phu Nguyen, SINTEF, Norway, phu.nguyen@sintef.no | Arda Goknil, SINTEF, Norway, arda.goknil@sintef.no | Gencer Erdogan, SINTEF, Norway, gencer.erdogan@sintef.no | Shukun Tokas, SINTEF, Norway, shukun.tokas@sintef.no | Nicolas Ferry, Université Côte d’Azur, French, Nicolas.FERRY@univ-cotedazur.fr | Thanh Thao Thi Tran, DnB, Norway, thaotran98@hotmail.com

 
Suggested Citation
Phu Nguyen, Arda Goknil, Gencer Erdogan, Shukun Tokas, Nicolas Ferry and Thanh Thao Thi Tran (2024), "Advances in Secure IoT Data Sharing", Foundations and Trends® in Privacy and Security: Vol. 7: No. 1, pp 1-73. http://dx.doi.org/10.1561/3300000042

Publication Date: 28 Nov 2024
© 2024 P. Nguyen et al.
 
Subjects
Data integration and exchange,  Private and secure data management,  Peer-to-peer, sensornet and mobile data management,  Data stream management,  Metadata management,  Cyber-physical systems security and privacy,  Access control,  Security and privacy,  Cryptology and data security
 

Free Preview:

Download extract

Share

Download article
In this article:
1. Introduction
2. Background
3. Review Process
4. A Classification Schema / Taxonomy
5. Results
6. Threats to Validity
7. Related Work
8. Conclusions
Acknowledgements
References

Abstract

The proliferation of IoT devices on the Internet is currently in the billions, and projections anticipate that there will be 50 billion connected IoT devices in the IoT market by 2030. This rapid expansion will result in a substantial increase in data, which includes personal data, generated by these IoT devices. It is estimated that the data volume will reach 73.1 zettabytes by 2025. To fully realize the substantial benefits of the IoT, it is imperative to facilitate the responsible utilization and sharing of this data among various stakeholders. However, it is crucial to establish robust security and trust mechanisms to ensure data integrity and privacy during data sharing. Our objective is to summarize and assess the research efforts that address secure IoT data sharing. We systematically review the state-of-the-art techniques ensuring and preserving security in the IoT data-sharing environment through a systematic literature review (SLR) study. We pose three research questions, define selection and exclusion criteria for primary studies, and extract and synthesize data from these studies to answer our research questions. Our SLR results can help readers to obtain (i) an overview of existing secure IoT data-sharing approaches and related issues, (ii) a deep-dive into Edge-focused secure IoT data sharing solutions, and (iii) research directions that require attention from the research community for follow-up work.

DOI:10.1561/3300000042
ISBN: 978-1-63828-422-2
88 pp. $65.00
Buy book (pb)
 
ISBN: 978-1-63828-423-9
88 pp. $155.00
Buy E-book (.pdf)
Table of contents:
1. Introduction
2. Background
3. Review Process
4. A Classification Schema / Taxonomy
5. Results
6. Threats to Validity
7. Related Work
8. Conclusions
Acknowledgements
References

Advances in Secure IoT Data Sharing

The proliferation of IoT devices on the internet is currently in the billions, and projections anticipate that there will be 50 billion connected IoT devices in the market by 2030. This rapid expansion will result in a substantial increase in data, which includes personal data, generated by these IoT devices. It is estimated that the data volume will reach 73.1 zettabytes by 2025. To fully realize the substantial benefits of the IoT, it is imperative to facilitate the responsible utilization and sharing of this data among various stakeholders. However, it is crucial to establish robust security and trust mechanisms to ensure data integrity and privacy during data sharing.

This monograph summarizes and assesses the research efforts that address secure IoT data sharing. State-of-the-art techniques ensuring and preserving security in the IoT data-sharing environment have been systematically reviewed, through a systematic literature study (SLR). Three research questions have been posed, the selection and exclusion criteria for primary studies have been defined, and data from these studies have been extracted and synthesized to answer the research questions. The SLR results can help readers to obtain (i) an overview of existing secure IoT data-sharing approaches and related issues, (ii) a deep-dive into Edge-focused secure IoT data sharing solutions, and (iii) research directions that require attention from the research community for follow-up work.

 
SEC-042