Towards automated privacy risk assessments in IoT systems

Milan Markovic, Waqar Asif, David Corsar, Naomi Jacobs, Peter Edwards, Muttukrishnan Rajarajan, Caitlin Cottrill

Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

6 Citations (Scopus)
43 Downloads (Pure)

Abstract

Internet of Things (IoT) systems can often pose risk to users’ privacy via disclosure of personal information to third parties. In this paper, we argue that to assess privacy risks associated with IoT systems, an automated solution is required due to the increasing pervasiveness and complexity of deployed IoT systems. We propose requirements for an automated privacy risk assessment service and outline our
future plans for realising such a solution.
Original languageEnglish
Title of host publicationM4IOT ’18: Workshop on Middleware and Applications for the Internet of Things
Place of PublicationNew York
PublisherACM
Pages15-18
Number of pages4
ISBN (Electronic) 978-1-4503-6118-7
DOIs
Publication statusPublished - 10 Dec 2018
Event5th International Workshop on Middleware and Applications for the Internet of Things - Rennes, France
Duration: 10 Dec 201811 Dec 2018

Workshop

Workshop5th International Workshop on Middleware and Applications for the Internet of Things
Abbreviated titleM4IOT ’18
Country/TerritoryFrance
CityRennes
Period10/12/1811/12/18

Bibliographical note

M4IOT 2018 - Proceedings of the 2018 Workshop on Middleware and Applications for the Internet of Things, Part of Middleware 2018 Conference 10 December 2018, Pages 15-18
2018 Workshop on Middleware and Applications for the Internet of Things,
M4IOT 2018, Part of Middleware 2018 Conference;
Rennes; France; 10 December 2018 through 11 December 2018;
Code 144683

The work described here was funded by the award made by the RCUK Digital Economy programme to the University of Aberdeen (EP/N028074/1) and City, University of London (EP/N028155/1).

Keywords

  • Internet of Things
  • Privacy risk
  • provenance
  • linked data

Fingerprint

Dive into the research topics of 'Towards automated privacy risk assessments in IoT systems'. Together they form a unique fingerprint.

Cite this