Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment
In recent years, as all actions of Internet users become information, the importance of personal information is emphasized, but in reality, the management of personal information is still insufficient. With the advent of the concept of sharing systems such as the sharing economy, the numbers of IoT...
Guardado en:
Autores principales: | , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
MDPI AG
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/9a58d949f32843899192c758eb7e987f |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:9a58d949f32843899192c758eb7e987f |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:9a58d949f32843899192c758eb7e987f2021-11-25T18:57:43ZSecurity Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment10.3390/s212275921424-8220https://doaj.org/article/9a58d949f32843899192c758eb7e987f2021-11-01T00:00:00Zhttps://www.mdpi.com/1424-8220/21/22/7592https://doaj.org/toc/1424-8220In recent years, as all actions of Internet users become information, the importance of personal information is emphasized, but in reality, the management of personal information is still insufficient. With the advent of the concept of sharing systems such as the sharing economy, the numbers of IoT application services (for example, a healthcare service using sharing IoT devices, or a vehicle sharing system with IoT devices) using users’ personal information are increasing, but the risk of using personal information is not managed. To solve this issue, the European GDPR stipulates the content of personal information protection. In this paper, we present a method to securely manage personal information in IoT devices in IoT application environments in accordance with the GDPR. We first describe the lifecycle stages of personal information occurring in IoT application services and propose a method to securely manage personal information at each stage of the lifecycle according to the flow of personal information in IoT devices. We also evaluated the usefulness and applicability of the proposed scheme through two service scenarios. Since the proposed method satisfies the requirements for personal information management in IoT application environments, it is expected to contribute to the development of the IoT business field that handles personal information.Yong LeeGoo Yeon LeeMDPI AGarticleInternet of Thingspersonal informationinformation lifecycleIoT suitabilityGDPRChemical technologyTP1-1185ENSensors, Vol 21, Iss 7592, p 7592 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Internet of Things personal information information lifecycle IoT suitability GDPR Chemical technology TP1-1185 |
spellingShingle |
Internet of Things personal information information lifecycle IoT suitability GDPR Chemical technology TP1-1185 Yong Lee Goo Yeon Lee Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment |
description |
In recent years, as all actions of Internet users become information, the importance of personal information is emphasized, but in reality, the management of personal information is still insufficient. With the advent of the concept of sharing systems such as the sharing economy, the numbers of IoT application services (for example, a healthcare service using sharing IoT devices, or a vehicle sharing system with IoT devices) using users’ personal information are increasing, but the risk of using personal information is not managed. To solve this issue, the European GDPR stipulates the content of personal information protection. In this paper, we present a method to securely manage personal information in IoT devices in IoT application environments in accordance with the GDPR. We first describe the lifecycle stages of personal information occurring in IoT application services and propose a method to securely manage personal information at each stage of the lifecycle according to the flow of personal information in IoT devices. We also evaluated the usefulness and applicability of the proposed scheme through two service scenarios. Since the proposed method satisfies the requirements for personal information management in IoT application environments, it is expected to contribute to the development of the IoT business field that handles personal information. |
format |
article |
author |
Yong Lee Goo Yeon Lee |
author_facet |
Yong Lee Goo Yeon Lee |
author_sort |
Yong Lee |
title |
Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment |
title_short |
Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment |
title_full |
Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment |
title_fullStr |
Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment |
title_full_unstemmed |
Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment |
title_sort |
security management suitable for lifecycle of personal information in multi-user iot environment |
publisher |
MDPI AG |
publishDate |
2021 |
url |
https://doaj.org/article/9a58d949f32843899192c758eb7e987f |
work_keys_str_mv |
AT yonglee securitymanagementsuitableforlifecycleofpersonalinformationinmultiuseriotenvironment AT gooyeonlee securitymanagementsuitableforlifecycleofpersonalinformationinmultiuseriotenvironment |
_version_ |
1718410478722482176 |