Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment

In recent years, as all actions of Internet users become information, the importance of personal information is emphasized, but in reality, the management of personal information is still insufficient. With the advent of the concept of sharing systems such as the sharing economy, the numbers of IoT...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Yong Lee, Goo Yeon Lee
Formato: article
Lenguaje:EN
Publicado: MDPI AG 2021
Materias:
Acceso en línea:https://doaj.org/article/9a58d949f32843899192c758eb7e987f
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:9a58d949f32843899192c758eb7e987f
record_format dspace
spelling oai:doaj.org-article:9a58d949f32843899192c758eb7e987f2021-11-25T18:57:43ZSecurity Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment10.3390/s212275921424-8220https://doaj.org/article/9a58d949f32843899192c758eb7e987f2021-11-01T00:00:00Zhttps://www.mdpi.com/1424-8220/21/22/7592https://doaj.org/toc/1424-8220In recent years, as all actions of Internet users become information, the importance of personal information is emphasized, but in reality, the management of personal information is still insufficient. With the advent of the concept of sharing systems such as the sharing economy, the numbers of IoT application services (for example, a healthcare service using sharing IoT devices, or a vehicle sharing system with IoT devices) using users’ personal information are increasing, but the risk of using personal information is not managed. To solve this issue, the European GDPR stipulates the content of personal information protection. In this paper, we present a method to securely manage personal information in IoT devices in IoT application environments in accordance with the GDPR. We first describe the lifecycle stages of personal information occurring in IoT application services and propose a method to securely manage personal information at each stage of the lifecycle according to the flow of personal information in IoT devices. We also evaluated the usefulness and applicability of the proposed scheme through two service scenarios. Since the proposed method satisfies the requirements for personal information management in IoT application environments, it is expected to contribute to the development of the IoT business field that handles personal information.Yong LeeGoo Yeon LeeMDPI AGarticleInternet of Thingspersonal informationinformation lifecycleIoT suitabilityGDPRChemical technologyTP1-1185ENSensors, Vol 21, Iss 7592, p 7592 (2021)
institution DOAJ
collection DOAJ
language EN
topic Internet of Things
personal information
information lifecycle
IoT suitability
GDPR
Chemical technology
TP1-1185
spellingShingle Internet of Things
personal information
information lifecycle
IoT suitability
GDPR
Chemical technology
TP1-1185
Yong Lee
Goo Yeon Lee
Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment
description In recent years, as all actions of Internet users become information, the importance of personal information is emphasized, but in reality, the management of personal information is still insufficient. With the advent of the concept of sharing systems such as the sharing economy, the numbers of IoT application services (for example, a healthcare service using sharing IoT devices, or a vehicle sharing system with IoT devices) using users’ personal information are increasing, but the risk of using personal information is not managed. To solve this issue, the European GDPR stipulates the content of personal information protection. In this paper, we present a method to securely manage personal information in IoT devices in IoT application environments in accordance with the GDPR. We first describe the lifecycle stages of personal information occurring in IoT application services and propose a method to securely manage personal information at each stage of the lifecycle according to the flow of personal information in IoT devices. We also evaluated the usefulness and applicability of the proposed scheme through two service scenarios. Since the proposed method satisfies the requirements for personal information management in IoT application environments, it is expected to contribute to the development of the IoT business field that handles personal information.
format article
author Yong Lee
Goo Yeon Lee
author_facet Yong Lee
Goo Yeon Lee
author_sort Yong Lee
title Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment
title_short Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment
title_full Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment
title_fullStr Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment
title_full_unstemmed Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment
title_sort security management suitable for lifecycle of personal information in multi-user iot environment
publisher MDPI AG
publishDate 2021
url https://doaj.org/article/9a58d949f32843899192c758eb7e987f
work_keys_str_mv AT yonglee securitymanagementsuitableforlifecycleofpersonalinformationinmultiuseriotenvironment
AT gooyeonlee securitymanagementsuitableforlifecycleofpersonalinformationinmultiuseriotenvironment
_version_ 1718410478722482176