Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

SEMINAR PRESENTATION

ON TOPIC

DATA PROTECTION IN INTERNET OF


THINGS

BY
GROUP 8
S/NO NAMES REG NO
1. IBRAHIM MARK 2107031047
2. MUSA FATIMAT ZAHARA 2107031043
3. SANI USMAN MUHAMMAD 2107031044
4. BULUS KENNETH SANI 2107031045
5. ABDULAZEEZ BELLO 2107031046
6. SHARHABILU AWALI 2107031048

A SEMINAR PRESENTATION SUMMITED TO THE DEPARTMENT OF


COMPUTER SCIENCE, SCHOOL OF SCIENCE AND TECHNOLOGY
ABDU GUSAU POLYTECHNIC TALATA MAFARA ZAMFARA STATE
IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE AWARD OF
NATIONAL DIPLOMA (ND) IN COMPUTER SCIENCE

OCTOBER , 2023
ABSTRACT

1
The Internet of Things (IoT) has had a considerable influence on our daily lives by
enabling enhanced connection of devices, systems, and services that extends beyond
machine-to-machine interactions and encompasses a wide range of protocols,
domains, and applications. However, despite privacy concerns shown by IoT users,
little has been done to reduce and protect individual information exposure. It is
extremely difficult to mitigate IoT devices from identification threats which is why it is still
a major challenge for IoT users to securely protect their information. The trust controls
how we regulate privacy in our IoT platforms in the same way that it governs personal
relationships. As IoT devices become increasingly linked, more data is shared across
individuals, businesses, governments, and ecosystems. Technologies, sensors,
machines, data, and cloud connections all rely largely on trust relationships that have
been formed. With the rapid growth of additional types of IoT devices that are being
introduced, it, therefore, expands privacy concerns and is difficult to develop trust with
an IoT system or device without the option to regulate information privacy settings.
Privacy has always been a barrier for many devices as they race for the early adoption
of IoT technologies. Several Internet of Things devices or systems will continue to pose
privacy threats. As a result, the main objective of this study was to examine the
individual understanding of privacy and to promote information privacy protection
awareness not only to IoT users but also to organizations that use IoT devices or
platforms to run their day-to-day business operations. Furthermore, the objective
extends to compare user knowledge and concerns about IoT privacy, as well as to
identify any common attitudes and variances. However, in terms of enhancing
individuals’ knowledge, an artifact was developed to educate and enhance information
privacy awareness among IoT users.

2
1.0 INTRODUCTION
The rapid rise of the Internet of Things (IoT) raises pressing privacy concerns despite its
possible benefits. IoT devices can collect vast quantities of granular data about
individuals’ daily habits and activities. The data that these devices can collect include
consumption rate data, location data, and health-related data, among other things. IoT
objects, such as smart rings and thermometers, have also been used in COVID-19
pandemic relief efforts (Eadicicco, 2020; Gardner, 2020). Companies’ traditional data
business models have historically enabled “surveillance capitalism”, the goal of which is
to “predict and modify human behavior as a means to produce revenue and market
control” (Zuboff, 2019). If left unchecked, the increasing volume and variety of IoT data
in conjunction with traditional and nascent business models, may lead to an expansion
of surveillance capitalism with even more far-reaching consequences. Zuboff, (2019)

1.1 BACKGROUND OF THE STUDY


Internet of Things (IoT) and cloud computing, atopic that has been taken up by various
authorities worldwide. This has led to a plethora of guidelines, rules and non- binding
recommendations, but little concrete action on the part of the central and federal
governments. Simply put, IoT is the process of creating physical things that are
embedded with sensors, software, and electronic connectivity to create a global network
of physical objects that exchange data and exchange information with each other and
with the world around them. Gardner, (2020)
Nowadays, there is enormous data available to communicate with consumers,
collect data, transmit data to businesses and collect large amounts of data for third
parties Examples include smartphones that interact with other smartphones, connected
medical devices, social networks, smart home devices, and much more. Connected
devices undermine our ability to separate these connections from those we choose. The
growing number of initiatives, devices and solutions related to the Internet of Things
(IoT) is having a significant impact on the privacy and security of our personal data and
those of the people we know and love . Eadicicco, (2020);

3
1.2 DIFFERENCE BETWEEN PRIVACY AND SECURITY
 Privacy and security are two different but connected concepts.
Privacy is concerned with the usage and control of personal data, such as establishing
policies to guarantee individuals’ personal information is gathered, shared, and utilized
in appropriate ways.
 Security is primarily concerned with safeguarding data from malicious assaults
and profiteering from stolen data.

1.3 OBJECTIVE OF THE STUDY


The objectives of data protection in the Internet of Things (IoT) are multifaceted,
encompassing various aspects of safeguarding data and ensuring the responsible and
secure use of IoT technologies. These objectives include:
 Privacy Preservation: Protecting the privacy of individuals is a primary
objective. IoT devices often collect and process personal information. Data
protection aims to ensure that this data is handled in a way that respects the
privacy rights of individuals.
 Data Confidentiality: Prevent unauthorized access to IoT data. Confidentiality
ensures that data is only accessible to authorized parties and remains secure
from breaches or leaks.
 Data Integrity: Ensure that IoT data is accurate and has not been tampered
with. This objective prevents unauthorized modifications or manipulations of data,
which could lead to false or harmful outcomes.
 Data Availability: Guarantee that IoT data is accessible when needed. Data
protection should prevent service disruptions or data unavailability, which can
have significant consequences in critical applications like healthcare or industrial
IoT.
 Cybersecurity: Protect IoT devices and networks from cyberattacks. This
involves measures such as encryption, intrusion detection, and vulnerability
management to prevent unauthorized access and data breaches.

4
1.4 SIGNIFICANCE OF THE STUDY

Data protection is of paramount significance in the context of the Internet of Things (IoT) due to
several reasons:

1. Privacy Concerns: IoT devices collect and transmit a vast amount of data, often
including sensitive personal information. Protecting this data is essential to safeguard
the privacy of individuals using IoT devices.
2. Security: IoT devices are often vulnerable to cyberattacks due to their limited computing
power and the diversity of devices connected to the internet. Data protection measures
are crucial to prevent unauthorized access to and manipulation of data.
3. Legal Compliance: Many regions have enacted data protection regulations, such as the
General Data Protection Regulation (GDPR) in Europe and the California Consumer
Privacy Act (CCPA) in the United States. IoT deployments must comply with these
regulations to avoid legal consequences.
4. Trust and Adoption: Ensuring the security and privacy of IoT data is vital for building
trust among users and consumers. Without trust, the widespread adoption of IoT
technologies could be hindered.
5. Business Reputation: Data breaches or misuse can severely damage a company's
reputation. Protecting IoT data is necessary to maintain the trust of customers and
stakeholders.

5
2.0 LITERATURE REVIEW
In general terms, as heterogeneous devices become part ofthe IoT network, new
security threats will emerge. IoT device manufacturers should take these protective
measures into account and extend them to the entire network of devices, not just their
individual devices. A. Rayes, S. Salam, (2019)
Some recent examples come from the United States which is not a leading country
in developing the digital economy and investing into the smart home hardware. In
September 2018, the California legislature in the United States passed a law that
imposes new restrictions on the number of IoT devices sold in the country. Unite Stats
Congress also introduced a bill (H.R. 2222) and an amendment to the National Defense
Authorization Act (NDAA), which proposes that the Commerce Department conduct a
study of the IoT industry and make recommendations for the secure growth of IoT
devices . IoT security hacks happen but the extensive work was built in this industry and
it helps to draft a code of conduct for consumer IoT security.
2.1 DATA PROTECTION IN THE INTERNET OF THINGS
For government agencies such as the Federal Trade Commission, the European
Union's General Data Protection Regulation (GDPR) protects privacy and data security
This includes, inter alia, adopting best practices in the areas of data protection and
security, collecting consumer information only with the explicit consent of consumers
and providing access to their data only after their consent. B. Di Martino, M. Rak, M.
Ficco, (2020)
There are various cloud-based mobility platforms that make it easy for companies to
securely manage and optimize IoT deployment. IoT needs security, which is why we
have developed tools and expertise to reduce risks through responsible development of
IoT applications. In addition, it is committed to collecting personal information that is
consistent with the privacy and security of its customers’ personal information. IoT
devices and the data processing activities associated with the operation of IoT are the
responsibility of the United States Department of Homeland Security (DHS), as they
tend to process personal data. It is clear that solutions and privacy are built into the
design of their products, and the ability to incorporate data subject to these rights into
their design. Bozorgi X. Gao, (2019)

6
2.2 PRIVACY IN THE INTERNET OF THINGS

IoT provides users with a strong technical background and management over how to
carry out ordinary duties by blanketing the environment with smart items [27]. Smart
objects are slightly different computer devices such as embedded systems, sensor
systems, and actuators which can disseminate and share data to facilitate positive
interactions and rational choice creation in the Internet of Things [28]. Things are
embedded in consumer devices and industrial machinery to collect and transmit
environmental data. Smart objects can also cause physical changes in their
environment and be controlled locally or remotely via the Internet. The privacy concerns
addressed in the study which are applied to every IoT user are illustrated with examples
that are related to smart appliances which are connected to devices. Further, the rate at
which the users of smart devices are developed is out spaced by the rate that is
protective for obtaining solutions that protect the information with the help of
technologies. Despite the abundance of the Internet of Things and its impact on our
daily lives, we must fully understand the threats and challenges they pose to our
privacy. M. Cohen, (2019)

2.3 CHALLENGES IN IOT PRIVACY

Data gathering technologies in the IoT ecosystem have resulted in new privacy
problems. Obtaining consent for data collection is one of these problems, as allowing
users to manage, personalize, and choose the data they provide, and ensuring that the
use of such data is confined to the stated purpose. These issues are exacerbated by
the increasing risk of personal information misuse in the IoT sphere. This is due to the
widespread tracking of habits, actions, and whereabouts throughout time. IoT
technologies bring new dangers to personal safety. The development of the digital
computer has allowed the advance of some fields like statistics, while IoT has enhanced
communication, information exchange, and collecting. P. Tabesh, E. Mousavidin, S.
Hasani, (2019)

7
3.0 METHODOLOGY

This section indicates the methods used to discourse the focal research question and
achieve the objectives indicated in the preceding sections. The research onion in Figure
2 illustrates the study methodological approach that leads to the development of a
concrete research theory by addressing each critical stage involved in the process.

3.1 RESEARCH METHOD

The research onion contains other two essential elements which are deductive and
inductive. Within positivism methods, data is evaluated first, important patterns are
accustomed to inform the generation of findings, and the inductive approach may be
employed successfully. In contrast to the deductive approach, the inductive strategy
allows one to create their own theory rather than employing one that already exists. The

8
inductive approach is characterized by a move from the precise to the broad, which is
why this study opted for it.

4.0 DISCUSSION

The purpose of this quantitative study is to promote information privacy awareness


among IoT users and identify privacy risks based on data collected from them through a
survey. To successfully validate this research, the data collected was analyzed to
provide answers to the main research question: “What percentage of IoT users are
knowledgeable/aware of data protection and privacy?”. Data is interpreted descriptively,
as described earlier in the previous section. The online survey was completed by 97.6%
of participants, with the remaining 2.4% declining to participate. Data gathered from the
survey was subjected to frequency counts. In other words, the participants’ responses
to each individual question were added up to get the maximum frequency of occurrence
or the number of times a certain response occurred. Some questionnaire findings are
offered in the form of tables and charts for greater accuracy and comprehension.

9
5.0 CONCLUSION

Individual privacy protection is a major challenge in this digital era. We contribute to a


better understanding of how individuals’ knowledge of privacy risks affects their privacy-
related actions by concentrating on the conceptualization of IPA. Individuals might be
concerned about their privacy, but the so-called privacy paradox shows that they do not
behave in line with their stated views. It is therefore mandatory in this digital era to
always enhance people’s understanding of the need of protecting their privacy and
know the ethical use of IoT platforms. Privacy may also be misinterpreted, yet it has the
capacity to encourage criminality and exploitation of systems, while secretive
connections between terrorists could endanger safety. As a result, privacy is not a
universal virtue. Instead, philosophical and legal research must be conducted into the
realms of privacy, the substance of privacy, and the advantages and damages that
privacy protection may create to find the conditions under which privacy is valued
enough to sustain the maintenance of private rights. However, individuals can protect
their Internet privacy in several ways. Protective measures are specific computer-based
actions that users desire to safeguard their information. People can protect their online
privacy by limiting the knowledge they reveal and setting up place privacy protections.
Furthermore, knowledge, talents, and skill all play a task. People that have higher
Internet skills, technological experience, and understanding of the IoT are more likely to
interact with privacy protection measures. Boosting information privacy awareness will
have an enormous impact in helping individuals to be completely alert to the risks and
ethical procedures they must take into consideration to safeguard their personal
information. In that instance, the study went above and beyond in examining the level of
alertness posed by individuals when making use of IoT systems or platforms. The study
contributed more to individuals’ awareness by improving their knowledge level of
information privacy protection through online questionnaires and artifacts that reflect the
measures and steps that need to be adhered to when dealing with interconnected smart
technologies.

10
11
REFERENCES
A. Rayes, S. Salam, (2019)Internet of Things from hype to reality, Springer,328 p.
awareness for network threats in fog/edge computing: Emerging paradigms beyond the
security perimeter model.
B. Di Martino, M. Rak, M. Ficco, (2020)A. Esposito, Future Generation Computer
Systems 85 (235-249. DOI: https://doi.Org/l 0.1016/j.fii- ture.2018.04.007
Bozorgi X. Gao, (2019)A review of building information modeling (BIM) and the internet
of things (IoT) devices integration: Present status and future trends, Automation in
Construction 101 127-139. DOI:
Eadicicco, (2020); A review of building information modeling (BIM) and the internet of
things (IoT) devices integration: Present status and future trends, Automation in
Construction 101 127-139. DOI:
Gardner, (2020) Big data and service operations, Production and Operations
Management 27(9) 1709- 1723. DOI: https://dolorg/l0.1111/poms.l2832
M. Cohen, (2019) Big data and service operations, Production and Operations
Management 27(9) 1709- 1723. DOI: https://dolorg/l0.1111/poms.l2832
P. Tabesh, E. Mousavidin, S. Hasani, (2019) Implementing big data strategies: A
managerial perspective. Business Horizons 62(3) 347-358 DOI:
https://doi.Org/10.1016/j.bushor.2019.02.001
S. Maisto, S. Nacchia, (2018) Internet of things reference architectures, security and
interoperability: A survey, Internet of Things 1 99-112. DOI:
W. Strielkowski, D. Streimikiene, A. Fomina, E. Semenova, Internet of energy (IoE) and
high-renewa- bles electricity system market design. Energies 12(24) (2019)
4790. DOI: https://doi.org/10.3390/enl2244790
Zuboff, (2019) Internet of Things from hype to reality, Springer,328 p.

12

You might also like