{"title":"物联网时代的隐私:挑战与展望","authors":"Amira Ayadi, S. Sassi","doi":"10.1109/GSCIT.2016.22","DOIUrl":null,"url":null,"abstract":"Technologies change our life. Out of many emerging technologies, Internet of Things (IoT), also known as machine to-machine (M2M) (where smart devices that collect data, relay information to one another. While current information technology enables people to carry out their business virtually at any time in any place. The fact that the personal information can be collected, stored and used without any consent or awareness creates fear for privacy violation for many people. Personal data should be handled under control of individuals to restore the necessary confidence. This paper attempts to put forward architecture to M2M called plug M2M which would address these new threats.","PeriodicalId":295398,"journal":{"name":"2016 Global Summit on Computer & Information Technology (GSCIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Privacy in the Age of Internet of Things: Challenges and Prospects\",\"authors\":\"Amira Ayadi, S. Sassi\",\"doi\":\"10.1109/GSCIT.2016.22\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Technologies change our life. Out of many emerging technologies, Internet of Things (IoT), also known as machine to-machine (M2M) (where smart devices that collect data, relay information to one another. While current information technology enables people to carry out their business virtually at any time in any place. The fact that the personal information can be collected, stored and used without any consent or awareness creates fear for privacy violation for many people. Personal data should be handled under control of individuals to restore the necessary confidence. This paper attempts to put forward architecture to M2M called plug M2M which would address these new threats.\",\"PeriodicalId\":295398,\"journal\":{\"name\":\"2016 Global Summit on Computer & Information Technology (GSCIT)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-07-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Global Summit on Computer & Information Technology (GSCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GSCIT.2016.22\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Global Summit on Computer & Information Technology (GSCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GSCIT.2016.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy in the Age of Internet of Things: Challenges and Prospects
Technologies change our life. Out of many emerging technologies, Internet of Things (IoT), also known as machine to-machine (M2M) (where smart devices that collect data, relay information to one another. While current information technology enables people to carry out their business virtually at any time in any place. The fact that the personal information can be collected, stored and used without any consent or awareness creates fear for privacy violation for many people. Personal data should be handled under control of individuals to restore the necessary confidence. This paper attempts to put forward architecture to M2M called plug M2M which would address these new threats.