{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:27:25Z","timestamp":1774927645298,"version":"3.50.1"},"reference-count":134,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T00:00:00Z","timestamp":1560124800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The Internet of Things (IoT) makes our lives much easier, more valuable, and less stressful due to the development of many applications around us including smart cities, smart cars, and smart grids, offering endless services and solutions. Protecting IoT data of such applications at rest either on the objects or in the cloud is an indispensable requirement for achieving a symmetry in the handling and protection of the IoT, as we do with data created by persons and applications. This is because unauthorised access to such data may lead to harmful consequences such as linkage attacks, loss of privacy, and data manipulation. Such undesired implications may jeopardise the existence of IoT applications if protection measures are not taken, and they stem from two main factors. One is that IoT objects have limited capabilities in terms of memory capacity, battery life, and computational power that hamper the direct implementation of conventional Internet security solutions without some modifications (e.g., traditional symmetric algorithms). Another factor is the absence of widely accepted IoT security and privacy guidelines for IoT data at rest and their appropriate countermeasures, which would help IoT stakeholders (e.g., developers, manufacturers) to develop secure IoT systems and therefore enhance IoT security and privacy by design. Toward this end, we first briefly describe the main IoT security goals and identify IoT stakeholders. Moreover, we briefly discuss the most well-known data protection frameworks (e.g., General Data Protection Regulation (GDPR), Health Insurance Portability (HIPAA)). Second, we highlight potential attacks and threats against data at rest and show their violated security goals (e.g., confidentiality and integrity). Third, we review a list of protection measures by which our proposed guidelines can be accomplished. Fourth, we propose a framework of security and privacy guidelines for IoT data at rest that can be utilised to enhance IoT security and privacy by design and establish a symmetry with the protection of user-created data. Our framework also presents the link between the suggested guidelines, mitigation techniques, and attacks. Moreover, we state those IoT stakeholders (e.g., manufacturers, developers) who will benefit most from these guidelines. Finally, we suggest several open issues requiring further investigation in the future, and we also discuss the limitations of our suggested framework.<\/jats:p>","DOI":"10.3390\/sym11060774","type":"journal-article","created":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T11:39:47Z","timestamp":1560166787000},"page":"774","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0874-2642","authenticated-orcid":false,"given":"Hezam Akram","family":"Abdulghani","sequence":"first","affiliation":[{"name":"Geneva School of Economics and Management, University of Geneva, 1211 Geneva, Switzerland"}]},{"given":"Niels Alexander","family":"Nijdam","sequence":"additional","affiliation":[{"name":"Geneva School of Economics and Management, University of Geneva, 1211 Geneva, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3214-8515","authenticated-orcid":false,"given":"Anastasija","family":"Collen","sequence":"additional","affiliation":[{"name":"Geneva School of Economics and Management, University of Geneva, 1211 Geneva, Switzerland"}]},{"given":"Dimitri","family":"Konstantas","sequence":"additional","affiliation":[{"name":"Geneva School of Economics and Management, University of Geneva, 1211 Geneva, Switzerland"}]}],"member":"1968","published-online":{"date-parts":[[2019,6,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","article-title":"A Survey on Security and Privacy Issues in Internet-of-Things","volume":"4","author":"Terzi","year":"2017","journal-title":"IEEE Int. Things J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"329","DOI":"10.2298\/FUEE1803329R","article-title":"Development of an IoT system for students\u2019 stress management","volume":"31","author":"Labus","year":"2018","journal-title":"Facta Univ. Ser. Electron. Energ."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Jain, R. (2006, January 23\u201325). Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation. Proceedings of the MILCOM 2006, Washington, DC, USA.","DOI":"10.1109\/MILCOM.2006.301995"},{"key":"ref_4","unstructured":"Akram Abdul-Ghani, H., Konstantas, D., and Mahyoub, M. (2018). A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model. Int. J. Adv. Comput. Sci. Appl., 9."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Saleem, J., Hammoudeh, M., Raza, U., Adebisi, B., and Ande, R. (2018, January 26\u201327). IoT standardisation: Challenges, perspectives and solution. Proceedings of the 2nd International Conference on Future Networks and Distributed Systems\u2014ICFNDS \u201918, Amman, Jordan.","DOI":"10.1145\/3231053.3231103"},{"key":"ref_6","first-page":"586","article-title":"A Comprehensive Study of Security of Internet-of-Things","volume":"5","author":"Jha","year":"2016","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Liu, B., Yu, X.L., Chen, S., Xu, X., and Zhu, L. (2017, January 25\u201330). Blockchain Based Data Integrity Service Framework for IoT Data. Proceedings of the 2017 IEEE International Conference on Web Services (ICWS), Honolulu, HI, USA.","DOI":"10.1109\/ICWS.2017.54"},{"key":"ref_8","unstructured":"ENISA European Union Agency For Network and Information Security (2018). Towards Secure Convergence of Cloud and IoT, ENISA European Union Agency For Network and Information Security. Technical Report."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"197","DOI":"10.3390\/a6020197","article-title":"Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview","volume":"6","author":"Cirani","year":"2013","journal-title":"Algorithms"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Kumar, A., Narendra, N.C., and Bellur, U. (July, January 27). Uploading and replicating internet of things (IoT) data on distributed cloud storage. Proceedings of the 2016 IEEE 9th International Conference on Cloud Computing, CLOUD, San Francisco, CA, USA.","DOI":"10.1109\/CLOUD.2016.0094"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","article-title":"A roadmap for security challenges in the Internet of Things","volume":"4","author":"Natalizio","year":"2018","journal-title":"Digit. Commun. Netw."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Kim, D., Choi, J.Y., and Hong, J.E. (2017). Evaluating energy efficiency of Internet of Things software architecture based on reusable software components. Int. J. Distrib. Sens. Netw., 13.","DOI":"10.1177\/1550147716682738"},{"key":"ref_13","unstructured":"Russell, B., Lingenfelter, D., Abhiraj, K.S., Manfredi, A., Anderson, G., Mordeno, A., Bell, M., Mukherjee, V., Bhat, G., and Naslund, M. (2015). Security Guidance for Early Adopters of the Internet of Things (IoT), Cloud Security Alliance Publishing. Technical Report."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Perera, C., McCormick, C., and Nuseibeh, B. (2016, January 7\u20139). Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms. Proceedings of the IoT\u201916, Stuttgart, Germany.","DOI":"10.1145\/2991561.2991566"},{"key":"ref_15","unstructured":"Broadband Internet Technical Advisory Group (2019, March 29). Internet of Things (IoT) Security and Privacy Recommendations: A Uniform Agreement Report; Technical Report; Broadband Internet Technical Advisory Group: November 2016. Available online: https:\/\/www.bitag.org\/documents\/."},{"key":"ref_16","unstructured":"OWASP (2019, March 29). IoT Security Guidance. Available online: https:\/\/www.owasp.org\/index.php\/IoT_Security_Guidance."},{"key":"ref_17","unstructured":"ENISA (2019, March 29). Available online: https:\/\/doi.org\/10.2824\/03228."},{"key":"ref_18","unstructured":"Australia, I.A. (2019, March 29). Internet of Things Security Guideline. Available online: https:\/\/www.iot.org.au\/wp\/wp-content\/uploads\/2016\/12\/IoTAA-Security-Guideline-V1.2.pdf."},{"key":"ref_19","unstructured":"IoT Security Foundation (2019, March 29). IoT Security Compliance Framework. IoT Security Foundation: Best Practice User. Available online: https:\/\/www.iotsecurityfoundation.org\/wp-content\/uploads\/2016\/12\/IoT-Security-Compliance-Framework.pdf."},{"key":"ref_20","unstructured":"Trusted Computing Group (2019, March 29). TPM Main Specification. Available online: https:\/\/trustedcomputinggroup.org\/resource\/tpm-main-specification\/."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Abdul-Ghani, H.A., and Konstantas, D. (2019). A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective. J. Sens. Actuator Netw., 8.","DOI":"10.3390\/jsan8020022"},{"key":"ref_22","unstructured":"SeeUnity (2019, March 29). The Main Differences between the DPD and the GDPR and How to Address Those Moving Forward. Available online: https:\/\/britishlegalitforum.com\/wp-content\/uploads\/2017\/02\/GDPR-Whitepaper-British-Legal-Technology-Forum-2017-Sponsor.pdf."},{"key":"ref_23","unstructured":"Chiarelli, D. (2019, March 29). Available online: https:\/\/www.clinicalleader.com\/doc\/the-convergence-of-gdpr-the-hipaa-security-rule-and-part-on-us-clinical-research-0001."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"21947","DOI":"10.1007\/s11042-017-5540-x","article-title":"Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review","volume":"77","author":"Ahmed","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_25","unstructured":"Securitymetrics (2013). An Introduction to HIPAA Compliance, Securitymetrics. Technical Report."},{"key":"ref_26","unstructured":"Industrial Internet Consortium (2017). The Industrial Internet of Things Volume G1: Reference Architecture IIRA, Industrial Internet Consortium."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1174","DOI":"10.1109\/JPROC.2014.2322103","article-title":"Trustworthiness of medical devices and body area networks","volume":"102","author":"Zhang","year":"2014","journal-title":"Proc. IEEE"},{"key":"ref_28","unstructured":"Li, C., Raghunathan, A., and Jha, N. (2011, January 13\u201315). Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. Proceedings of the 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, HEALTHCOM 2011, Columbia, MO, USA."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Cherdantseva, Y., and Hilton, J. (2013, January 2\u20136). A reference model of information assurance & security. Proceedings of the 2013 International Conference on Availability, Reliability and Security, ARES 2013, Regensburg, Germany.","DOI":"10.1109\/ARES.2013.72"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Aleisa, N., and Renaud, K. (2017). Privacy of the Internet of Things: A Systematic Literature Review. arXiv.","DOI":"10.24251\/HICSS.2017.717"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Yu, S., and Guo, S. (2016). Big Data Concepts, Theories, and Applications, Springer International Publishing.","DOI":"10.1007\/978-3-319-27763-9"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2010.115","article-title":"Understanding cloud computing vulnerabilities","volume":"9","author":"Grobauer","year":"2011","journal-title":"IEEE Secur. Privacy"},{"key":"ref_33","unstructured":"OWASP (2019, March 29). Available online: https:\/\/www.hkcert.org\/myurl\/en\/guideline\/18061501."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSP.2010.187","article-title":"Side Channels in Cloud Services: Deduplication in Cloud Storage","volume":"8","author":"Harnik","year":"2010","journal-title":"IEEE Secur. Privacy Mag."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"3724","DOI":"10.1002\/sec.1539","article-title":"A survey and taxonomy of DoS attacks in cloud computing","volume":"9","author":"Masdari","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_36","unstructured":"IBM-Security (2019, March 29). Available online: https:\/\/sloangroups.mit.edu\/secmat\/blog\/ibm-x-force."},{"key":"ref_37","unstructured":"EY (2019, March 29). Available online: https:\/\/www.ey.com\/Publication\/vwLUAssets\/EY-managing-insider-threat-june-13-2016\/."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.comcom.2017.07.006","article-title":"Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms","volume":"111","author":"Kaaniche","year":"2017","journal-title":"Comput. Commun."},{"key":"ref_39","unstructured":"Kaaniche, N. (2019, March 29). Cloud Data Storage Security Based on Cryptographic Mechanisms. Available online: https:\/\/tel.archives-ouvertes.fr\/tel-01146029\/document."},{"key":"ref_40","unstructured":"Rittinghouse, J., and Ransome, J. (2010). Cloud Computing Implementation, Management, and Security, CRC Press."},{"key":"ref_41","unstructured":"Stevens, M., Lenstra, A., and de Weger, B. (2007). Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer."},{"key":"ref_42","unstructured":"Daum, M., and Lucks, S. (2019, March 29). Hash Collisions (The Poisoned Message Attack). Available online: http:\/\/ljk.imag.fr\/membres\/Jean-Guillaume.Dumas\/Enseignements\/ProjetsCrypto\/MD5-Collisions\/."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Rashid, F., Miri, A., and Woungang, I. (2012, January 16\u201318). A secure data deduplication framework for cloud environments. Proceedings of the 2012 Tenth Annual International Conference on Privacy, Security and Trust, Paris, France.","DOI":"10.1109\/PST.2012.6297923"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MCC.2016.29","article-title":"Encrypted Data Management with Deduplication in Cloud Computing","volume":"3","author":"Yan","year":"2016","journal-title":"IEEE Cloud Comput."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Puzio, P., Molva, R., Onen, M., and Loureiro, S. (2013, January 2\u20135). ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage. Proceedings of the 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, Bristol, UK.","DOI":"10.1109\/CloudCom.2013.54"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Xu, J., Chang, E.C., and Zhou, J. (2013, January 8\u201310). Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security\u2014ASIA CCS \u201913, Hangzhou, China.","DOI":"10.1145\/2484313.2484340"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3017428","article-title":"A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems","volume":"49","author":"Shin","year":"2017","journal-title":"ACM Comput. Surv."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.future.2014.11.009","article-title":"A secure and scalable storage system for aggregate data in IoT","volume":"49","author":"Jiang","year":"2015","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Kumar, A., Lee, B.G., Lee, H., and Kumari, A. (2012, January 15\u201317). Secure storage and access of data in cloud computing. Proceedings of the 2012 International Conference on ICT Convergence (ICTC), Jeju Island, Korea.","DOI":"10.1109\/ICTC.2012.6386854"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.procs.2016.06.007","article-title":"Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption","volume":"889","author":"Bokefode","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"4519","DOI":"10.1109\/TII.2018.2793350","article-title":"Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing","volume":"14","author":"Fu","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Fu, Z., Cao, X., Wang, J., and Sun, X. (2014, January 27\u201329). Secure storage of data in cloud computing. Proceedings of the 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014, Kitakyushu, Japan.","DOI":"10.1109\/IIH-MSP.2014.199"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.procs.2016.07.335","article-title":"A study on data storage security issues in cloud computing","volume":"92","author":"Rao","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-642-13651-1_15","article-title":"Ensuring data storage security against frequency-based attacks in wireless networks","volume":"Volume LNCS 6131","author":"Liu","year":"2010","journal-title":"Distributed Computing in Sensor Systems"},{"key":"ref_55","unstructured":"Storer, M.W., Greenan, K.M., Miller, E.L., and Voruganti, K. (2007, January 17\u201322). POTSHARDS: Secure Long-Term Storage Without Encryption. Proceedings of the 2007 USENIX Annual Technical Conference, Santa Clara, CA, USA."},{"key":"ref_56","first-page":"6","article-title":"Analysis of DAC MAC RBAC Access Control based Models for Security","volume":"104","author":"Jayant","year":"2014","journal-title":"Int. J. Comput. Appl."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Wang, J.K., and Jia, X. (2012, January 18\u201320). Data security and authentication in hybrid cloud computing model. Proceedings of the 2012 IEEE Global High Tech Congress on Electronics, Shenzhen, China.","DOI":"10.1109\/GHTCE.2012.6490136"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","author":"Sandhu","year":"1996","journal-title":"Computer"},{"key":"ref_59","unstructured":"Sandhu, R., and Bhamidipati, V. (2008, January 4\u20137). The ASCAA principles for next-generation role-based access control. Proceedings of the ARES 2008\u20143rd International Conference on Availability, Security, and Reliability, Barcelona, Spain."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Xiao, M., Zhou, J., Liu, X., and Jiang, M. (2017). A hybrid scheme for fine-grained search and access authorization in fog computing environment. Sensors, 17.","DOI":"10.3390\/s17061423"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"730","DOI":"10.1016\/j.future.2016.10.028","article-title":"CCA-secure ABE with outsourced decryption for fog computing","volume":"78","author":"Zuo","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1016\/j.future.2017.01.026","article-title":"Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing","volume":"78","author":"Jiang","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.future.2017.01.025","article-title":"Towards leakage-resilient fine-grained access control in fog computing","volume":"78","author":"Yu","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1109\/JIOT.2015.2497263","article-title":"Replisom: Disciplined Tiny Memory Replication for Massive IoT Devices in LTE Edge Cloud","volume":"3","author":"Abdelwahab","year":"2016","journal-title":"IEEE Int. Things J."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"3914","DOI":"10.1016\/j.comnet.2013.09.016","article-title":"A divide-and-conquer approach for content replication in WMNs","volume":"57","author":"Fu","year":"2013","journal-title":"Comput. Netw."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Al-Arnaout, Z., Fu, Q., and Frean, M. (2013, January 3\u20138). Exploiting graph partitioning for hierarchical replica placement in WMNs. Proceedings of the 16th ACM International Conference on Modeling, Analysis & Simulation of Wireless and Mobile Systems\u2014MSWiM \u201913, Barcelona, Spain.","DOI":"10.1145\/2507924.2507928"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Zhang, S.Q., Leon-Garcia, A., and Boutaba, R. (July, January 29). Aurora: Adaptive Block Replication in Distributed File Systems. Proceedings of the 2015 IEEE 35th International Conference on Distributed Computing Systems, Columbus, OH, USA.","DOI":"10.1109\/ICDCS.2015.52"},{"key":"ref_68","first-page":"1807","article-title":"A tree based location privacy approach against multi-precision continuous attacks in the internet of things","volume":"9","author":"Liu","year":"2012","journal-title":"J. Inf. Comput. Sci."},{"key":"ref_69","first-page":"3071","article-title":"An algorithm of k-anonymity for data releasing based on fine-grained generalization","volume":"9","author":"Xu","year":"2012","journal-title":"J. Inf. Comput. Sci."},{"key":"ref_70","first-page":"3071","article-title":"Diversity: Privacy Beyond k-Anonymity","volume":"9","author":"Machanavajjhala","year":"2007","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., and Venkatasubramanian, S. (2007, January 11\u201315). t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering, Istanbul, Turkey.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"1623","DOI":"10.1109\/TKDE.2009.190","article-title":"From t-Closeness-like privacy to postrandomization via information theory","volume":"22","year":"2010","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Narendra, N.C., Nayak, S., and Shukla, A. (2018, January 3\u20137). Managing large-scale transient data in IoT systems. Proceedings of the 2018 10th International Conference on Communication Systems and Networks, COMSNETS 2018, Bengaluru, India.","DOI":"10.1109\/COMSNETS.2018.8328274"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Cecchinel, C., Jimenez, M., Mosser, S., and Riveill, M. (July, January 27). An Architecture to Support the Collection of Big Data in the Internet of Things. Proceedings of the 2014 IEEE World Congress on Services, Anchorage, AK, USA.","DOI":"10.1109\/SERVICES.2014.83"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1504\/IJWGS.2014.060255","article-title":"IoT4S: A new architecture to exploit sensing capabilities in smart cities","volume":"10","author":"Fazio","year":"2014","journal-title":"Int. J. Web Grid Serv."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Narendra, N.C., Koorapati, K., and Ujja, V. (2015, January 25\u201327). Towards Cloud-Based Decentralized Storage for Internet of Things Data. Proceedings of the 2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore, India.","DOI":"10.1109\/CCEM.2015.9"},{"key":"ref_77","unstructured":"Gentry, C. (June, January 31). Fully homomorphic encryption using ideal lattices. Proceedings of the 41st Annual ACM Symposium on Symposium on Theory of Computing\u2014STOC \u201909, Bethesda, MD, USA."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"895","DOI":"10.3233\/JCS-2011-0426","article-title":"Searchable symmetric encryption: Improved definitions","volume":"19","author":"Curtmola","year":"2011","journal-title":"J. Comput. Secur."},{"key":"ref_79","unstructured":"Wang, P., Wang, H., and Pieprzyk, J. (2008). Threshold Privacy Preserving Keyword Searches. SOFSEM 2008: Theory and Practice of Computer Science, Springer."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Wang, P., Wang, H., and Pieprzyk, J. (2009). An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. Information Security Applications, Springer.","DOI":"10.1007\/978-3-642-00306-6_11"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Yang, Y., Lu, H., and Weng, J. (December, January 29). Multi-User Private Keyword Search for Cloud Computing. Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science, Athens, Greece.","DOI":"10.1109\/CloudCom.2011.43"},{"key":"ref_82","unstructured":"Cheung, L., and Newport, C. (November, January 29). Provably secure ciphertext policy ABE. Proceedings of the 14th ACM Conference on Computer and Communications Security\u2014CCS \u201907, Alexandria, VA, USA."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","article-title":"Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud","volume":"27","author":"Sun","year":"2016","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Sun, W.H., Yu, S.C., Lou, W.J., Hou, Y.T., and Li, H. (May, January 27). Protecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud. Proceedings of the IEEE INFOCOM 2014-IEEE Conference on Computer Communications, Toronto, ON, Canada.","DOI":"10.1109\/INFOCOM.2014.6847943"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"2872","DOI":"10.1016\/j.jpdc.2014.06.003","article-title":"Shield: A stackable secure storage system for file sharing in public storage","volume":"74","author":"Shu","year":"2014","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_86","first-page":"31","article-title":"Securing Data Storage System for Internet of Things Using Key Aggregate Cryptosystem","volume":"8","author":"Ambade","year":"2017","journal-title":"Int. J. Sci. Eng. Res."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Adluru, P., Datla, S.S., and Zhang, X. (2015, January 1). Hadoop eco system for big data security and privacy. Proceedings of the 2015 Long Island Systems, Applications and Technology, Farmingdale, NY, USA.","DOI":"10.1109\/LISAT.2015.7160211"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1016\/j.procs.2015.04.091","article-title":"Big Data and Hadoop-a Study in Security Perspective","volume":"50","author":"Saraladevi","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Huang, Z., Su, X., Zhang, Y., Shi, C., Zhang, H., and Xie, L. (2017, January 13\u201316). A decentralized solution for IoT data trusted exchange based-on blockchain. Proceedings of the 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017, Chengdu, China.","DOI":"10.1109\/CompComm.2017.8322729"},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Shafagh, H., Burkhalter, L., Hithnawi, A., and Duquennoy, S. (2017, January 3). Towards Blockchain-based Auditable Storage and Sharing of IoT Data. Proceedings of the 2017 on Cloud Computing Security Workshop, Dallas, TX, USA.","DOI":"10.1145\/3140649.3140656"},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Xu, Q., Aung, K.M.M., Zhu, Y., Yong, K.L., and A blockchain-based storage system for data analytics in the internet of things (2018). A Blockchain-Based Storage System for Data Analytics in the Internet of Things. New Advances in the Internet of Things, Springer.","DOI":"10.1007\/978-3-319-58190-3_8"},{"key":"ref_92","first-page":"59","article-title":"Big Data Security and Privacy Issues in the CLOUD","volume":"8","author":"Gholami","year":"2016","journal-title":"Int. J. Netw. Secur. Its Appl."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Anand, M. (2012, January 11\u201312). Cloud Monitor: Monitoring Applications in Cloud. Proceedings of the 2012 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore, India.","DOI":"10.1109\/CCEM.2012.6354603"},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Brinkmann, A., Fiehe, C., Litvina, A., Luck, I., Nagel, L., Narayanan, K., Ostermair, F., and Thronicke, W. (2013, January 9\u201312). Scalable Monitoring System for Clouds. Proceedings of the 2013 IEEE\/ACM 6th International Conference on Utility and Cloud Computing, Dresden, Germany.","DOI":"10.1109\/UCC.2013.103"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Nikolai, J., and Wang, Y. (2014, January 3\u20136). Hypervisor-based cloud intrusion detection system. Proceedings of the 2014 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA.","DOI":"10.1109\/ICCNC.2014.6785472"},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Marchal, S., Jiang, X., State, R., and Engel, T. (2014, January 27\u201330). A Big Data Architecture for Large Scale Security Monitoring. Proceedings of the 2014 IEEE International Congress on Big Data, Washington, DC, USA.","DOI":"10.1109\/BigData.Congress.2014.18"},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"2609","DOI":"10.1109\/TC.2014.2375190","article-title":"MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud","volume":"64","author":"Liu","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref_98","unstructured":"Alliance, A.S.C., and Embedded Hardware Security for IoT Applications (2019, April 04). A Smart Card Alliance Internet of Things Security Council White Paper. Available online: https:\/\/hospitalitytech.com\/smart-card-alliance-whitepaper-securing-internet-things."},{"key":"ref_99","unstructured":"Sushma, M., Jaidhar, C.D., Gudisagar, C., and Sahoo, B.R. (2017, January 13\u201316). Secure data migration between cloud storage systems. Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017, Manipal, Karnataka, India."},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Shen, Q., Zhang, L., Yang, X., Yang, Y., Wu, Z., and Zhang, Y. (2011, January 12\u201314). SecDM: Securing Data Migration between Cloud Storage Systems. Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, Sydney, Australia.","DOI":"10.1109\/DASC.2011.114"},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Dhamija, A., and Dhaka, V. (2015, January 8\u201310). A novel cryptographic and steganographic approach for secure cloud data migration. Proceedings of the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Greater Noida, Delhi, India.","DOI":"10.1109\/ICGCIoT.2015.7380486"},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Khalil, I., Hababeh, I., and Khreishah, A. (2016, January 5\u20137). Secure inter cloud data migration. Proceedings of the 2016 7th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan.","DOI":"10.1109\/IACS.2016.7476087"},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"42","DOI":"10.18178\/ijfcc.2018.7.2.518","article-title":"Security Architecture for multi-Tenant Cloud Migration","volume":"7","author":"Manikandasaran","year":"2018","journal-title":"Int. J. Future Comput. Commun."},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Kumbhare, A.G., Simmhan, Y., and Prasanna, P. (2011, January 14). Designing a Secure Storage Repository for Sharing Scientific Datasets using Public Clouds. Proceedings of the DataCloud-SC \u201911 Proceedings of the Second International Workshop on Data Intensive Computing in the Clouds, Seattle, WA, USA.","DOI":"10.1145\/2087522.2087530"},{"key":"ref_105","unstructured":"European Parliament and Council of the European Union (2019, April 04). General Data Protection Regulation (GDPR)\u2014Final Text Neatly lArranged. Available online: https:\/\/gdpr-info.eu\/."},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/TSE.2008.88","article-title":"Engineering privacy","volume":"35","author":"Spiekermann","year":"2009","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_107","unstructured":"Hoepman, J.H. (2019, April 04). Privacy Design Strategies. Available online: https:\/\/link.springer.com\/chapter\/10.1007\/."},{"key":"ref_108","unstructured":"OWASP_Foundation (2016). Security by Design Principles, OWASP."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MSP.2008.114","article-title":"Data retention and privacy in electronic communications","volume":"6","author":"Kotzanikolaou","year":"2008","journal-title":"IEEE Secur. Privacy"},{"key":"ref_110","unstructured":"Xu, Z., Martin, K., and Kotnik, C.L. (2019, April 04). A Survey of Security Services and Techniques in Distributed Storage Systems. Technical Report; The Steering Committee of The World Congress in Computer Science, Computer\u2026. Available online: https:\/\/pdfs.semanticscholar.org\/eb63\/3dd51c5ef339dfba3030df1526d9f9039b63.pdf."},{"key":"ref_111","unstructured":"PICDSS (2016). Requirements and Security Assessment Procedures Document Changes, PCI Security Standards Council. Technical Report."},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1016\/0952-1976(96)84165-0","article-title":"Database and expert systems applications","volume":"9","year":"1996","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1109\/JSEN.2010.2056916","article-title":"Distributed Clustering-Based Aggregation Algorithm for Spatial Correlated Sensor Networks","volume":"11","author":"Ma","year":"2011","journal-title":"IEEE Sens. J."},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1109\/TPDS.2002.1036066","article-title":"Data gathering algorithms in sensor networks using energy metrics [PEGASIS]","volume":"13","author":"Lindsey","year":"2002","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_115","unstructured":"Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.H., Le M\u00e9tayer, D., Tirtea, R., and Schiffner, S. (2019, April 04). Privacy and Data Protection by Design\u2014From Policy to Engineering. ENISA: 2015. Available online: https:\/\/www.enisa.europa.eu\/publications\/privacy-and-data-protection-by-design."},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Vanitha, M., and Kavitha, C. (2014, January 3\u20135). Secured data destruction in cloud based multi-tenant database architecture. Proceedings of the 2014 International Conference on Computer Communication and Informatics: Ushering in Technologies of Tomorrow, Today, ICCCI 2014, Coimbatore, India.","DOI":"10.1109\/ICCCI.2014.6921774"},{"key":"ref_117","unstructured":"Han, J., Pei, J., and Kamber, M. (2019, April 04). Data Mining: Concepts and Techniques. Available online: https:\/\/www.sciencedirect.com\/book\/9780123814791\/data-mining-concepts-and-techniques."},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Azzedin, F., and Ghaleb, M. (2019). Internet-of-Things and Information Fusion: Trust Perspective Survey. Sensors, 19.","DOI":"10.3390\/s19081929"},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Weingart, S.H. (2000). Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses. Cryptographic Hardware and Embedded Systems\u2014CHES 2000, Springer.","DOI":"10.1007\/3-540-44499-8_24"},{"key":"ref_120","doi-asserted-by":"crossref","unstructured":"Terzi, D.S., Terzi, R., and Sagiroglu, S. (2015, January 14\u201316). A survey on security and privacy issues in big data. Proceedings of the 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK.","DOI":"10.1109\/ICITST.2015.7412089"},{"key":"ref_121","doi-asserted-by":"crossref","first-page":"1419","DOI":"10.1109\/TVT.2013.2251924","article-title":"Engineering a distributed infrastructure for large-scale cost-effective content dissemination over urban vehicular networks","volume":"63","author":"Luan","year":"2014","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_122","unstructured":"Department of Homeland Security (DHS) (2016). Strategic Principles for Securing the IoT (version 1.0), Technical Report."},{"key":"ref_123","unstructured":"Cloud Standards Customer Council (2015). Security for Cloud Computing 10 Steps to Ensure Success, Cloud Standards Customer Council."},{"key":"ref_124","first-page":"36","article-title":"Techniques of Data Migration in Cloud Computing","volume":"36","author":"Mungole","year":"2016","journal-title":"IEEE Access"},{"key":"ref_125","first-page":"1","article-title":"A Security approach for Data Migration in Cloud Computing","volume":"3","author":"Kushwah","year":"2013","journal-title":"Int. J. Sci. Res. Publ."},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1016\/j.procs.2017.12.089","article-title":"Exploring Data Security Issues and Solutions in Cloud Computing","volume":"125","author":"Kumar","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Claycomb, W.R., and Nicoll, A. (2012, January 16\u201320). Insider threats to cloud computing: Directions for new research challenges. Proceedings of the International Computer Software and Applications Conference, Izmir, Turkey.","DOI":"10.1109\/COMPSAC.2012.113"},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1109\/JSYST.2015.2487221","article-title":"DBSAFE\u2014An Anomaly Detection System to Protect Databases From Exfiltration Attempts","volume":"11","author":"Sallam","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_129","unstructured":"Federal Trade Commission (2019, April 04). IoT Privacy & Security in a Connected World; Technical Report, Available online: https:\/\/www.ftc.gov\/system\/files\/documents\/reports\/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy\/150127iotrpt.pdf."},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MCOM.2012.6122536","article-title":"Inter-cloud operations via NGSON","volume":"50","author":"Shan","year":"2012","journal-title":"IEEE Commun. Mag."},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/978-3-319-13464-2_15","article-title":"An inter-cloud architecture for future internet infrastructures","volume":"Volume 8907","author":"Sotiriadis","year":"2014","journal-title":"Adaptive Resource Management and Scheduling for Cloud Computing"},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MCOM.2017.7876847","article-title":"Intercloud: Solving Interoperability and Communication in a Cloud of Clouds (Frahim, J., et al; 2016) [Book Review]","volume":"55","author":"Borylo","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_133","unstructured":"Cisco (2014, January 14\u201316). The Internet of Things Reference Model. Proceedings of the Internet of Things World Forum, Chicago, IL, USA."},{"key":"ref_134","doi-asserted-by":"crossref","unstructured":"Ven\u010dkauskas, A., Morkevicius, N., Bagdonas, K., Dama\u0161evi\u010dius, R., and Maskeli\u016bnas, R. (2018). A lightweight protocol for secure video streaming. Sensors, 18.","DOI":"10.3390\/s18051554"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/6\/774\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:57:16Z","timestamp":1760187436000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/6\/774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,10]]},"references-count":134,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2019,6]]}},"alternative-id":["sym11060774"],"URL":"https:\/\/doi.org\/10.3390\/sym11060774","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,10]]}}}