{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T22:30:48Z","timestamp":1655245848114},"reference-count":35,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7,1]]},"abstract":"<p>IoT (Internet of Things) is a sophisticated analytics and automation system that utilizes networking, big data, artificial intelligence, and sensing technology to distribute absolute systems for a service or product. The major challenges in IoT relies in security restrictions related with generating low cost devices, and the increasing number of devices that generates further opportunities for attacks. Hence, this article intends to develop a promising methodology associated with data privacy preservation for handling the IoT network. It is obvious that the IoT devices often generate time series data, where the range of respective time series data can be extremely large.<\/p>","DOI":"10.4018\/ijaec.2019070104","type":"journal-article","created":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T18:12:41Z","timestamp":1557857561000},"page":"27-33","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of Privacy Preservation Techniques in IoT"],"prefix":"10.4018","volume":"10","author":[{"given":"Ravindra Sadashivrao","family":"Apare","sequence":"first","affiliation":[{"name":"JJT University, Rajasthan, India"}]},{"given":"Satish Narayanrao","family":"Gujar","sequence":"additional","affiliation":[{"name":"BSCOER, Pune, India"}]}],"member":"2432","reference":[{"key":"IJAEC.2019070104-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2017.08.001"},{"key":"IJAEC.2019070104-1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2560919"},{"key":"IJAEC.2019070104-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.01.003"},{"key":"IJAEC.2019070104-3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2695525"},{"key":"IJAEC.2019070104-4","first-page":"23","article-title":"A security authorization scheme for smart home Internet of Things devices.","author":"B.-C.Chifor","year":"2017","journal-title":"Future Generation Computer Systems"},{"key":"IJAEC.2019070104-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.01.033"},{"key":"IJAEC.2019070104-6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2624824"},{"key":"IJAEC.2019070104-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.016"},{"key":"IJAEC.2019070104-8","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721741"},{"key":"IJAEC.2019070104-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.003"},{"key":"IJAEC.2019070104-10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.euromechsol.2017.06.003","article-title":"Using dragonfly algorithm for optimization of orthotropic infinite plates with a quasi-triangular cut-out.","volume":"66","author":"M.Jafari","year":"2017","journal-title":"European Journal of Mechanics. A, Solids"},{"key":"IJAEC.2019070104-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.03.001"},{"issue":"3","key":"IJAEC.2019070104-12","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1109\/TMSCS.2017.2705683","article-title":"Internet of everything: A large-scale autonomic IoT gateway.","volume":"3","author":"B.Kang","year":"2017","journal-title":"IEEE Transactions on Multi-Scale Computing Systems"},{"key":"IJAEC.2019070104-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.08.023"},{"key":"IJAEC.2019070104-14","first-page":"260","article-title":"Mitigating IoTsecurity threats with a trusted Network element.","author":"J.Kuusijarvi","year":"2016","journal-title":"11th International Conference for Internet Technology and Secured Transactions (ICITST)"},{"key":"IJAEC.2019070104-15","doi-asserted-by":"crossref","first-page":"752","DOI":"10.1016\/j.future.2017.09.032","article-title":"Game theory-based Security Vulnerability Quantification for Social Internet of Things.","volume":"82","author":"S.Lee","year":"2018","journal-title":"Future Generation Computer Systems"},{"key":"IJAEC.2019070104-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.045"},{"key":"IJAEC.2019070104-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.10.022"},{"key":"IJAEC.2019070104-18","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860484"},{"key":"IJAEC.2019070104-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.012"},{"key":"IJAEC.2019070104-20","doi-asserted-by":"crossref","first-page":"16757","DOI":"10.1109\/ACCESS.2017.2726902","article-title":"IoT-RTP and IoT-RTCP: Adaptive Protocols for Multimedia Transmission over Internet of Things Environments.","volume":"5","author":"O.Said","year":"2017","journal-title":"IEEE Access : Practical Innovations, Open Solutions"},{"key":"IJAEC.2019070104-21","doi-asserted-by":"crossref","first-page":"1375","DOI":"10.1109\/ACCESS.2016.2549047","article-title":"Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges.","volume":"4","author":"A.Sajid","year":"2016","journal-title":"IEEE Access : Practical Innovations, Open Solutions"},{"key":"IJAEC.2019070104-22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2724442"},{"key":"IJAEC.2019070104-23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.011"},{"key":"IJAEC.2019070104-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.011"},{"key":"IJAEC.2019070104-25","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.64","article-title":"Smart World of Internet of Things (IoT) and Its Security Concerns.","author":"J. C.Talwana","year":"2016","journal-title":"2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)"},{"key":"IJAEC.2019070104-26","article-title":"Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes","author":"M.Tao","journal-title":"Future Generation Computer Systems"},{"key":"IJAEC.2019070104-27","article-title":"SIoT: Securing Internet of Things through distributed systems analysis.","author":"F. A.Teixeira","year":"2017","journal-title":"Future Generation Computer Systems"},{"key":"IJAEC.2019070104-28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600462CM"},{"key":"IJAEC.2019070104-29","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2290622"},{"key":"IJAEC.2019070104-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.12.024"},{"key":"IJAEC.2019070104-31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2575863"},{"key":"IJAEC.2019070104-32","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.026"},{"key":"IJAEC.2019070104-33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsv.2016.11.006"},{"key":"IJAEC.2019070104-34","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600363CM"}],"container-title":["International Journal of Applied Evolutionary Computation"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=229088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T23:58:42Z","timestamp":1651881522000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJAEC.2019070104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,7,1]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijaec.2019070104","relation":{},"ISSN":["1942-3594","1942-3608"],"issn-type":[{"value":"1942-3594","type":"print"},{"value":"1942-3608","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,1]]}}}