Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

How to design, implement and operate a privacy ensured and trustful IoT – System

 

Privacy and Trust is a wide field. There are many concepts, technologies, implementations and also regulation and laws outside that are dealing with the privacy of individuals or groups and trust in systems or organizations. Most of the approaches clearly distinguish between personal identifiable information (PII) that can be linked to a certain person and other arbitrary data.

...

The following text is a start to collect basic principles, design strategies or technical methods that can be taken into account while designing a IoT system in order to protect user privacy and in order to increase the trust in a system:

 ISO/IEC/IEEE 42010:2011 defines a template where so called concerns are described to frame an architecture viewpoint:

  • Data minimization – Concerned with collecting, transmitting and processing only a minimal set off data that is really necessary to fulfill a certain function in an IoT system.

...