Читать книгу Integration of Cloud Computing with Internet of Things - Группа авторов - Страница 45

2.7.2 Increase User Autonomy

Оглавление

The value of the consent of the user to the processing of IoT powered data. This underlines the need for verification and preference for individual influence of sensitive data and hence for increased privacy. Not all data has to be selected. If the usage of data is incompatible with the meaning of experiences, a simple and easy-to-read alternative will be given to individuals. Similar claims have been made in the literature. As regards the freedom of individuals, in particular with regard to IoT privacy security (Kounelis et al. [21]), it is argued that only if a mixture of person and artifact retains the ability to make deliberate choices and decisions in architecture, and awareness and vigilance in the field of freedom and security, can the overall interactions maintain confidence and trust Figure 2.7.


Figure 2.6 Internal and external attacker on IoT Infrastructure.


Figure 2.7 Different data sources of IoT.

Integration of Cloud Computing with Internet of Things

Подняться наверх