Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
The proliferation of IoT devices on the internet is currently in the billions, and projections anticipate that there will be 50 billion connected IoT devices in the market by 2030. This rapid expansion will result in a substantial increase in data, which includes personal data, generated by these IoT devices. It is estimated that the data volume will reach 73.1 zettabytes by 2025. To fully realize the substantial benefits of the IoT, it is imperative to facilitate the responsible utilization and sharing of this data among various stakeholders. However, it is crucial to establish robust security and trust mechanisms to ensure data integrity and privacy during data sharing.
This monograph summarizes and assesses the research efforts that address secure IoT data sharing. State-of-the-art techniques ensuring and preserving security in the IoT data-sharing environment have been systematically reviewed, through a systematic literature study (SLR). Three research questions have been posed, the selection and exclusion criteria for primary studies have been defined, and data from these studies have been extracted and synthesized to answer the research questions. The SLR results can help readers to obtain (i) an overview of existing secure IoT data-sharing approaches and related issues, (ii) a deep-dive into Edge-focused secure IoT data sharing solutions, and (iii) research directions that require attention from the research community for follow-up work.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
The proliferation of IoT devices on the internet is currently in the billions, and projections anticipate that there will be 50 billion connected IoT devices in the market by 2030. This rapid expansion will result in a substantial increase in data, which includes personal data, generated by these IoT devices. It is estimated that the data volume will reach 73.1 zettabytes by 2025. To fully realize the substantial benefits of the IoT, it is imperative to facilitate the responsible utilization and sharing of this data among various stakeholders. However, it is crucial to establish robust security and trust mechanisms to ensure data integrity and privacy during data sharing.
This monograph summarizes and assesses the research efforts that address secure IoT data sharing. State-of-the-art techniques ensuring and preserving security in the IoT data-sharing environment have been systematically reviewed, through a systematic literature study (SLR). Three research questions have been posed, the selection and exclusion criteria for primary studies have been defined, and data from these studies have been extracted and synthesized to answer the research questions. The SLR results can help readers to obtain (i) an overview of existing secure IoT data-sharing approaches and related issues, (ii) a deep-dive into Edge-focused secure IoT data sharing solutions, and (iii) research directions that require attention from the research community for follow-up work.