Privacy Agents for IoT Cloud Communication

Syed Khuram Shahzad, Muhammad Waseem Iqbal, Nadeem Ahmad


Internet of Things (IoT) has been shaped to a phenomenon from some technical framework. The smart environment based on IoT has been introduced by the construction of smart cities, offices, universities and factories. These smart environments consist of smart devices replacing simple appliances from our home and workplaces. With this interconnected environment we are connected, accessible and smartly managed through intelligent systems. These intelligent systems work on our personal, historical and current data. This data sharing brought new challenges of the privacy preservation of individuals living in this smart world. This paper provides a study of the issues related to the data sharing through these smart devices over service providing cloud. It proposes communication architecture by introducing an intermediate layer of data sharing control consisting of privacy agents. It also includes a methodology to define a customized privacy policy for different personal properties within different business models.


  1. Chamberlain, A., Crabtree, A., 2016. Searching for music: understanding the discovery, acquisition, processing and organization of music in a domestic set-ting for design. In Personal and Ubiquitous Computing, 20 (4), pp. 559-571.
  2. Crabtree, A., Lodge T., Colley, J., Greenhalgh, C., Mortier, R., Haddadi H., 2016. Enabling the new economic actor: data protection, the digital economy, and the Databox, In Personal and Ubiquitous Computing, pp. 1-11.
  3. Crabtree A., Rodden, T., Tolmie, P., Mortier, R., Lodge, T., Brundell, P., Pantidi, N., 2015. House Rules: The collaborative nature of policy in domestic networks, In Personal and Ubiquitous Computing, 19(1), pp. 203- 215.
  4. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M., 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. In Future Generation Computer Systems, 29(7), 1645-1660.
  5. Sundmaeker, H., Guillemin, P., Friess, P., Woelfflé, S., 2010. Vision and challenges for realising the Internet of Things. In Cluster of European Research Projects on the Internet of Things, European Commission.
  6. Al-Sakran, H. O., 2015. Intelligent traffic information system based on integration of Internet of Things and agent technology. In International Journal of Advanced Computer Science and Applications (IJACSA), 6(2), 37-43.
  7. Bradley, J., Reberger, C., Dixit, A., Gupta, V., 2013. Internet of everything: A 4.6 trillion public sector opportunity. In Cisco White Paper. CISCO Corp.
  8. Babu, S. M., Lakshmi, A. J., Rao, B. T., 2015. A study on cloud based Internet of Things: Cloud IoT. In Global Conference in Communication Technologies (GCCT), pp. 60-65. IEEE.
  9. Henze, M., Hermerschmidt, L., Kerpen, D., Häußling, R., Rumpe, B., Wehrle, K., 2014. User driven privacy enforcement for cloud based services in the internet of things. In International Conference on Future Internet of Things and Cloud (FiCloud), pp. 191-196. IEEE.
  10. Perera, C., Ranjan, R., Wang, L., Khan, S. U., Zomaya, A. Y., 2015. Big data privacy in the internet of things era. In IT Professional, 17(3), pp. 32-39.
  11. Alpár, G., Batina, L., Batten, L., Moonsamy, V., Krasnova, A., Guellier, A., Natgunanathan, I., 2016. New directions in IoT privacy using attribute based authentication. In Proceedings of the ACM International Conference on Computing Frontiers, pp. 461-466. ACM.
  12. Williams, J., 2014. Internet of Things: Science Fiction or Business Fact?. In Harvard Business Review Analytic Services Report.
  13. Aazam, M., Khan, I., Alsaffar, A. A., Huh, E. N., 2014. Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved. In Proceedings of 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th-18th January, pp. 414-419. IEEE.
  14. Kozlov, D., Veijalainen, J., Ali, Y., 2012. Security and privacy threats in IoT architectures. In Proceedings of the 7th International Conference on Body Area Networks, pp. 256-262. Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST).
  15. Weber, R. H., 2010. Internet of Things-New security and privacy challenges. In Computer Law & Security Review, 26(1), 23-30.
  16. Mattern, F., Floerkemeier, C., 2010. From the Internet of Computers to the Internet of Things. In From active data management to event based systems and more, pp. 242-259. Springer Berlin Heidelberg.
  17. Friess, P., 2013. Internet of things: converging technologies for smart environments and integrated ecosystems. River Publishers.
  18. Babar, S., Mahalle, P., Stango, A., Prasad, N., Prasad, R., 2010. Proposed security model and threat taxonomy for the Internet of Things (IoT). In International Conference on Network Security and Applications, pp. 420-429. Springer Berlin Heidelberg.
  19. Santucci, G., 2010. The Internet of Things: Between the Revolution of the Internet and the Metamorphosis of Objects. In Harald Sundmaeker, Patrick Guillemin, Peter Friess, Sylvie Woelfflé Vision and Challenges for Realising the Internet of Things, Cluster of European Research Projects on the Internet of Things (CERP- IoT).
  20. Medaglia, C. M., Serbanati, A., 2010. An overview of privacy and security issues in the internet of things. In The Internet of Things, pp. 389-395. Springer New York.
  21. Ziegeldorf, J. H., Morchon, O. G., Wehrle, K., 2014. Privacy in the Internet of Things: threats and challenges. In Security and Communication Networks, 7(12), 2728-2742.
  22. Cranor, L. F., 1999. Internet Privacy. In Communications of the ACM, 42(2), pp 29-31.
  23. Rubin, A. D., Daniel E. Geer Jr., 1998. A Survey of Web Security. In IEEE Computer, pp 34-40.
  24. Grandison, T., Sloman, M., 2001. A Survey of Trust in Internet Applications. In IEEE Communications Surveys and Tutorials, 3(4), pp 2-16.
  25. Glen, L., Urban, F. S., William, J. Q., 2000. Placing Trust at the center of your internet strategy. In Sloan Management Review, 42 (1), pp 39-48.
  26. Sicari, S., Rizzardi, A., Grieco, L. A., Coen-Porisini. A., 2015. Survey Paper Security, privacy and trust in Internet of Things: The road ahead. In Computer Networks, 76, 146-164.

Paper Citation

in Harvard Style

Shahzad S., Iqbal M. and Ahmad N. (2017). Privacy Agents for IoT Cloud Communication . In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS, ISBN 978-989-758-245-5, pages 239-245

in Bibtex Style

author={Syed Khuram Shahzad and Muhammad Waseem Iqbal and Nadeem Ahmad},
title={Privacy Agents for IoT Cloud Communication},
booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,},

in EndNote Style

JO - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,
TI - Privacy Agents for IoT Cloud Communication
SN - 978-989-758-245-5
AU - Shahzad S.
AU - Iqbal M.
AU - Ahmad N.
PY - 2017
SP - 239
EP - 245
DO -