NESNELERİN İNTERNETİNDE VERİ MAHREMİYETİNİN KORUNMASI ÜZERİNE BİR İNCELEME
Year 2025,
Volume: 8 Issue: 1, 143 - 150, 26.08.2025
Murat Utku Kabasakaloğlu
,
Can Eyüpoğlu
Abstract
Nesnelerin İnterneti (Internet of Things-IoT) ve büyük veri teknolojileri, karmaşık analitik ve karar verme prosedürlerini kolaylaştırarak çok sayıda sektörü dönüştürmüştür. Bununla birlikte, IoT cihazlarının topladığı büyük miktarda hassas veri nedeniyle önemli gizlilik ve güvenlik endişeleri ortaya çıkmıştır. Bu çalışmada, büyük veri ve IoT senaryolarında uygulanan gizlilik koruma stratejilerinin kapsamlı bir literatür değerlendirmesi sunulmaktadır. Gizlilik mühendisliği metodolojileri, IoT’ye özgü gizlilik koruma önlemleri, anonimleştirme teknikleri ve diferansiyel gizlilik stratejileri tartışılmaktadır. Sonuçlar, diferansiyel gizlilik ve homomorfik şifreleme gibi tekniklerin büyük veri ve IoT ortamlarında gizliliği iyileştirmek için iyi çalıştığını göstermektedir. Ayrıca, anonimleştirme tekniklerinin sağlık ve endüstriyel IoT gibi sektörlerde veri mahremiyetini korumak için kullanılabileceği görülmüştür.
References
-
Ahmetoglu, H., & Das, R. (2022). A comprehensive review on detection of cyber-attacks: data sets, methods, challenges, and future research directions. Internet of Things, 20, 100615.
-
Al-Slais, Y. (2020, December). Privacy engineering methodologies: A survey. In 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT) (pp. 1-6). IEEE.
-
Alhirabi, N., Beaumont, S., Rana, O., & Perera, C. (2022, September). Privacy-patterns for IoT application developers. In Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers (pp. 7-9).
-
Ali, I., Khan, E., & Sabir, S. (2018). Privacy-preserving data aggregation in resource-constrained sensor nodes in Internet of Things: A review. Future Computing and Informatics Journal, 3(1), 41-50.
-
Binjubeir, M., Ahmed, A. A., Ismail, M. A. B., Sadiq, A. S., & Khan, M. K. (2019). Comprehensive survey on big data privacy protection. IEEE Access, 8, 20067-20079.
-
Dhinakaran, D., Sankar, S. M., Selvaraj, D., & Raja, S. E. (2024). Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with AI Integration. arXiv preprint arXiv:2401.00794.
-
Du, M., Wang, K., Chen, Y., Wang, X., & Sun, Y. (2018). Big data privacy preserving in multi-access edge computing for heterogeneous Internet of Things. IEEE Communications Magazine, 56(8), 62-67.
-
Eyüpoğlu, C. (2018). Büyük veride etkin gizlilik koruması için yazılım tasarımı (Doctoral dissertation, Doktora tezi) (İstanbul Üniversitesi, Fen Bilimleri Enstitüsü, İstanbul).
-
Eyüpoğlu, C., Aydın, M. A., Sertbaş, A., Zaim, A. H., & Öneş, O. (2017). Büyük veride kişi mahremiyetinin korunması. Bilişim Teknolojileri Dergisi, 10(2), 177-184.
-
Eyupoglu, C., Aydin, M. A., Zaim, A. H., & Sertbas, A. (2018). An efficient big data anonymization algorithm based on chaos and perturbation techniques. Entropy, 20(5), 373.
-
Gümüş, H. T., & Eyüpoğlu, C. (2022). Büyük Veride Anonimleştirme Teknikleri ve Saldırı Türleri: Uygulama Örnekleri. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi, 21(42), 422-441.
-
Gürses, S., Troncoso, C., & Diaz, C. (2011). Engineering privacy by design. Computers, Privacy & Data Protection, 14(3), 25.
-
Jiang, B., Li, J., Yue, G., & Song, H. (2021). Differential privacy for industrial internet of things: Opportunities, applications, and challenges. IEEE Internet of Things Journal, 8(13), 10430-10451.
-
Kara, B. C., & Eyupoglu, C. (2021, October). Anonymization methods for privacy-preserving data publishing. In The International Conference on Artificial Intelligence and Applied Mathematics in Engineering (pp. 145-159). Cham: Springer International Publishing.
-
Kara, B. C., & Eyüpoğlu, C. (2020, October). Sağlık 4.0’da Mahremiyet ve Güvenlik Sorunları/Privacy and Security Problems in Healthcare 4.0. In 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 1-12). IEEE.
-
Kara, B. C., & Eyüpoğlu, C. (2023). A New Privacy-Preserving Data Publishing Algorithm Utilizing Connectivity-Based Outlier Factor and Mondrian Techniques. Computers, Materials & Continua, 76(2), 1515-1535.
-
Kara, B. C., Eyüpoğlu, C., Uysal, S., & Bayraklı, S. (2023). Collection of an e-Health Dataset and Anonymization with Privacy-Preserving Data Publishing Algorithms. Electrica, 23(3), 658-665.
-
Kiani, F., & Taş, O. (2021). Nesnelerin İnterneti (IoT) ve Kablosuz Algılayıcı Ağların Güvenliğine Yapılan Saldırıların Tespit Edilmesi ve Önlenmesi: Detection and Prevention of Attacks on the Internet of Things (IoT) and Wireless Sensor Networks. Politeknik Dergisi, 24(1), 219-235.
-
Perera, C., Barhamgi, M., Bandara, A. K., Ajmal, M., Price, B., & Nuseibeh, B. (2020). Designing privacy-aware internet of things applications. Information Sciences, 512, 238-257.
-
Perera, C., Ranjan, R., Wang, L., Khan, S. U., & Zomaya, A. Y. (2015). Big data privacy in the internet of things era. IT professional, 17(3), 32-39.
-
Polat, H., Okkalıoğlu, B. D., & Koç, M. (2017). Bölünmüş Veri-Tabanlı Gizliliği Koruyan Ortak Filtreleme Sistemlerinde Gizli Verinin Elde Edilmesi. Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi, 32(1), 53-64.
-
Seliem, M., Elgazzar, K., & Khalil, K. (2018). Towards Privacy Preserving IoT Environments: A Survey. Wireless Communications and Mobile Computing, 2018(1), 1032761.
-
Sen, J., & Dasgupta, S. (2023). Data Privacy Preservation on the Internet of Things. arXiv preprint arXiv:2304.00258.
-
Torre, D., Chennamaneni, A., & Rodriguez, A. (2023). Privacy-preservation techniques for IoT devices: a systematic mapping study. IEEE Access, 11, 16323-16345.
-
Uluç, C., & Eyüpoğlu, C. (2024). Çocuklara Yönelik Akıllı Saatlerin Siber Güvenlik ve Mahremiyet Açısından İncelenmesi. İstanbul Ticaret Üniversitesi Teknoloji ve Uygulamalı Bilimler Dergisi, 7(1), 77-87.
-
Velioğlu, İ. (2023). Gizlilik artırıcı teknolojiler ve kullanım örnekleri (Master’s thesis, Lisansüstü Programlar Enstitüsü).
-
Wang, H., Zhang, Z., & Taleb, T. (2018). Special issue on security and privacy of IoT. World Wide Web, 21, 1-6.
-
Cranor, L. F., & Garfinkel, S. (2004). Guest Editors’ Introduction: secure or usable?. IEEE Security & Privacy, 2(5), 16-18.
-
Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in big data: privacy and data mining. IEEE Access, 2, 1149-1176.
-
Yang, L., Humayed, A., & Li, F. (2016, December). A multi-cloud based privacy-preserving data publishing scheme for the internet of things. In Proceedings of the 32nd annual conference on computer security applications (pp. 30-39).
-
Yee, K. P. (2004). Aligning security and usability.IEEE Security & Privacy, 2(5), 48-55.
A REVIEW ON DATA PRIVACY PRESERVATION IN INTERNET OF THINGS
Year 2025,
Volume: 8 Issue: 1, 143 - 150, 26.08.2025
Murat Utku Kabasakaloğlu
,
Can Eyüpoğlu
Abstract
The Internet of Things (IoT) and big data technologies have transformed numerous industries by streamlining complex analytics and decision-making procedures. On the other hand, significant privacy and security concerns have emerged due to the large amount of sensitive data collected by IoT devices. This study presents a comprehensive literature review of privacy preservation strategies applied in big data and IoT scenarios. Privacy engineering methodologies, IoT-specific privacy protection measures, anonymization techniques, and differential privacy strategies are discussed. The results show that techniques such as differential privacy and homomorphic encryption work well for improving privacy in big data and IoT environments. Furthermore, anonymization techniques can be used to protect data privacy in sectors such as healthcare and industrial IoT.
References
-
Ahmetoglu, H., & Das, R. (2022). A comprehensive review on detection of cyber-attacks: data sets, methods, challenges, and future research directions. Internet of Things, 20, 100615.
-
Al-Slais, Y. (2020, December). Privacy engineering methodologies: A survey. In 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT) (pp. 1-6). IEEE.
-
Alhirabi, N., Beaumont, S., Rana, O., & Perera, C. (2022, September). Privacy-patterns for IoT application developers. In Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers (pp. 7-9).
-
Ali, I., Khan, E., & Sabir, S. (2018). Privacy-preserving data aggregation in resource-constrained sensor nodes in Internet of Things: A review. Future Computing and Informatics Journal, 3(1), 41-50.
-
Binjubeir, M., Ahmed, A. A., Ismail, M. A. B., Sadiq, A. S., & Khan, M. K. (2019). Comprehensive survey on big data privacy protection. IEEE Access, 8, 20067-20079.
-
Dhinakaran, D., Sankar, S. M., Selvaraj, D., & Raja, S. E. (2024). Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with AI Integration. arXiv preprint arXiv:2401.00794.
-
Du, M., Wang, K., Chen, Y., Wang, X., & Sun, Y. (2018). Big data privacy preserving in multi-access edge computing for heterogeneous Internet of Things. IEEE Communications Magazine, 56(8), 62-67.
-
Eyüpoğlu, C. (2018). Büyük veride etkin gizlilik koruması için yazılım tasarımı (Doctoral dissertation, Doktora tezi) (İstanbul Üniversitesi, Fen Bilimleri Enstitüsü, İstanbul).
-
Eyüpoğlu, C., Aydın, M. A., Sertbaş, A., Zaim, A. H., & Öneş, O. (2017). Büyük veride kişi mahremiyetinin korunması. Bilişim Teknolojileri Dergisi, 10(2), 177-184.
-
Eyupoglu, C., Aydin, M. A., Zaim, A. H., & Sertbas, A. (2018). An efficient big data anonymization algorithm based on chaos and perturbation techniques. Entropy, 20(5), 373.
-
Gümüş, H. T., & Eyüpoğlu, C. (2022). Büyük Veride Anonimleştirme Teknikleri ve Saldırı Türleri: Uygulama Örnekleri. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi, 21(42), 422-441.
-
Gürses, S., Troncoso, C., & Diaz, C. (2011). Engineering privacy by design. Computers, Privacy & Data Protection, 14(3), 25.
-
Jiang, B., Li, J., Yue, G., & Song, H. (2021). Differential privacy for industrial internet of things: Opportunities, applications, and challenges. IEEE Internet of Things Journal, 8(13), 10430-10451.
-
Kara, B. C., & Eyupoglu, C. (2021, October). Anonymization methods for privacy-preserving data publishing. In The International Conference on Artificial Intelligence and Applied Mathematics in Engineering (pp. 145-159). Cham: Springer International Publishing.
-
Kara, B. C., & Eyüpoğlu, C. (2020, October). Sağlık 4.0’da Mahremiyet ve Güvenlik Sorunları/Privacy and Security Problems in Healthcare 4.0. In 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 1-12). IEEE.
-
Kara, B. C., & Eyüpoğlu, C. (2023). A New Privacy-Preserving Data Publishing Algorithm Utilizing Connectivity-Based Outlier Factor and Mondrian Techniques. Computers, Materials & Continua, 76(2), 1515-1535.
-
Kara, B. C., Eyüpoğlu, C., Uysal, S., & Bayraklı, S. (2023). Collection of an e-Health Dataset and Anonymization with Privacy-Preserving Data Publishing Algorithms. Electrica, 23(3), 658-665.
-
Kiani, F., & Taş, O. (2021). Nesnelerin İnterneti (IoT) ve Kablosuz Algılayıcı Ağların Güvenliğine Yapılan Saldırıların Tespit Edilmesi ve Önlenmesi: Detection and Prevention of Attacks on the Internet of Things (IoT) and Wireless Sensor Networks. Politeknik Dergisi, 24(1), 219-235.
-
Perera, C., Barhamgi, M., Bandara, A. K., Ajmal, M., Price, B., & Nuseibeh, B. (2020). Designing privacy-aware internet of things applications. Information Sciences, 512, 238-257.
-
Perera, C., Ranjan, R., Wang, L., Khan, S. U., & Zomaya, A. Y. (2015). Big data privacy in the internet of things era. IT professional, 17(3), 32-39.
-
Polat, H., Okkalıoğlu, B. D., & Koç, M. (2017). Bölünmüş Veri-Tabanlı Gizliliği Koruyan Ortak Filtreleme Sistemlerinde Gizli Verinin Elde Edilmesi. Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi, 32(1), 53-64.
-
Seliem, M., Elgazzar, K., & Khalil, K. (2018). Towards Privacy Preserving IoT Environments: A Survey. Wireless Communications and Mobile Computing, 2018(1), 1032761.
-
Sen, J., & Dasgupta, S. (2023). Data Privacy Preservation on the Internet of Things. arXiv preprint arXiv:2304.00258.
-
Torre, D., Chennamaneni, A., & Rodriguez, A. (2023). Privacy-preservation techniques for IoT devices: a systematic mapping study. IEEE Access, 11, 16323-16345.
-
Uluç, C., & Eyüpoğlu, C. (2024). Çocuklara Yönelik Akıllı Saatlerin Siber Güvenlik ve Mahremiyet Açısından İncelenmesi. İstanbul Ticaret Üniversitesi Teknoloji ve Uygulamalı Bilimler Dergisi, 7(1), 77-87.
-
Velioğlu, İ. (2023). Gizlilik artırıcı teknolojiler ve kullanım örnekleri (Master’s thesis, Lisansüstü Programlar Enstitüsü).
-
Wang, H., Zhang, Z., & Taleb, T. (2018). Special issue on security and privacy of IoT. World Wide Web, 21, 1-6.
-
Cranor, L. F., & Garfinkel, S. (2004). Guest Editors’ Introduction: secure or usable?. IEEE Security & Privacy, 2(5), 16-18.
-
Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in big data: privacy and data mining. IEEE Access, 2, 1149-1176.
-
Yang, L., Humayed, A., & Li, F. (2016, December). A multi-cloud based privacy-preserving data publishing scheme for the internet of things. In Proceedings of the 32nd annual conference on computer security applications (pp. 30-39).
-
Yee, K. P. (2004). Aligning security and usability.IEEE Security & Privacy, 2(5), 48-55.