Log in

Protection of personal privacy under the development of the Internet of Things

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

While the “Thing” under the term “Internet of Things” is referred to “any physical entity capable of connectivity that directly interfaces the physical world, such as embedded devices, sensors and actuators,” these connections to the physical world would involve to certain elements od personal privacy. Furthermore, IoT operations have direct and important connections to the geographical location of individuals, under the assistance of the borderless Internet these privacy issues would shift to international level. Although IoT transforms business and enables individuals to complete the task of objects assignation in geographical means via Internet service, personal information is also leaked to public. With regard of the privacy safeguard between different countries, the data flows of personal data in IOT would be a critical issue to international trade. Therefore, both World Trade Organization and the Organization for Economic Co-operation and Development have demonstrated an increasing enthusiasm for engaging in dialogue and processes to assist trustworthy cross-border data flows. This article will present the issues and possible solutions to the topic. The first part would provide security and privacy risks regarding IoT applications. In the second part, the discussion of risks shifts to cross-border data flows. The second part will cite several controlling methods and safeguards of the governing bodies, including countries and unions provisions of controlling. Then, the article will illustrate the GDPR experience about cross-border data flows. The fourth part will provide the differences of countries’ culture, religious, social environments, and levels of national security that existed the gaps of cross-border data flows. As in the conclusion addresses that international cooperation of promoting trusted cross-border data flows towards designing a conducive policy environment is required.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Deng, D. J., & Benslimane, A. (2022). Editorial: Innovation and application of Internet of Things for smart cities. Mobile Networks and Applications, 27, 1–2. https://doi.org/10.1007/s11036-020-01715-z

    Article  Google Scholar 

  2. Ashton, K. (2009). That, “Internet of Things” Thing. RFiD Journal, 22, 97–114.

    Google Scholar 

  3. International Telecommunication Union. (2012). Recommendation ITU-T Y. 2060: Overview of the Internet of things. Switzerland.

    Google Scholar 

  4. Shunichi, H., Teruhisa, M., Reiko, I., & Daiki, S. (2023). In-HOME behavioral observation employing IoT sensors. IEEJ Transactions on Electronics, Information and Systems, 142(2), 206–215.

    Google Scholar 

  5. Pham, T., Tsai, M., Nguyen, D., Dow, C., & Deng, D. (2015). A cloud-based smart-parking system based on Internet-of-Things technologies. IEEE Access, 3, 1581–1591. https://doi.org/10.1109/ACCESS.2015.2477299

    Article  Google Scholar 

  6. Peppet, S. (2014). Regulating the Internet of Things: First steps toward managing discrimination, privacy, security and consent. Texas Law Review, 93, 85.

    Google Scholar 

  7. Lin, H., Liao, B., Chen, Z., & Chen, J. (2022). One stop intelligent AI management of 5th generation mobile networks and internet of things. CIEE Magazine, 2022(2), 16–17.

    Google Scholar 

  8. Fumio, S. (2020). The changes of personal information protection environment and the related legal systems, Information science and technology 70(5), 224–230.

  9. Rose, K., Eldridge, S., and Chapin, L. (2015). The Internet of Things: An overview. Internet Society.

  10. Patel, H. (2017). IoT needs better security. ISACA J, 2017(3), 27–31.

    Google Scholar 

  11. Poudel, S. (2016). Internet of Things: underlying technologies interoperability, and threats to privacy and security. Berkeley Technol Law J, 31(2), 997.

    Google Scholar 

  12. Jones, M. (2015). Privacy without screens and the internet of other people’s things. Idaho Law Review., 51, 639.

    Google Scholar 

  13. Neil, R. (2013). The Dangers of Surveillance, Harvard Law Review 1934

  14. Zang, D. (2022). Self-control of personal data and the constitution in East Asia. Cross-Strait Law Review., 77, 50.

    Google Scholar 

  15. Wilton, R. (2014). CREDS 2014-position Paper: Four Ethical Issues in Online Trust Topics for a Moderated Workshop,” Internet Society, pp. 1–2

  16. Casalini, F., González, J.L., & Nemoto, T. (2021). Map** commonalities in regulatory approaches to cross-border data transfers, OECD Trade Policy Papers 248, OECD Publishing.

  17. Robinson, L., Kizawa K., & Ronchi E. (2021). Interoperability of privacy and data protection frameworks, OECD Going Digital Toolkit Notes, No. 21, OECD Publishing, Paris.

  18. Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281, 23.11.1995, p. 31.

  19. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications).

  20. Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and the free movement of such data.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chun-Hsien Sung.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sung, CH., Lu, MC. Protection of personal privacy under the development of the Internet of Things. Wireless Netw (2023). https://doi.org/10.1007/s11276-023-03569-1

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11276-023-03569-1

Keywords

Navigation