Data Security in IoT

Open Access

Year : 2023 | Volume :8 | Issue : 3 | Page : 25-29

    Swati Yelapure

  1. Sneha Deshmukh

  1. Student, Department of Computer Engineering, Dhole Patil College of Engineering, , India
  2. Assistant Professor, Department of Computer Engineering, Dhole Patil College of Engineering, , India


Privacy and security are among the major Internet of Things (IoT) challenges. Improper device upgrades, lack of effective and robust security agreements, user ignorance, and popularity active device monitoring is among the challenges IoT faces. In this work, we explore the background of IoT applications and security measures, and identifying alternative security as well privacy issues, methods used to protect location components and IoT-based programs, existing security solutions, and the best privacy models needed and suitable for the exception layers of IoT-operated application. IoT security is the act of safeguarding Internet devices and the networks to which they’re connected from threats and breaches by identifying, protecting, and monitoring risks, as well as assisting in the repair of vulnerabilities from a variety of devices that can pose a security risk to your company.

Keywords: Data Security, IOT devices, IoT security, Social Media Applications, Internet of Things

[This article belongs to Journal of Multimedia Technology & Recent Advancements(jomtra)]

How to cite this article: Swati Yelapure, Sneha Deshmukh Data Security in IoT jomtra 2023; 8:25-29
How to cite this URL: Swati Yelapure, Sneha Deshmukh Data Security in IoT jomtra 2023 {cited 2023 Jan 30};8:25-29. Available from:

Full Text PDF Download

Browse Figures


1. Renata L. Rosa, Gisele M. Schwartz, Wilson V. Ruggiero, and Demosthenes Z. Rodriguez, Senior Member, IEEE” A Knowledge-Based Recommendation System that includes Sentiment Analysis and Deep Learning” IEEE 2019.
2. Guang Yang, Haibo He, Fellow, IEEE, and Qian Chen” Emotion-Semantic Enhanced Neural Network” IEEE 2019.
3. M. Al-Qurishi, M. S. Hossain, M. Alrubaian, S. M. M. Rahman, and A. Alamri, “Leveraging analysis of user behavior to identify malicious activities in large-scale social networks,” IEEETransactions on Industrial Informatics, vol. 14, no. 2, pp. 799–813, Feb 2018.
4. H. Lin, J. Jia, J. Qiu, Y. Zhang, G. Shen, L. Xie, J. Tang, L. Feng, and T. S. Chua, “Detecting stress based on social interactions in social networks,” IEEE Transactions on Knowledge and Data Engineering, vol. 29, no. 9, pp. 1820–1833, Sept 2017.
5. Budhaditya Saha, Thin Nguyen, Dinh Phung, Svetha Venkatesh” A Framework for Classifying Online Mental Health Related Communities with an Interest in Depression” IEEE 2016
6. Techtarget. IoT security (internet of things security) [Online]. Available from
7. Fortinet. What Is IoT Security? [Online]. Available from
8. Findstack. The Ultimate List of Internet of Things Statistics for 2022 [Online]. Available from
9. Jigsaw. Importance Of Data Security In 2021 [Online]. Available from
10. ISACA. Security and Privacy Challenges of IoT-enabled Solutions [Online]. Available from
11. ALSO the technology provider. IOT AND SECURITY [Online]. Available from

Regular Issue Open Access Article
Volume 8
Issue 3
Received September 21, 2021
Accepted December 12, 2021
Published January 30, 2023