In the world of IoT, connecting IoT together creates new value. Data collected from devices will be linked with other IoT data etc. leading to a flow that creates new value. However, there is a risk of privacy violation with the secondary and tertiary use of that data unless there is a mechanism to prevent the collected data from being discrepant.
Have you ever used a device which calculates your heart rate to monitor your health? Or have you ever used services that keep track of where you walked or used a service where you can link your photos you took during walking?
By connecting with Iot, IoT has a character of SOS(System of System) that generates new value. It can also be said that Iot with SoS characteristics make a connected world come true.
They have the following features:
1. Beneficial even unaided
2. Independently manageable even if connected
3. Evolving continuously
4. Achieve new purpose or function by connecting
5. Geographically dispersed, exchanging information
Although today, if the scope of a service is linking your own data(such as step count) and your other data( such as photos), with the mentioned features, it is possible that a new service may be generated via the internet by connecting more data. When that happens, there might be a service which provides more information combined with your location data such as optimal step count, and shop information around the walking area.
The vast amount of accumulated data will be used to make your life better in order to generate new value.
On the other hand, the accumulated data is not only limited to what is provided by yourself. Data such as walking steps, human weight, walked routes, and in some cases heart rate and blood pressure can be stored on the cloud that can be used for healthcare improvisation through the watch type monitoring devices.
Then this data can be used as secondary and tertiary in order to connect with other data. Hence, it is important that the collected data be treated in a very secure way.
For example, in the case of jogging and walking data, many companies are eager to acquire this data for business opportunities for e.g. such as how many people, what time of the day, and where people go jogging or walking etc..
In order to protect the collected data from inadvertent use while expanding the provision range of IoT data, the following security measures are required for the secondary and tertiary use of the data.
1. Authentication and verification
2. Access control
3. Anti-virus measure
4. Vulnerability measure
7. Monitoring system
If it is difficult to protect the security measures by yourself, or if you prefer a service by a specialist, you can always use services such as Data Lake *1, which enable data collection and infrastructure distribution to secure IoT data.