Understanding the Internet of Things (IoT) and data privacy

Katy PauschWhen it comes to advancements in the Internet of Things (IoT) and networking, the Cox Connected Environments Collaboratory explores next-generation wireless networks at their laboratory on the ASU campus. Read on to learn more about three levels of data governance that help to keep your information safe.

IoT refers to things in the real world that are connected to the internet. Such IoT devices add value by collecting and processing data that help us understand and optimize the world around us. It’s important to manage this data responsibly, and specifically to protect people’s personally identifiable information (PII), but it’s more than that, too. Katy Pusch, Director, Product & Integration at Cox2M and the Collaboratory, shared, “It’s not just about the privacy of their personal information and privacy of the community, but you also need to consider what the data is used for.” 

She explained three levels of data governance available:

  1. Collecting data without PII
    Example - LiDar (Light detection and ranging): This remote sensing method uses light in the form of a pulsed laser to measure ranges — how long it takes the reflected light energy to return to the LiDar sensor where it’s recorded. One example in practice is systems using LiDar sensors to analyze traffic patterns — differentiating between humans, cars, bikes and more. Over time, the data collected can be used to improve campus mobility and design. The data using this technology is highly accurate, and it gathers zero PII.
     
  2. Collecting and dropping data
    Example - Edge Computing: This technology is a distributed computing paradigm that brings computation and data storage closer to the data source. In this example, data is collected on-site using Edge. After the automation or data analysis happens on Edge, the algorithm is sent to the server and the data (and any PII) is immediately dumped. Edge Computing was used for the Cox Collaboratory’s video analytics testing to improve bike parking on campus.
     
  3. Collecting and safely storing data
    Example - Software-defined networks (SDN): This approach to network management enables dynamic network configuration to improve the network’s performance and monitoring. While SDNs collect PII, they also protect it on the network. “These defined networks with security are taking VPN to the next level,” said Pusch.

Want to help the Cox Collaboratory create smarter communities? Share a big idea on how to solve a problem through smart tech!