Some very long page name that will hopefully never get created ABCDEF123
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
You do not have permission to edit this page, for the following reason:
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
Privacy labels for IoT consumer products
by | Christoffer Ramsvig Thambirajah |
---|---|
Supervisor(s) | Josef.Noll, Elahe Fazeldelkordi |
Due date | 2019/05/05 |
Status | Ongoing |
Problem description: | The Consumer Services of Norway (Forbrukerrådet) have established a report on privacy in Apps "App-Fail". In there they have found breach of privacy by apps. They identified a lack of "understandable privacy" as the main challenge. This thesis will
|
Methods and Tools: | The tools and methods in this thesis are based on
|
Time schedule | The envisaged time schedule (for a long thesis/60 ECTS) is:
|
Pre-Knowledge | This thesis has focus on methodology development. The envisaged thesis is based on security issues, thus expects the user to have followed at least two security-related courses |
Approved | Pending by |
Keywords | IoTSec, IoT, SCOTT, Privacy Label, GDPR |
Depiction |
this page was created by Special:FormEdit/Thesis, and can be edited by Special:FormEdit/Thesis/Assessment of Measurable Privacy for IoT Consumer Products
This page provides hints on what to include in your master thesis.
TOC
for the Essay, concentrate on 1.1,2.1,2.2, and 3.1
Title page, abstract, ...
- 1. Introduction, containing: short intro into the area, what is happening
- 1.1 Motivation, containing: what triggered me to write about what I'm writing about
- 1.2 Methods, containing: which methods are you using, how do you apply them
- 2. Scenario, optional chapter for explaining some use cases
- 2.1 user scenario, (bad name, needs something bedre): doll, puls watch (different transparency, configurability, thus privacy capabilities)
- 2.2 Requirements/Technological challenges: a) Privacy, b) measurability of privacy, c) translation/mapping from technical parameters, e.g. which data, which encryption to "privacy number" d) method for combining "privacy numbers", e) what does "privacy number" mean?
- 3. State-of-the art/Analysis of technology, structure your content after hardware/SW (or other domains). Describe which technologies might be used to answer the challenges, and how they can answer the challenges
- 3.1 Privacy by design
- 3.2 Multi-Metrics_analysis (MM)
- 3.3 ...
- 4. Implementation
- 4.1 Architecture, functionality: apply the Multi-Metric Approach (or other);MM approach is part of UNIK4750
- 4.2
- 5. Evaluation
- Apply the method for two devices, e.g. doll, puls watch
- 6. Conclusions
- References
- Open issues and Questions: list all things you want to answer, questions....
Comments
Red line
Your thesis should have a "red line", which is visible throughout the whole thesis. This means you should mention in the beginning of each chapter how the chapter contributes to the "goals of the thesis".
Use of scientific methods
A thesis follows a standard method:
- describe the problem (problemstilling)
- extract the challenges. These challenges should be measurable, e.g. method is too slow to be useful to voice handover.
- Analyse technology with respect to challenges. Don't write & repeat "everything" from a certain technology, concentrate on those parts (e.g. protocols) which are of importance for your problem
References
- Wikipedia is good to use to get an overview on what is happening. But there is not scientific verification of Wikipedia, thus you should use wikipedia only in the introduction of a chapter (if you use text from wikipedia). Use scientific literature for your thesis.
- Scientific library is "at your hand", you can get there directly from UiO: [[How to get access to IEEE, Springer and other scientific literature -> Unik/UiOLibrary]]
- I suggest that references to web pages, e.g. OASIS, W3C standards, are given in a footnote. Only if you find white papers or other .pdf documents on a web page then you refer to them in the reference section.
Evaluation of own work
Perform an evaluation of your own work. Revisit the challenges and discuss in how you fulfilled them. Provide alternative solution and discuss what should be done (or what could have been done).