(1) Less computing power for executing privacy solutions. |
✓ |
|
(2) Inefficient performance for real time secure processing. |
✓ |
|
(3) Limited resources with regard to bandwidth. |
✓ |
|
(4) Lack of privacy policies. |
✓ |
✓ |
(5) Absence of trust management layers between computing paradigms. |
✓ |
✓ |
(6) Lack of user awareness about sharing their own data. |
✓ |
✓ |
(7) Limited resources with regard to memory. |
✓ |
✓ |
(8) High mobility of devices introduces the challenge to keep the privacy preservation mechanisms intelligent and dynamic. |
✓ |
✓ |
(9) Dependence on other platforms for optimal performance. |
✓ |
|
(10) Heterogeneous nature impels for complex intercommunication between devices and among platforms. |
✓ |
✓ |
(11) Decentralized architecture's complexity. |
|
✓ |
(12) Requirement of unconventional lightweight privacy mechanisms. |
|
✓ |
(13) Compatibility issues within devices can lead to misconfiguration and thus data exposure. |
|
✓ |
(14) High computational overheads. |
|
✓ |
(15) Possibility of hardware (device/node) compromise. |
✓ |
✓ |