, on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95, ECGeneral Data Protection Regulation) Official Journal of the European Union, vol.4688, issue.119, pp.1-119, 2016.

A. Acquisti, L. K. John, and G. Loewenstein, What Is Privacy Worth?, The Journal of Legal Studies, vol.42, issue.2, pp.246-274, 2013.
DOI : 10.1086/671754

P. Boutin, May) The Secretive World of Selling Data About You, Newsweek, pp.2-34, 2016.

T. Brewster, May) Facebook, Google and personal data: What's your worth? BBC, p.7, 2014.

J. Morris and E. Lavandera, Aug) Why big companies buy, sell your data? CNN, pp.7-9, 2012.

L. Mirani and M. Nisen, The nine companies that know more about you than Google or Facebook Available: https://goo, Quartz. [Online], p.7, 2014.

J. Sadowski, Aug) Companies are making money from our personal data but at what cost? The Guardian Available: https://goo, p.5, 2016.

D. Gross, Jun) Facebook to show you ads based on your Web browsing, 2012.

S. W. Felix, R. Eggers, A. Hamill, and . Ali, Sep) This Is How Facebook Is Tracking Your Internet Activity Business Insider. [Online] Available: http://goo.gl/BPvUoR Data as the new currency: Governments role in facilitating the exchange, Deloitte Review, vol.13, pp.19-31, 2012.

B. Schmarzo, Jan) Data is a New Currency Available: https://goo.gl Available: https://goo, Feb) Gartner Says 8.4 Billion Connected " Things " Will Be in Use in 2017, Up 31 Percent From 2016. Gartner, Inc. [Online], pp.3-12, 2017.

J. H. Ziegeldorf, O. G. , and K. Wehrle, Privacy in the Internet of Things: threats and???challenges, Security and Communication Networks, pp.2728-2742, 2014.
DOI : 10.1007/978-3-642-14527-8_1

M. Abomhara and G. M. Koien, Security and privacy in the Internet of Things: Current status and open issues, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS), pp.1-8, 2014.
DOI : 10.1109/PRISMS.2014.6970594

Y. H. Hwang, IoT Security & Privacy, Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, IoTPTS '15, p.1, 2015.
DOI : 10.1145/2732209.2732216

D. Berreby, Mar) Click to agree with what? No one reads terms of service, studies confirm. The Guardian. [Online] Available: https://goo.gl, Privacy by Design. Information & Privacy Commissioner of Ontario. [Online]. Available, 2009.

S. Ioannidis, S. Sidiroglou, and A. D. Keromytis, Privacy As an Operating System Service, Proceedings of the 1 st USENIX Workshop on Hot Topics in Security, ser. HOTSEC'06, pp.8-8, 2006.

, The Guide to Data Protection Inofrmation Commissioner's Office (ICO), Tech. Rep, 2017.

, Available: https://ico.org.uk/media/for-organisations/guide-to-data- protection

P. Gutmann, Secure Deletion of Data from Magnetic and Solidstate Memory Focusing on Applications of Cryptography -Volume 6, ser. SSYM'96, 6 th Conference on USENIX Security Symposium, pp.8-8, 1996.

A. R. Regenscheid, L. Feldman, and G. A. Witte, NIST Special Publication 800-88, Revision 1: Guidelines for Media Sanitization, NIST ITL Bulletin, 2015.

L. Cranor, M. Langheinrich, and M. Marchiori, A P3P Preference Exchange Language 1.0 (APPEL1.0) Available: https, W3C Working Draft, p.1, 2002.

A. Anderson, A comparison of two privacy policy languages, Proceedings of the 3rd ACM workshop on Secure web services , SWS '06, 2005.
DOI : 10.1145/1180367.1180378

R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, XPref: a preference language for P3P, Computer Networks, vol.48, issue.5, pp.809-827, 2005.
DOI : 10.1016/j.comnet.2005.01.004

P. Evans-greenwood, Distributed Ledgers & Linked Data, Proceedings of the 26th International Conference on World Wide Web Companion , WWW '17 Companion, pp.1451-1451, 2017.
DOI : 10.1145/3041021.3053898

C. Khan, A. Lewis, E. Rutland, C. Wan, K. Rutter et al., A Distributed-Ledger Consortium Model for Collaborative Innovation, Computer, vol.50, issue.9, pp.29-37, 2017.
DOI : 10.1109/MC.2017.3571057

K. Christidis and M. Devetsikiotis, Blockchains and Smart Contracts for the Internet of Things, IEEE Access, vol.4, pp.2292-2303, 2016.
DOI : 10.1109/ACCESS.2016.2566339

L. Luu, D. Chu, H. Olickel, P. Saxena, and A. Hobor, Making Smart Contracts Smarter, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.254-269, 2016.
DOI : 10.1145/359545.359563

R. Herbster, S. Dellatorre, P. Druschel, and B. Bhattacharjee, Privacy Capsules, Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '16, pp.399-411, 2016.
DOI : 10.1145/2342549.2342561

W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung et al., TaintDroid, th USENIX Conference on Operating Systems Design and Implementation. USENIX Association, pp.393-407, 2010.
DOI : 10.1145/1629575.1629604

P. Urien, Towards secure elements for the Internet of Things: The eLock use case, nd International Conference on Mobile and Secure Services, pp.1-5, 2016.

B. Koppel and S. Neuhaus, Analysis of a hardware security module's high-availability setting, IEEE Security & Privacy, vol.11, issue.3, pp.77-80, 2013.
DOI : 10.1109/MSP.2013.56