Fig. 6From: A model-driven approach to ensure trust in the IoTAD1—securing user dataBack to article page