Skip to main content
Top

2019 | OriginalPaper | Chapter

10. Enhancing Privacy in Smart Cities by Facilitating Communications Between Public and Private Sectors

Authors : Basel Hasan, Ali Amin Rezaei, Jorge Marx Gómez

Published in: Smart Cities/Smart Regions – Technische, wirtschaftliche und gesellschaftliche Innovationen

Publisher: Springer Fachmedien Wiesbaden

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Smart cities are integrating smart technologies to increase efficiency, safety and confidence in urban life. Gathering, analysing and finding pattern in data are the key building blocks of the smart city concept. In smart cities, sensors can be installed in everywhere from public places to people’s living room. In such a setup, privacy would raise as a major concern. Some technologies were built to maintain the anonymity of the gathered data. However, the requirement and laws that enforce regulations related to privacy are constantly evolving. In such a dynamic ecosystem, keeping track of the latest evolution, as well as consolidating the application of the needed security and privacy requirements would be a quest in public and in private sectors. Hence, those requirements should be well communicated between both aforementioned sectors. This paper presents an approach to manage and facilitate communications between public and private sectors, using a security guidance framework. This Framework can also help to keep a track of the changes in security and privacy requirements.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Biswas K, Muthukkumarasamy V (2016) Securing smart cities using blockchain technology. In 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS), Sydney, pp 1392–1393 Biswas K, Muthukkumarasamy V (2016) Securing smart cities using blockchain technology. In 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS), Sydney, pp 1392–1393
2.
go back to reference United Nations (2014) World urbanization prospects: the 2014 revision, highlights (ST/ESA/SER.A/352). Department of Economic and Social Affairs, New York United Nations (2014) World urbanization prospects: the 2014 revision, highlights (ST/ESA/SER.A/352). Department of Economic and Social Affairs, New York
3.
go back to reference Elmaghraby AS, Losavio MM (2014) Cyber security challenges in smart cities: safety, security and privacy (eng). J Adv Res 5(4):491–497CrossRef Elmaghraby AS, Losavio MM (2014) Cyber security challenges in smart cities: safety, security and privacy (eng). J Adv Res 5(4):491–497CrossRef
4.
go back to reference Al Nuaimi E, Al Neyadi H, Mohamed N, Al-Jaroodi J (2015) Applications of big data to smart cities. J Internet Serv Appl 6(1):1CrossRef Al Nuaimi E, Al Neyadi H, Mohamed N, Al-Jaroodi J (2015) Applications of big data to smart cities. J Internet Serv Appl 6(1):1CrossRef
5.
go back to reference van Zoonen L (2016) Privacy concerns in smart cities. Gov Inf Q 33(3):472–480CrossRef van Zoonen L (2016) Privacy concerns in smart cities. Gov Inf Q 33(3):472–480CrossRef
6.
go back to reference AlDairi A, Tawalbeh L (2017) Cyber security attacks on smart cities and associated mobile technologies. Procedia Comput Sci 109:1086–1091CrossRef AlDairi A, Tawalbeh L (2017) Cyber security attacks on smart cities and associated mobile technologies. Procedia Comput Sci 109:1086–1091CrossRef
7.
go back to reference Martinez-Balleste A, Perez-martinez P, Solanas A (2013) The pursuit of citizens’ privacy: a privacy-aware smart city is possible. IEEE Commun Mag 51(6):136–141CrossRef Martinez-Balleste A, Perez-martinez P, Solanas A (2013) The pursuit of citizens’ privacy: a privacy-aware smart city is possible. IEEE Commun Mag 51(6):136–141CrossRef
8.
go back to reference Belleau F, Nolin M-A, Tourigny N, Rigault P, Morissette J (2008) Bio2RDF: towards a mashup to build bioinformatics knowledge systems, (eng). J Biomed Inform 41(5):706–716CrossRef Belleau F, Nolin M-A, Tourigny N, Rigault P, Morissette J (2008) Bio2RDF: towards a mashup to build bioinformatics knowledge systems, (eng). J Biomed Inform 41(5):706–716CrossRef
9.
go back to reference Samarati P (2001) Protecting respondents identities in microdata release. IEEE Trans Knowl Data Eng 13(6):1010–1027CrossRef Samarati P (2001) Protecting respondents identities in microdata release. IEEE Trans Knowl Data Eng 13(6):1010–1027CrossRef
10.
go back to reference Sweeney L (2002) Achieving K-anonymity privacy protection using generalization and suppression. Int J Uncertainty Fuzziness Knowl Based Syst 10(05):571–588MathSciNetCrossRef Sweeney L (2002) Achieving K-anonymity privacy protection using generalization and suppression. Int J Uncertainty Fuzziness Knowl Based Syst 10(05):571–588MathSciNetCrossRef
11.
go back to reference Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertainty Fuzziness Knowl Based Syst 10(05):557–570MathSciNetCrossRef Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertainty Fuzziness Knowl Based Syst 10(05):557–570MathSciNetCrossRef
12.
go back to reference Braun T, Fung BC, Iqbal F, Shah B (2018) Security and privacy challenges in smart cities. Sustain Cities Soc 39:499–507CrossRef Braun T, Fung BC, Iqbal F, Shah B (2018) Security and privacy challenges in smart cities. Sustain Cities Soc 39:499–507CrossRef
13.
go back to reference Kifer D (2009) Attacks on privacy and deFinetti’s theorem. In: Proceedings of the 35th SIGMOD international conference on Management of data – SIGMOD ’09, Providence, p 127 Kifer D (2009) Attacks on privacy and deFinetti’s theorem. In: Proceedings of the 35th SIGMOD international conference on Management of data – SIGMOD ’09, Providence, p 127
14.
go back to reference Ganta SR, Kasiviswanathan SP, Smith A (2008) Composition attacks and auxiliary information in data privacy. In: Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining – KDD 08, Las Vegas, p 265 Ganta SR, Kasiviswanathan SP, Smith A (2008) Composition attacks and auxiliary information in data privacy. In: Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining – KDD 08, Las Vegas, p 265
15.
go back to reference Chen R, Fung BC, Desai BC, Sossou NM (2012) Differentially private transit data publication. In: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining – KDD ’12, Beijing, p 213 Chen R, Fung BC, Desai BC, Sossou NM (2012) Differentially private transit data publication. In: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining – KDD ’12, Beijing, p 213
16.
go back to reference Dwork C (2008) Differential privacy: a survey of results. In: Agrawal M, Du D, Duan Z, Li A (eds) Lecture notes in computer science, theory and applications of models of computation. Springer, Berlin/Heidelberg, pp 1–19 Dwork C (2008) Differential privacy: a survey of results. In: Agrawal M, Du D, Duan Z, Li A (eds) Lecture notes in computer science, theory and applications of models of computation. Springer, Berlin/Heidelberg, pp 1–19
17.
go back to reference Biryukov A et al (2011) Differential privacy. In: van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Springer US, Boston, pp 338–340 Biryukov A et al (2011) Differential privacy. In: van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Springer US, Boston, pp 338–340
18.
go back to reference Andreasson KJ (2012) In: Andreasson K (Hrsg) Cybersecurity: public sector threats and responses. CRC Press, Boca Raton Andreasson KJ (2012) In: Andreasson K (Hrsg) Cybersecurity: public sector threats and responses. CRC Press, Boca Raton
19.
go back to reference CARR M (2016) Public-private partnerships in national cyber-security strategies. Int Aff 92(1):43–62CrossRef CARR M (2016) Public-private partnerships in national cyber-security strategies. Int Aff 92(1):43–62CrossRef
20.
go back to reference Hasan B, Marx Gómez J (2017) Security framework for adopting mobile applications in small and medium enterprises. In: Obaidat MS (eds) E-Business and telecommunications: 13th international joint conference, ICETE 2016, Lisbon, Portugal, July 26–28, 2016, Revised selected papers, Springer International Publishing, Cham, pp 75–98CrossRef Hasan B, Marx Gómez J (2017) Security framework for adopting mobile applications in small and medium enterprises. In: Obaidat MS (eds) E-Business and telecommunications: 13th international joint conference, ICETE 2016, Lisbon, Portugal, July 26–28, 2016, Revised selected papers, Springer International Publishing, Cham, pp 75–98CrossRef
21.
go back to reference Hasan B, Dmitriyev V, Marx Gomez J, Kurzhofer J (2014) A framework along with guidelines for designing secure mobile enterprise applications. In: Security technology (ICCST), 2014 international Carnahan conference on, IEEE Xplore, Rome, pp 1–6 Hasan B, Dmitriyev V, Marx Gomez J, Kurzhofer J (2014) A framework along with guidelines for designing secure mobile enterprise applications. In: Security technology (ICCST), 2014 international Carnahan conference on, IEEE Xplore, Rome, pp 1–6
Metadata
Title
Enhancing Privacy in Smart Cities by Facilitating Communications Between Public and Private Sectors
Authors
Basel Hasan
Ali Amin Rezaei
Jorge Marx Gómez
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-658-25210-6_10

Premium Partner