skip to main content
10.1145/3236461.3241975acmotherconferencesArticle/Chapter ViewAbstractPublication PagessccConference Proceedingsconference-collections
research-article

Empowering Smart Cities with Strong Cryptography for Data Privacy

Published:20 June 2018Publication History

ABSTRACT

The transformative promise of Smart Cities relies largely on the collection and innovative analysis of data produced by and about its citizens. As more insights are gained from such analysis, its impacts are difficult to predict. Care must be taken to ensure data is transmitted and stored using privacy-protecting methods. Traditional strategies of access control are necessary but insufficient as major security breaches are becoming more commonplace. Attempts to strip data sets of personally identifiable information may appear to protect privacy, but de-anonymization techniques using statistical analysis can uniquely identify a person from surprisingly little information. Strong cryptography, when implemented correctly, can provide these protections.

Appropriately applied cryptography can ensure that breaches reveal nothing about the data it protects. And beyond the confidentiality guarantees from typical cryptographic applications, end-to-end cryptography can also help to ensure privacy is maintained. Sophisticated mechanisms for sharing and revoking access become approachable and inherent to the system. Integrating cryptography at a foundational level allows projects to adapt to new insights without sacrificing privacy. Impacts from breaches are drastically mitigated and unforeseen statistical correlations are next to impossible. Our paper details our experiences, in collaboration with NIST, developing an end-to-end encrypted platform that empowers users with fine-grained control over their own data privacy.

References

  1. 2017. Hyperledger Announces Production-Ready Hyperledger Fabric 1.0. Hyperledger.org (Jul 2017). https://www.hyperledger.org/announcements/2017/07/11/ hyperledger-announces-production-ready-hyperledger-fabric-1-0Google ScholarGoogle Scholar
  2. Mohit Arora. 2012. How secure is AES against brute force attacks? https: //www.eetimes.com/document.asp?doc_id=1279619Google ScholarGoogle Scholar
  3. Garrett Bekker. 2018. 2018 Thales Data Threat Report - Global Edition. https: //dtr.thalesesecurity.com/Google ScholarGoogle Scholar
  4. Mark Burnett. 2011. 10,000 Top Passwords. https://xato.net/ 10-000-top-passwords-6d6380716fe0Google ScholarGoogle Scholar
  5. Lily Chen, Lily Chen, Stephen Jordan, Yi-Kai Liu, Dustin Moody, Rene Peralta, Ray Perlner, and Daniel Smith-Tone. 2016. Report on post-quantum cryptography. US Department of Commerce, National Institute of Standards and Technology.Google ScholarGoogle Scholar
  6. Mauro Conti, Chhagan Lal, Sushmita Ruj, et al. 2017. A survey on security and privacy issues of bitcoin. arXiv preprint arXiv:1706.00916 (2017).Google ScholarGoogle Scholar
  7. Yves-Alexandre De Montjoye, César A Hidalgo, Michel Verleysen, and Vincent D Blondel. 2013. Unique in the crowd: The privacy bounds of human mobility. Scientific reports 3 (2013), 1376.Google ScholarGoogle Scholar
  8. Anna Lysyanskaya. 2002. Signature schemes and applications to cryptographic protocol design. Ph.D. Dissertation. Massachusetts Institute of Technology. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Marja Martinez. 2018. New initiative to create safer streets leaves public concerned about privacy. http://www.kptv.com/story/38033744/ new-initiative-to-create-safer-streets-leaves-public-concerned-about-privacyGoogle ScholarGoogle Scholar
  10. David A McGrew and John Viega. 2004. The security and performance of the Galois/Counter Mode (GCM) of operation. In International Conference on Cryptology in India. Springer, 343--355. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Arvind Narayanan and Vitaly Shmatikov. 2008. Robust de-anonymization of large sparse datasets. In Security and Privacy, 2008. SP 2008. IEEE Symposium on. IEEE, 111--125. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. L. Rivest, A. Shamir, and L. Adleman. 1978. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Commun. ACM 21, 2 (Feb. 1978), 120--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Phillip Rogaway. 2002. Authenticated-encryption with associated-data. In Proceedings of the 9th ACM conference on Computer and communications security. ACM, 98--107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Nirmalya Roy, Nilavra Pathak, and Archan Misra. 2016. Fine-grained appliance usage and energy monitoring through mobile and power-line sensing. Pervasive and Mobile Computing 30 (2016), 132--150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Peter Shah. 2015. Lamassu: Storage-Efficient Host-Side Encryption. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. Sweeney. 2000. Simple Demographics Often Identify People Uniquely. Technical Report Data Privacy Working Paper 3. Carnegie Mellon, Pittsburgh, PA.Google ScholarGoogle Scholar
  17. Uber Team. 2012. Rides of Glory. https://perma.cc/GDB8-PD2XGoogle ScholarGoogle Scholar
  18. Anthony Tockar. 2014. Riding with the stars: Passenger privacy in the nyc taxicab dataset. Neustar Research, September 15 (2014).Google ScholarGoogle Scholar

Index Terms

  1. Empowering Smart Cities with Strong Cryptography for Data Privacy

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            SCC '18: Proceedings of the 1st ACM/EIGSCC Symposium on Smart Cities and Communities
            June 2018
            47 pages
            ISBN:9781450357869
            DOI:10.1145/3236461

            Copyright © 2018 ACM

            © 2018 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 20 June 2018

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            SCC '18 Paper Acceptance Rate6of16submissions,38%Overall Acceptance Rate64of159submissions,40%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader