Skip to main content

2017 | OriginalPaper | Buchkapitel

6. Privacy and Social Values in Smart Cities

verfasst von : Leonardo A. Martucci, Simone Fischer-Hübner, Mark Hartswood, Marina Jirotka

Erschienen in: Designing, Developing, and Facilitating Smart Cities

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy, a fundamental human right, is a key nonfunctional requirement to every electronic service and applications designed for smart societies. Informational privacy, the right of individuals to control information related to them, in smart societies is at the core of this chapter. A key aspect in the layout of smart societies and smart cities is the understanding and prediction of human behavior, which is nowadays fundamentally based on collecting and processing personal data. Hence, smart societies need to accommodate individuals’ rights and the data collection needs. We provide an overview of the existing models and techniques for protecting individuals’ privacy, such as privacy policies, transparency tools and anonymous communication systems, and discuss the needs and limitations of Privacy by Design (PbD) in the layout of smart societies and Internet of Things.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
3
The “Uninvited Guests” is short film produced by Superflux and commissioned by Thing Tank. https://​vimeo.​com/​128873380.
 
4
Z. Tufekci and B. King. “We Can’t Trust Uber”. In: The Opinion Pages, NY Times, Dec. 7, 2014.
 
5
M. Isaac. “Uber Executives Comments Leave Company Scrambling”. In: Bits, a NY Times Blog, Nov. 18, 2014. http://​bits.​blogs.​nytimes.​com/​2014/​11/​18/​emil-michael-of-uber-proposes-digging-into-journalists-private-lives/​.
 
6
The EU GDPR was passed by the European Parliament in Dec. 2015, entered into force on 24 May 2016 and shall apply in all EU member sates from 25 May 2018. The GDPR was chosen as our reference for many reasons: (a) it applies to data controllers or processors located in the EU, and to any organization processing personal data of EU residents, (b) it reflects the basic privacy principles of the OECD privacy guidelines and (c) of the US Federal Trade Commission’s (FTC) Fair Information Practice Principles (even going beyond them).
 
7
B. Ray. “Securing the Internet of Things–or how light bulbs can spy on you”. Apr. 22, 2013. The Register. http://​www.​theregister.​co.​uk/​2013/​04/​22/​iot_​security/​.
 
8
D. Pauli. “Connected kettles boil over, spill Wi-Fi passwords over London”. Oct. 19, 2015. The Register. http://​www.​theregister.​co.​uk/​2015/​10/​19/​bods_​brew_​ikettle_​20_​hack_​plot_​vulnerable_​london_​pots/​.
 
9
I. Thomson. “Goodbye, Hello Barbie: Wireless toy dogged by POODLE SSL hole”. Dec. 4, 2015. The Register. http://​www.​theregister.​co.​uk/​2015/​12/​04/​wireless_​barbie_​slipshod_​security/​.
 
10
The RFID capabilities and the scope of its applications are narrow enough to produce a PIA with a (non-exhaustive) set of 15 potential threats and five groups of countermeasures.
 
11
The definition of the terms anonymity, unlinkability, pseudonymity, unobservability in this chapter follows the Pfitzmann and Hansen terminology [30].
 
Literatur
3.
Zurück zum Zitat Azraoui M, Elkhiyaoui K, Önen M, Bernsmed K, De Oliveira AS, Sendor J (2015) A-PPL: an accountability policy language. In: Data privacy management, autonomous spontaneous security, and security assurance, pp 319–326. Springer Azraoui M, Elkhiyaoui K, Önen M, Bernsmed K, De Oliveira AS, Sendor J (2015) A-PPL: an accountability policy language. In: Data privacy management, autonomous spontaneous security, and security assurance, pp 319–326. Springer
4.
Zurück zum Zitat Borges F, Martucci LA, (2014) iKUP keeps users’ privacy in the smart grid. In: CNS, (2014) IEEE Computer Society. NY, USA, New York Borges F, Martucci LA, (2014) iKUP keeps users’ privacy in the smart grid. In: CNS, (2014) IEEE Computer Society. NY, USA, New York
5.
Zurück zum Zitat Camenisch J, Lysyanskaya A, (2002) A signature scheme with efficient protocols. security in communication networks: third international conference (SCN, (2002) Lecture Notes in Computer Science, 2576 (2003)). Springer. Amalfi, Italy, pp 268–289 Camenisch J, Lysyanskaya A, (2002) A signature scheme with efficient protocols. security in communication networks: third international conference (SCN, (2002) Lecture Notes in Computer Science, 2576 (2003)). Springer. Amalfi, Italy, pp 268–289
6.
Zurück zum Zitat Cavoukian A (2009) Privacy by design. White paper, Information and Privacy Commissioner of Ontario Cavoukian A (2009) Privacy by design. White paper, Information and Privacy Commissioner of Ontario
7.
Zurück zum Zitat Chaum DL (1981) Untraceable electronic mail, return addresses and digital pseudonyms. Commun ACM 24(2):84–88CrossRef Chaum DL (1981) Untraceable electronic mail, return addresses and digital pseudonyms. Commun ACM 24(2):84–88CrossRef
8.
9.
10.
Zurück zum Zitat Cheney-Lippold J (2011) A new algorithmic identity soft biopolitics and the modulation of control. Theory, Culture Soc 28(6):164–181CrossRef Cheney-Lippold J (2011) A new algorithmic identity soft biopolitics and the modulation of control. Theory, Culture Soc 28(6):164–181CrossRef
11.
Zurück zum Zitat Clarke R (2009) Privacy impact assessment: its origins and development. Comput Law Secur Rev 25(2):123–135CrossRef Clarke R (2009) Privacy impact assessment: its origins and development. Comput Law Secur Rev 25(2):123–135CrossRef
13.
Zurück zum Zitat Dimitrakopoulos G, Demestichas P (2010) Intelligent transportation systems. Vehicular Technology Magazine 5:77–84CrossRef Dimitrakopoulos G, Demestichas P (2010) Intelligent transportation systems. Vehicular Technology Magazine 5:77–84CrossRef
14.
Zurück zum Zitat Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. USENIX-SS 2004. USENIX Association, Berkeley, CA, USA, pp 303–320 Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. USENIX-SS 2004. USENIX Association, Berkeley, CA, USA, pp 303–320
15.
Zurück zum Zitat Earnst & Young: Routes to prosperity: How can smart transport infrastructure can help cities to thrive. http://www.ey.com/Publication/vwLUAssets/EY-routes-to-prosperity-via-smart-transport/$FILE/EY-routes-to-prosperity-via-smart-transport.pdf (2015) Earnst & Young: Routes to prosperity: How can smart transport infrastructure can help cities to thrive. http://​www.​ey.​com/​Publication/​vwLUAssets/​EY-routes-to-prosperity-via-smart-transport/​$FILE/​EY-routes-to-prosperity-via-smart-transport.​pdf (2015)
16.
Zurück zum Zitat European Commission: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L No.281 (1995) European Commission: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L No.281 (1995)
17.
Zurück zum Zitat European Commission: Regulation (EU) 2016/679 of the European Council and Parliament of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), Official Journal of the European Union, L 119/1 European Commission: Regulation (EU) 2016/679 of the European Council and Parliament of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), Official Journal of the European Union, L 119/1
18.
Zurück zum Zitat European Union Norm: Privacy and data protection impact assessment framework for RFID applications, Appendix to the Opinion 9/2011 on the revised industry proposal for a privacy and data protection impact assessment framework for RFID applications (2011) European Union Norm: Privacy and data protection impact assessment framework for RFID applications, Appendix to the Opinion 9/2011 on the revised industry proposal for a privacy and data protection impact assessment framework for RFID applications (2011)
19.
Zurück zum Zitat Figueiredo L, Jesus I, Machado J, Ferreira J, Carvalho J (2001) Towards the development of intelligent transportation systems. Intell Transp Syst 88:1206–1211 Figueiredo L, Jesus I, Machado J, Ferreira J, Carvalho J (2001) Towards the development of intelligent transportation systems. Intell Transp Syst 88:1206–1211
20.
Zurück zum Zitat Fischer-Hübner S, Martucci LA (2014) Privacy in social collective intelligence systems. In: Social collective intelligence, pp 105–124. Springer Fischer-Hübner S, Martucci LA (2014) Privacy in social collective intelligence systems. In: Social collective intelligence, pp 105–124. Springer
21.
Zurück zum Zitat Gürses S, Troncoso C, Diaz C (2011) Engineering privacy by design. Computers, Privacy & Data Protection 14: Gürses S, Troncoso C, Diaz C (2011) Engineering privacy by design. Computers, Privacy & Data Protection 14:
22.
Zurück zum Zitat Hartswood M, Jirotka M, Chenu-Abente R, Hume A, Giunchiglia F, Martucci LA, Fischer-Hübner S (2014) Privacy for peer profiling in collective adaptive systems. In: Privacy and identity management for the future internet in the age of globalisation, pp 237–252. Springer Hartswood M, Jirotka M, Chenu-Abente R, Hume A, Giunchiglia F, Martucci LA, Fischer-Hübner S (2014) Privacy for peer profiling in collective adaptive systems. In: Privacy and identity management for the future internet in the age of globalisation, pp 237–252. Springer
23.
Zurück zum Zitat Ico uk: Conducting privacy impact assessments code of practice, v. 1.0. Technical report, Information Commissioner’s Office (ico), uk (2014) Ico uk: Conducting privacy impact assessments code of practice, v. 1.0. Technical report, Information Commissioner’s Office (ico), uk (2014)
24.
Zurück zum Zitat Iwaya L, Giunchiglia F, Martucci LA, Hume A, Fischer-Hübner S, Chenu-Abente R (2015) Ontology-based obfuscation and anonymisation for privacy—a case study on healthcare. In: Proceedings of the 10th IFIP summer school on privacy and identity management. Springer Iwaya L, Giunchiglia F, Martucci LA, Hume A, Fischer-Hübner S, Chenu-Abente R (2015) Ontology-based obfuscation and anonymisation for privacy—a case study on healthcare. In: Proceedings of the 10th IFIP summer school on privacy and identity management. Springer
25.
Zurück zum Zitat Jara A, Alcolea A, Zamora M, Skarmeta A, Alsaedy M (2010) Drugs interaction checker based on IoT. In: Internet of things (IOT), pp 1–8. IEEE Jara A, Alcolea A, Zamora M, Skarmeta A, Alsaedy M (2010) Drugs interaction checker based on IoT. In: Internet of things (IOT), pp 1–8. IEEE
26.
Zurück zum Zitat Martucci LA, Andersson C, Fischer-Hübner S (2006) Chameleon and the Identity-anonymity paradox: anonymity in mobile ad hoc networks. In: IWSEC 2006, pp. 123–134. IPSJ Martucci LA, Andersson C, Fischer-Hübner S (2006) Chameleon and the Identity-anonymity paradox: anonymity in mobile ad hoc networks. In: IWSEC 2006, pp. 123–134. IPSJ
27.
Zurück zum Zitat Martucci LA, Kohlweiss M, Andersson C, Panchenko A (2008) Self-certified sybil-free pseudonyms. In: Proceedings of the 1st ACM conference on wireless network security (WiSec’08), pp. 154–159. ACM Press Martucci LA, Kohlweiss M, Andersson C, Panchenko A (2008) Self-certified sybil-free pseudonyms. In: Proceedings of the 1st ACM conference on wireless network security (WiSec’08), pp. 154–159. ACM Press
28.
Zurück zum Zitat Miorandi D, Maltese V, Rovatsos M, Nijholt A, Stewart J (2014) Social collective intelligence. Springer Miorandi D, Maltese V, Rovatsos M, Nijholt A, Stewart J (2014) Social collective intelligence. Springer
29.
Zurück zum Zitat Mowbray M, Pearson S (2009) A client-based privacy manager for cloud computing. In: ICST COMSWARE 2009, p 5. ACM Mowbray M, Pearson S (2009) A client-based privacy manager for cloud computing. In: ICST COMSWARE 2009, p 5. ACM
31.
Zurück zum Zitat Rabin MO (2005) How to exchange secrets with oblivious transfer. IACR Cryptology ePrint Archive p 187 Rabin MO (2005) How to exchange secrets with oblivious transfer. IACR Cryptology ePrint Archive p 187
32.
Zurück zum Zitat Reiter M, Rubin A (1997) Crowds: Anonymity for Web Transactions. In: DIMACS Technical report, pp 97–115 Reiter M, Rubin A (1997) Crowds: Anonymity for Web Transactions. In: DIMACS Technical report, pp 97–115
33.
Zurück zum Zitat Trabelsi S, Neven G, Raggett D (eds) (2011) PrimeLife Public Deliverable D5.3.4 – Report on design and implementation Trabelsi S, Neven G, Raggett D (eds) (2011) PrimeLife Public Deliverable D5.3.4 – Report on design and implementation
34.
Zurück zum Zitat Trivett V, Staff S (2013) What the sharing economy means to the future of travel. Report, New York (Skift, p 7 Trivett V, Staff S (2013) What the sharing economy means to the future of travel. Report, New York (Skift, p 7
35.
Zurück zum Zitat Tumas G, Ricci F (2009) Personalized mobile city transport advisory system. Inform Commun Technol Tourism 2009:173–183 Tumas G, Ricci F (2009) Personalized mobile city transport advisory system. Inform Commun Technol Tourism 2009:173–183
36.
Zurück zum Zitat UK Department for Transport: The pathway to driverless cars. Summary Report and Action Plan (2015) UK Department for Transport: The pathway to driverless cars. Summary Report and Action Plan (2015)
37.
Zurück zum Zitat Velaga N, Beecroft M, Nelson J, Corsar D, Edwards P (2012) Transport poverty meets the digital divide: accessibility and connectivity in rural communities. J Transp Geogr 21:102–112 Velaga N, Beecroft M, Nelson J, Corsar D, Edwards P (2012) Transport poverty meets the digital divide: accessibility and connectivity in rural communities. J Transp Geogr 21:102–112
Metadaten
Titel
Privacy and Social Values in Smart Cities
verfasst von
Leonardo A. Martucci
Simone Fischer-Hübner
Mark Hartswood
Marina Jirotka
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-44924-1_6

Neuer Inhalt