Privacy and Security in Smart Data Collection by Citizens
- 1.4k Downloads
The question of how to make a city or government better by exploiting information and communication infrastructures, referred to as smart city, entails an emerging field of research. Large quantities of data are generated from these infrastructures and infusing these data into the physical infrastructure of a city or government may lead to better services to citizens. Collecting and processing of such data, however, may result in privacy and security issues that should be faced appropriately to create a sustainable approach for smart cities and governments. In this chapter, we focus on data collection through crowdsourcing with smart devices and identify the corresponding security and privacy issues in the context of enabling smart cities and governments. We categorize these issues in four classes. For each class, we identify a number of threats as well as solution directions for these threats.
KeywordsCrowdsourcing Privacy Security (Un)authorized access (Un)authorized use Smart devices
- Bargh, M. S., & Choenni, S. (2013). On preserving privacy whilst integrating data in connected information systems. In Proceedings of the International Conference on Cloud Security Management (ICCSM’13), Seattle, US, 17–18 October.Google Scholar
- Braak, S. W. van den, Choenni, S., Meijer, R., & Zuiderwijk, A. (2012). Trusted third parties for secure and privacy preserving data integration and sharing in the public sector. In Proceedings of the l3th Annual International Conference on Digital Government Research, New York, NY, USA, 2012, pp. 135–144.Google Scholar
- Cameron, K. (2005). The laws of identity. http://www.identityblog.com/?p=352/#lawsofiden_topic3. Accessed 1 Feb 2014.
- Centric. (2014). http://www.centric.nl/NL/Default/Branches/Lokale-overheid/Burgerschouw. Accessed 11 June 2015.
- Chadwick, D. W. (2009). Federated identity management. In: Foundations of security analysis and design V; lecture notes in computer science (Vol. 5705), 2009, pp. 96–120.Google Scholar
- Chin, E., Porter Felt, A., Greenwood, K., & Wagner, D. (2011). Analyzing inter-application communication in Android. In Proceedings of MobiSys. ACM, 2011.Google Scholar
- Choenni, S., & Leertouwer, E. (2010). Public safety mashups to support policy makers. In Proceedings of EGOVIS 2010, Electronic Government and the Information Systems Perspective, Bilbao, Spain, August 31–September 2, 2010. LNCS 6267, pp. 234–248.Google Scholar
- Choenni, S., van Dijk, J., & Leeuw, F., (2010). Preserving privacy whilst integrating data: Applied to criminal justice. Information Polity, 15(1–2), 125–138.Google Scholar
- Dawes, S. S. (2010b). Information policy meta-principles: Stewardship and usefulness. In 2010 43rd Hawaii International Conference on System Sciences (pp. 1–10). IEEE.Google Scholar
- DPPA. (2014). Dutch data protection authority—College Bescherming Persoonsgegevens (2014), Dutch Privacy Protection Act (DPPA)—Wbp-naslag; Found on https://cbpweb.nl/nl/over-privacy/wetten/wbp-naslag. Accessed 11 June 2015.
- EU. (1995). Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.Google Scholar
- Ganesan, D., & Corner, M. (2011). Crowd sourcing for data collection. http://sensorlab.cs.dartmouth.edu/NSFPervasiveComputingAtScale/pdf/1569392897.pdf. Accessed 26 Feb 2014.
- Kalidien, S., Choenni, S., & Meijer, R. (2010). Crime statistics online: Potentials and challenges. Proceedings of the 11th Annual International Conference on Digital Government Research, New York, NY, USA, 2010, pp. 131–137.Google Scholar
- Kosinski, M., Stillwell D., & Graepel, T. (2013). Private traits and attributes are predictable from digital records of human behavior. Proceedings of the National Academy of Sciences of the United States of America, 110(15) Michal Kosinski, 5802–5805. doi:10.1073/pnas.1218772110.Google Scholar
- Kulk, S., & van Loenen, B. (2012). Brave new open data world? International Journal of Spatial Data Infrastructures, 7, 196–206.Google Scholar
- Meijer, R., Choenni, S., Sheikh, A. R., & Conradie, P. (2013). Bridging the contradictions of open data. Proceedings of the 13th European Conference on eGovernment. Como, Italy.Google Scholar
- Montjoye de, Y-Al., Hidalgo, C. A., Verleysen, M., & Blondel, V. D. (2013). Unique in the crowd: The privacy bounds of human mobility. Scientific Reports, 3(1376). doi:10.1038/srep01376.Google Scholar
- OECD. (2013). The OECD privacy framework. http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf. Accessed 21 Feb 2014.
- Stembert, N., Conradie, P., Mulder, I., & Choenni, S. (2013). Participatory data gathering for public sector reuse: Lessons learned from traditional initiatives. Electronic government (pp. 87–98). Berlin Heidelberg: Springer.Google Scholar
- Taylor, J. (2010). Citizens as public sensors. http://radar.oreilly.com/2010/04/crowdsourcingthe-dpw.html. Accessed 26 Feb 2014.
- Tsai, J. Y., Kelley, P., Drielsma, P., Cranor, L. F., Hong, J., & Sadeh, N. (2009). Who’s viewed you? The impact of feedback in a mobile location-sharing application. Computer Human Interaction (CHI’09) ACM Press.Google Scholar
- VDSS Vita Data Security Systems. (2014). http://www.vdss.nl/vdss-in-your-network.ashx. Accessed 21 Feb 2014.
- Wang, Y., Huang, Y., & Louis, C. (September 2013). Towards a framework for privacy-aware mobile crowdsourcing. In Social Computing (SocialCom), 2013 International Conference on Social Computing (pp. 454–459). IEEE Press.Google Scholar
- Zoldan, A. (5 October 2013). More data, more problems: Is big data always right?. http://www.wired.com/insights/2013/05/more-data-more-problems-is-big-data-always-right/. Accessed 11 June 2015.
- Zuiderwijk, A., Janssen, M., Meijer, R., Choenni, R., Charalabidis, Y., & Jeffery, K. (2012). Issues and guiding principles for opening governmental judicial research data. Proceedings of the 11th European Conference On Electronic Government, EGOV’12, LNCS Vol. 7443. Springer verlag, Kristiansand, Norway, September 3–6 (90–101).Google Scholar