Advertisement

A Framework for Privacy Protection and Usage Control of Personal Data in a Smart City Scenario

  • Gianmarco Baldini
  • Ioannis Kounelis
  • Igor Nai Fovino
  • Ricardo Neisse
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8328)

Abstract

In this paper we address trust and privacy protection issues related to identity and personal data provided by citizens in a smart city environment. Our proposed solution combines identity management, trust negotiation, and usage control. We demonstrate our solution in a case study of a smart city during a crisis situation.

Keywords

Identity management privacy protection usage control smart cities trust negotiation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Yang, L., Yang, S., Plotnick, L.: How the internet of things technology enhances emergency response operations. Technological Forecasting and Social Change (2012)Google Scholar
  2. 2.
    Du, C., Zhu, S.: Research on urban public safety emergency management early warning system based on technologies for the internet of things. Procedia Engineering 45, 748–754 (2012); 2012 International Symposium on Safety Science and TechnologyGoogle Scholar
  3. 3.
    Vescoukis, V., Doulamis, N., Karagiorgou, S.: A service oriented architecture for decision support systems in environmental crisis management. Future Generation Computer Systems 28(3), 593–604 (2012)CrossRefGoogle Scholar
  4. 4.
    Smari, W.W., Clemente, P., Lalande, J.F.: An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system. Future Generation Computer Systems (2013)Google Scholar
  5. 5.
    Braghin, S., Fovino, I., Trombetta, A.: Advanced trust negotiation in critical infrastructures. In: 2008 First International Conference on Infrastructure Systems and Services: Building Networks for a Brighter Future (INFRA), pp. 1–6 (2008)Google Scholar
  6. 6.
    Neisse, R., Pretschner, A., Giacomo, V.D.: A trustworthy usage control enforcement framework. In: Proceedings 6th International Conference on Availability, Reliability and Security, ARES (2011)Google Scholar
  7. 7.
    Rissanen, E.: Extensible access control markup language v3.0 (2010), http://docs.oasis-open.org
  8. 8.
    Dijkman, R.: Consistency in multi-viewpoint architectural design. PhD Thesis University of Twente (2006), https://doc.novay.nl

Copyright information

© Springer International Publishing Switzerland 2013

Authors and Affiliations

  • Gianmarco Baldini
    • 1
  • Ioannis Kounelis
    • 1
  • Igor Nai Fovino
    • 1
  • Ricardo Neisse
    • 1
  1. 1.Joint Research Center (JRC), Institute for the Protection and Security of the Citizen (IPSC)IspraItaly

Personalised recommendations