Privacy and Social Values in Smart Cities

  • Leonardo A. MartucciEmail author
  • Simone Fischer-Hübner
  • Mark Hartswood
  • Marina Jirotka


Privacy, a fundamental human right, is a key nonfunctional requirement to every electronic service and applications designed for smart societies. Informational privacy, the right of individuals to control information related to them, in smart societies is at the core of this chapter. A key aspect in the layout of smart societies and smart cities is the understanding and prediction of human behavior, which is nowadays fundamentally based on collecting and processing personal data. Hence, smart societies need to accommodate individuals’ rights and the data collection needs. We provide an overview of the existing models and techniques for protecting individuals’ privacy, such as privacy policies, transparency tools and anonymous communication systems, and discuss the needs and limitations of Privacy by Design (PbD) in the layout of smart societies and Internet of Things.


Privacy smart cities Internet of things Privacy impact assessment Privacy by design Collective adaptive system Legal Social Personal data ata protection 



This research was funded by SMARTSOCIETY, a research project of the Seventh Framework Programme for Research of the European Community under grant agreements no. 600854.


  1. 1.
    Article 29 Data Protection Working Party: Opinion 8/2014 on the on Recent Developments on the Internet of Things (2014).
  2. 2.
    Article 29 Data Protection Working Party: Working document on data protection issues related to RFID technology (2005).
  3. 3.
    Azraoui M, Elkhiyaoui K, Önen M, Bernsmed K, De Oliveira AS, Sendor J (2015) A-PPL: an accountability policy language. In: Data privacy management, autonomous spontaneous security, and security assurance, pp 319–326. SpringerGoogle Scholar
  4. 4.
    Borges F, Martucci LA, (2014) iKUP keeps users’ privacy in the smart grid. In: CNS, (2014) IEEE Computer Society. NY, USA, New YorkGoogle Scholar
  5. 5.
    Camenisch J, Lysyanskaya A, (2002) A signature scheme with efficient protocols. security in communication networks: third international conference (SCN, (2002) Lecture Notes in Computer Science, 2576 (2003)). Springer. Amalfi, Italy, pp 268–289Google Scholar
  6. 6.
    Cavoukian A (2009) Privacy by design. White paper, Information and Privacy Commissioner of OntarioGoogle Scholar
  7. 7.
    Chaum DL (1981) Untraceable electronic mail, return addresses and digital pseudonyms. Commun ACM 24(2):84–88CrossRefGoogle Scholar
  8. 8.
    Chaum DL (1988) The dining cryptographers problem: unconditional sender and recipient untraceability. J Crypt 1(1):65–75MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Chaum DL (1992) Achieving electronic privacy. Sci Am 267(2):96–101CrossRefGoogle Scholar
  10. 10.
    Cheney-Lippold J (2011) A new algorithmic identity soft biopolitics and the modulation of control. Theory, Culture Soc 28(6):164–181CrossRefGoogle Scholar
  11. 11.
    Clarke R (2009) Privacy impact assessment: its origins and development. Comput Law Secur Rev 25(2):123–135CrossRefGoogle Scholar
  12. 12.
  13. 13.
    Dimitrakopoulos G, Demestichas P (2010) Intelligent transportation systems. Vehicular Technology Magazine 5:77–84CrossRefGoogle Scholar
  14. 14.
    Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. USENIX-SS 2004. USENIX Association, Berkeley, CA, USA, pp 303–320Google Scholar
  15. 15.
    Earnst & Young: Routes to prosperity: How can smart transport infrastructure can help cities to thrive.$FILE/EY-routes-to-prosperity-via-smart-transport.pdf (2015)Google Scholar
  16. 16.
    European Commission: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L No.281 (1995)Google Scholar
  17. 17.
    European Commission: Regulation (EU) 2016/679 of the European Council and Parliament of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), Official Journal of the European Union, L 119/1Google Scholar
  18. 18.
    European Union Norm: Privacy and data protection impact assessment framework for RFID applications, Appendix to the Opinion 9/2011 on the revised industry proposal for a privacy and data protection impact assessment framework for RFID applications (2011)Google Scholar
  19. 19.
    Figueiredo L, Jesus I, Machado J, Ferreira J, Carvalho J (2001) Towards the development of intelligent transportation systems. Intell Transp Syst 88:1206–1211Google Scholar
  20. 20.
    Fischer-Hübner S, Martucci LA (2014) Privacy in social collective intelligence systems. In: Social collective intelligence, pp 105–124. SpringerGoogle Scholar
  21. 21.
    Gürses S, Troncoso C, Diaz C (2011) Engineering privacy by design. Computers, Privacy & Data Protection 14:Google Scholar
  22. 22.
    Hartswood M, Jirotka M, Chenu-Abente R, Hume A, Giunchiglia F, Martucci LA, Fischer-Hübner S (2014) Privacy for peer profiling in collective adaptive systems. In: Privacy and identity management for the future internet in the age of globalisation, pp 237–252. SpringerGoogle Scholar
  23. 23.
    Ico uk: Conducting privacy impact assessments code of practice, v. 1.0. Technical report, Information Commissioner’s Office (ico), uk (2014)Google Scholar
  24. 24.
    Iwaya L, Giunchiglia F, Martucci LA, Hume A, Fischer-Hübner S, Chenu-Abente R (2015) Ontology-based obfuscation and anonymisation for privacy—a case study on healthcare. In: Proceedings of the 10th IFIP summer school on privacy and identity management. SpringerGoogle Scholar
  25. 25.
    Jara A, Alcolea A, Zamora M, Skarmeta A, Alsaedy M (2010) Drugs interaction checker based on IoT. In: Internet of things (IOT), pp 1–8. IEEEGoogle Scholar
  26. 26.
    Martucci LA, Andersson C, Fischer-Hübner S (2006) Chameleon and the Identity-anonymity paradox: anonymity in mobile ad hoc networks. In: IWSEC 2006, pp. 123–134. IPSJGoogle Scholar
  27. 27.
    Martucci LA, Kohlweiss M, Andersson C, Panchenko A (2008) Self-certified sybil-free pseudonyms. In: Proceedings of the 1st ACM conference on wireless network security (WiSec’08), pp. 154–159. ACM PressGoogle Scholar
  28. 28.
    Miorandi D, Maltese V, Rovatsos M, Nijholt A, Stewart J (2014) Social collective intelligence. SpringerGoogle Scholar
  29. 29.
    Mowbray M, Pearson S (2009) A client-based privacy manager for cloud computing. In: ICST COMSWARE 2009, p 5. ACMGoogle Scholar
  30. 30.
    Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management v.034.
  31. 31.
    Rabin MO (2005) How to exchange secrets with oblivious transfer. IACR Cryptology ePrint Archive p 187Google Scholar
  32. 32.
    Reiter M, Rubin A (1997) Crowds: Anonymity for Web Transactions. In: DIMACS Technical report, pp 97–115Google Scholar
  33. 33.
    Trabelsi S, Neven G, Raggett D (eds) (2011) PrimeLife Public Deliverable D5.3.4 – Report on design and implementationGoogle Scholar
  34. 34.
    Trivett V, Staff S (2013) What the sharing economy means to the future of travel. Report, New York (Skift, p 7Google Scholar
  35. 35.
    Tumas G, Ricci F (2009) Personalized mobile city transport advisory system. Inform Commun Technol Tourism 2009:173–183Google Scholar
  36. 36.
    UK Department for Transport: The pathway to driverless cars. Summary Report and Action Plan (2015)Google Scholar
  37. 37.
    Velaga N, Beecroft M, Nelson J, Corsar D, Edwards P (2012) Transport poverty meets the digital divide: accessibility and connectivity in rural communities. J Transp Geogr 21:102–112Google Scholar

Copyright information

© Springer International Publishing Switzerland 2017

Authors and Affiliations

  • Leonardo A. Martucci
    • 1
    Email author
  • Simone Fischer-Hübner
    • 1
  • Mark Hartswood
    • 2
  • Marina Jirotka
    • 2
  1. 1.Karlstad UniversityKarlstadSweden
  2. 2.University of OxfordOxfordUK

Personalised recommendations