Skip to main content

Privacy and Social Values in Smart Cities

  • Chapter
  • First Online:
Designing, Developing, and Facilitating Smart Cities

Abstract

Privacy, a fundamental human right, is a key nonfunctional requirement to every electronic service and applications designed for smart societies. Informational privacy, the right of individuals to control information related to them, in smart societies is at the core of this chapter. A key aspect in the layout of smart societies and smart cities is the understanding and prediction of human behavior, which is nowadays fundamentally based on collecting and processing personal data. Hence, smart societies need to accommodate individuals’ rights and the data collection needs. We provide an overview of the existing models and techniques for protecting individuals’ privacy, such as privacy policies, transparency tools and anonymous communication systems, and discuss the needs and limitations of Privacy by Design (PbD) in the layout of smart societies and Internet of Things.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://smart-society-project.eu.

  2. 2.

    https://www.ingenie.com/how-it-works.

  3. 3.

    The “Uninvited Guests” is short film produced by Superflux and commissioned by Thing Tank. https://vimeo.com/128873380.

  4. 4.

    Z. Tufekci and B. King. “We Can’t Trust Uber”. In: The Opinion Pages, NY Times, Dec. 7, 2014.

    www.nytimes.com/2014/12/08/opinion/we-cant-trust-uber.html.

  5. 5.

    M. Isaac. “Uber Executives Comments Leave Company Scrambling”. In: Bits, a NY Times Blog, Nov. 18, 2014. http://bits.blogs.nytimes.com/2014/11/18/emil-michael-of-uber-proposes-digging-into-journalists-private-lives/.

  6. 6.

    The EU GDPR was passed by the European Parliament in Dec. 2015, entered into force on 24 May 2016 and shall apply in all EU member sates from 25 May 2018. The GDPR was chosen as our reference for many reasons: (a) it applies to data controllers or processors located in the EU, and to any organization processing personal data of EU residents, (b) it reflects the basic privacy principles of the OECD privacy guidelines and (c) of the US Federal Trade Commission’s (FTC) Fair Information Practice Principles (even going beyond them).

  7. 7.

    B. Ray. “Securing the Internet of Things–or how light bulbs can spy on you”. Apr. 22, 2013. The Register. http://www.theregister.co.uk/2013/04/22/iot_security/.

  8. 8.

    D. Pauli. “Connected kettles boil over, spill Wi-Fi passwords over London”. Oct. 19, 2015. The Register. http://www.theregister.co.uk/2015/10/19/bods_brew_ikettle_20_hack_plot_vulnerable_london_pots/.

  9. 9.

    I. Thomson. “Goodbye, Hello Barbie: Wireless toy dogged by POODLE SSL hole”. Dec. 4, 2015. The Register. http://www.theregister.co.uk/2015/12/04/wireless_barbie_slipshod_security/.

  10. 10.

    The RFID capabilities and the scope of its applications are narrow enough to produce a PIA with a (non-exhaustive) set of 15 potential threats and five groups of countermeasures.

  11. 11.

    The definition of the terms anonymity, unlinkability, pseudonymity, unobservability in this chapter follows the Pfitzmann and Hansen terminology [30].

References

  1. Article 29 Data Protection Working Party: Opinion 8/2014 on the on Recent Developments on the Internet of Things (2014). http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf

  2. Article 29 Data Protection Working Party: Working document on data protection issues related to RFID technology (2005). http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2005/wp105_en.pdf

  3. Azraoui M, Elkhiyaoui K, Önen M, Bernsmed K, De Oliveira AS, Sendor J (2015) A-PPL: an accountability policy language. In: Data privacy management, autonomous spontaneous security, and security assurance, pp 319–326. Springer

    Google Scholar 

  4. Borges F, Martucci LA, (2014) iKUP keeps users’ privacy in the smart grid. In: CNS, (2014) IEEE Computer Society. NY, USA, New York

    Google Scholar 

  5. Camenisch J, Lysyanskaya A, (2002) A signature scheme with efficient protocols. security in communication networks: third international conference (SCN, (2002) Lecture Notes in Computer Science, 2576 (2003)). Springer. Amalfi, Italy, pp 268–289

    Google Scholar 

  6. Cavoukian A (2009) Privacy by design. White paper, Information and Privacy Commissioner of Ontario

    Google Scholar 

  7. Chaum DL (1981) Untraceable electronic mail, return addresses and digital pseudonyms. Commun ACM 24(2):84–88

    Article  Google Scholar 

  8. Chaum DL (1988) The dining cryptographers problem: unconditional sender and recipient untraceability. J Crypt 1(1):65–75

    Article  MathSciNet  MATH  Google Scholar 

  9. Chaum DL (1992) Achieving electronic privacy. Sci Am 267(2):96–101

    Article  Google Scholar 

  10. Cheney-Lippold J (2011) A new algorithmic identity soft biopolitics and the modulation of control. Theory, Culture Soc 28(6):164–181

    Article  Google Scholar 

  11. Clarke R (2009) Privacy impact assessment: its origins and development. Comput Law Secur Rev 25(2):123–135

    Article  Google Scholar 

  12. Deloitte: Disruptive trends for smart mobility. http://www2.deloitte.com/uk/en/pages/business-and-professional-services/articles/transport-in-the-digital-age.html (2015)

  13. Dimitrakopoulos G, Demestichas P (2010) Intelligent transportation systems. Vehicular Technology Magazine 5:77–84

    Article  Google Scholar 

  14. Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. USENIX-SS 2004. USENIX Association, Berkeley, CA, USA, pp 303–320

    Google Scholar 

  15. Earnst & Young: Routes to prosperity: How can smart transport infrastructure can help cities to thrive. http://www.ey.com/Publication/vwLUAssets/EY-routes-to-prosperity-via-smart-transport/$FILE/EY-routes-to-prosperity-via-smart-transport.pdf (2015)

    Google Scholar 

  16. European Commission: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L No.281 (1995)

    Google Scholar 

  17. European Commission: Regulation (EU) 2016/679 of the European Council and Parliament of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), Official Journal of the European Union, L 119/1

    Google Scholar 

  18. European Union Norm: Privacy and data protection impact assessment framework for RFID applications, Appendix to the Opinion 9/2011 on the revised industry proposal for a privacy and data protection impact assessment framework for RFID applications (2011)

    Google Scholar 

  19. Figueiredo L, Jesus I, Machado J, Ferreira J, Carvalho J (2001) Towards the development of intelligent transportation systems. Intell Transp Syst 88:1206–1211

    Google Scholar 

  20. Fischer-Hübner S, Martucci LA (2014) Privacy in social collective intelligence systems. In: Social collective intelligence, pp 105–124. Springer

    Google Scholar 

  21. Gürses S, Troncoso C, Diaz C (2011) Engineering privacy by design. Computers, Privacy & Data Protection 14:

    Google Scholar 

  22. Hartswood M, Jirotka M, Chenu-Abente R, Hume A, Giunchiglia F, Martucci LA, Fischer-Hübner S (2014) Privacy for peer profiling in collective adaptive systems. In: Privacy and identity management for the future internet in the age of globalisation, pp 237–252. Springer

    Google Scholar 

  23. Ico uk: Conducting privacy impact assessments code of practice, v. 1.0. Technical report, Information Commissioner’s Office (ico), uk (2014)

    Google Scholar 

  24. Iwaya L, Giunchiglia F, Martucci LA, Hume A, Fischer-Hübner S, Chenu-Abente R (2015) Ontology-based obfuscation and anonymisation for privacy—a case study on healthcare. In: Proceedings of the 10th IFIP summer school on privacy and identity management. Springer

    Google Scholar 

  25. Jara A, Alcolea A, Zamora M, Skarmeta A, Alsaedy M (2010) Drugs interaction checker based on IoT. In: Internet of things (IOT), pp 1–8. IEEE

    Google Scholar 

  26. Martucci LA, Andersson C, Fischer-Hübner S (2006) Chameleon and the Identity-anonymity paradox: anonymity in mobile ad hoc networks. In: IWSEC 2006, pp. 123–134. IPSJ

    Google Scholar 

  27. Martucci LA, Kohlweiss M, Andersson C, Panchenko A (2008) Self-certified sybil-free pseudonyms. In: Proceedings of the 1st ACM conference on wireless network security (WiSec’08), pp. 154–159. ACM Press

    Google Scholar 

  28. Miorandi D, Maltese V, Rovatsos M, Nijholt A, Stewart J (2014) Social collective intelligence. Springer

    Google Scholar 

  29. Mowbray M, Pearson S (2009) A client-based privacy manager for cloud computing. In: ICST COMSWARE 2009, p 5. ACM

    Google Scholar 

  30. Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management v.034. http://dud.inf.tu-dresden.de/literatur/

  31. Rabin MO (2005) How to exchange secrets with oblivious transfer. IACR Cryptology ePrint Archive p 187

    Google Scholar 

  32. Reiter M, Rubin A (1997) Crowds: Anonymity for Web Transactions. In: DIMACS Technical report, pp 97–115

    Google Scholar 

  33. Trabelsi S, Neven G, Raggett D (eds) (2011) PrimeLife Public Deliverable D5.3.4 – Report on design and implementation

    Google Scholar 

  34. Trivett V, Staff S (2013) What the sharing economy means to the future of travel. Report, New York (Skift, p 7

    Google Scholar 

  35. Tumas G, Ricci F (2009) Personalized mobile city transport advisory system. Inform Commun Technol Tourism 2009:173–183

    Google Scholar 

  36. UK Department for Transport: The pathway to driverless cars. Summary Report and Action Plan (2015)

    Google Scholar 

  37. Velaga N, Beecroft M, Nelson J, Corsar D, Edwards P (2012) Transport poverty meets the digital divide: accessibility and connectivity in rural communities. J Transp Geogr 21:102–112

    Google Scholar 

Download references

Acknowledgements

This research was funded by SMARTSOCIETY, a research project of the Seventh Framework Programme for Research of the European Community under grant agreements no. 600854.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leonardo A. Martucci .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Martucci, L.A., Fischer-Hübner, S., Hartswood, M., Jirotka, M. (2017). Privacy and Social Values in Smart Cities. In: Angelakis, V., Tragos, E., Pöhls, H., Kapovits, A., Bassi, A. (eds) Designing, Developing, and Facilitating Smart Cities. Springer, Cham. https://doi.org/10.1007/978-3-319-44924-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44924-1_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44922-7

  • Online ISBN: 978-3-319-44924-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics