Abstract
Privacy, a fundamental human right, is a key nonfunctional requirement to every electronic service and applications designed for smart societies. Informational privacy, the right of individuals to control information related to them, in smart societies is at the core of this chapter. A key aspect in the layout of smart societies and smart cities is the understanding and prediction of human behavior, which is nowadays fundamentally based on collecting and processing personal data. Hence, smart societies need to accommodate individuals’ rights and the data collection needs. We provide an overview of the existing models and techniques for protecting individuals’ privacy, such as privacy policies, transparency tools and anonymous communication systems, and discuss the needs and limitations of Privacy by Design (PbD) in the layout of smart societies and Internet of Things.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
The “Uninvited Guests” is short film produced by Superflux and commissioned by Thing Tank. https://vimeo.com/128873380.
- 4.
Z. Tufekci and B. King. “We Can’t Trust Uber”. In: The Opinion Pages, NY Times, Dec. 7, 2014.
- 5.
M. Isaac. “Uber Executives Comments Leave Company Scrambling”. In: Bits, a NY Times Blog, Nov. 18, 2014. http://bits.blogs.nytimes.com/2014/11/18/emil-michael-of-uber-proposes-digging-into-journalists-private-lives/.
- 6.
The EU GDPR was passed by the European Parliament in Dec. 2015, entered into force on 24 May 2016 and shall apply in all EU member sates from 25 May 2018. The GDPR was chosen as our reference for many reasons: (a) it applies to data controllers or processors located in the EU, and to any organization processing personal data of EU residents, (b) it reflects the basic privacy principles of the OECD privacy guidelines and (c) of the US Federal Trade Commission’s (FTC) Fair Information Practice Principles (even going beyond them).
- 7.
B. Ray. “Securing the Internet of Things–or how light bulbs can spy on you”. Apr. 22, 2013. The Register. http://www.theregister.co.uk/2013/04/22/iot_security/.
- 8.
D. Pauli. “Connected kettles boil over, spill Wi-Fi passwords over London”. Oct. 19, 2015. The Register. http://www.theregister.co.uk/2015/10/19/bods_brew_ikettle_20_hack_plot_vulnerable_london_pots/.
- 9.
I. Thomson. “Goodbye, Hello Barbie: Wireless toy dogged by POODLE SSL hole”. Dec. 4, 2015. The Register. http://www.theregister.co.uk/2015/12/04/wireless_barbie_slipshod_security/.
- 10.
The RFID capabilities and the scope of its applications are narrow enough to produce a PIA with a (non-exhaustive) set of 15 potential threats and five groups of countermeasures.
- 11.
The definition of the terms anonymity, unlinkability, pseudonymity, unobservability in this chapter follows the Pfitzmann and Hansen terminology [30].
References
Article 29 Data Protection Working Party: Opinion 8/2014 on the on Recent Developments on the Internet of Things (2014). http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf
Article 29 Data Protection Working Party: Working document on data protection issues related to RFID technology (2005). http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2005/wp105_en.pdf
Azraoui M, Elkhiyaoui K, Önen M, Bernsmed K, De Oliveira AS, Sendor J (2015) A-PPL: an accountability policy language. In: Data privacy management, autonomous spontaneous security, and security assurance, pp 319–326. Springer
Borges F, Martucci LA, (2014) iKUP keeps users’ privacy in the smart grid. In: CNS, (2014) IEEE Computer Society. NY, USA, New York
Camenisch J, Lysyanskaya A, (2002) A signature scheme with efficient protocols. security in communication networks: third international conference (SCN, (2002) Lecture Notes in Computer Science, 2576 (2003)). Springer. Amalfi, Italy, pp 268–289
Cavoukian A (2009) Privacy by design. White paper, Information and Privacy Commissioner of Ontario
Chaum DL (1981) Untraceable electronic mail, return addresses and digital pseudonyms. Commun ACM 24(2):84–88
Chaum DL (1988) The dining cryptographers problem: unconditional sender and recipient untraceability. J Crypt 1(1):65–75
Chaum DL (1992) Achieving electronic privacy. Sci Am 267(2):96–101
Cheney-Lippold J (2011) A new algorithmic identity soft biopolitics and the modulation of control. Theory, Culture Soc 28(6):164–181
Clarke R (2009) Privacy impact assessment: its origins and development. Comput Law Secur Rev 25(2):123–135
Deloitte: Disruptive trends for smart mobility. http://www2.deloitte.com/uk/en/pages/business-and-professional-services/articles/transport-in-the-digital-age.html (2015)
Dimitrakopoulos G, Demestichas P (2010) Intelligent transportation systems. Vehicular Technology Magazine 5:77–84
Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. USENIX-SS 2004. USENIX Association, Berkeley, CA, USA, pp 303–320
Earnst & Young: Routes to prosperity: How can smart transport infrastructure can help cities to thrive. http://www.ey.com/Publication/vwLUAssets/EY-routes-to-prosperity-via-smart-transport/$FILE/EY-routes-to-prosperity-via-smart-transport.pdf (2015)
European Commission: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L No.281 (1995)
European Commission: Regulation (EU) 2016/679 of the European Council and Parliament of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), Official Journal of the European Union, L 119/1
European Union Norm: Privacy and data protection impact assessment framework for RFID applications, Appendix to the Opinion 9/2011 on the revised industry proposal for a privacy and data protection impact assessment framework for RFID applications (2011)
Figueiredo L, Jesus I, Machado J, Ferreira J, Carvalho J (2001) Towards the development of intelligent transportation systems. Intell Transp Syst 88:1206–1211
Fischer-Hübner S, Martucci LA (2014) Privacy in social collective intelligence systems. In: Social collective intelligence, pp 105–124. Springer
Gürses S, Troncoso C, Diaz C (2011) Engineering privacy by design. Computers, Privacy & Data Protection 14:
Hartswood M, Jirotka M, Chenu-Abente R, Hume A, Giunchiglia F, Martucci LA, Fischer-Hübner S (2014) Privacy for peer profiling in collective adaptive systems. In: Privacy and identity management for the future internet in the age of globalisation, pp 237–252. Springer
Ico uk: Conducting privacy impact assessments code of practice, v. 1.0. Technical report, Information Commissioner’s Office (ico), uk (2014)
Iwaya L, Giunchiglia F, Martucci LA, Hume A, Fischer-Hübner S, Chenu-Abente R (2015) Ontology-based obfuscation and anonymisation for privacy—a case study on healthcare. In: Proceedings of the 10th IFIP summer school on privacy and identity management. Springer
Jara A, Alcolea A, Zamora M, Skarmeta A, Alsaedy M (2010) Drugs interaction checker based on IoT. In: Internet of things (IOT), pp 1–8. IEEE
Martucci LA, Andersson C, Fischer-Hübner S (2006) Chameleon and the Identity-anonymity paradox: anonymity in mobile ad hoc networks. In: IWSEC 2006, pp. 123–134. IPSJ
Martucci LA, Kohlweiss M, Andersson C, Panchenko A (2008) Self-certified sybil-free pseudonyms. In: Proceedings of the 1st ACM conference on wireless network security (WiSec’08), pp. 154–159. ACM Press
Miorandi D, Maltese V, Rovatsos M, Nijholt A, Stewart J (2014) Social collective intelligence. Springer
Mowbray M, Pearson S (2009) A client-based privacy manager for cloud computing. In: ICST COMSWARE 2009, p 5. ACM
Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management v.034. http://dud.inf.tu-dresden.de/literatur/
Rabin MO (2005) How to exchange secrets with oblivious transfer. IACR Cryptology ePrint Archive p 187
Reiter M, Rubin A (1997) Crowds: Anonymity for Web Transactions. In: DIMACS Technical report, pp 97–115
Trabelsi S, Neven G, Raggett D (eds) (2011) PrimeLife Public Deliverable D5.3.4 – Report on design and implementation
Trivett V, Staff S (2013) What the sharing economy means to the future of travel. Report, New York (Skift, p 7
Tumas G, Ricci F (2009) Personalized mobile city transport advisory system. Inform Commun Technol Tourism 2009:173–183
UK Department for Transport: The pathway to driverless cars. Summary Report and Action Plan (2015)
Velaga N, Beecroft M, Nelson J, Corsar D, Edwards P (2012) Transport poverty meets the digital divide: accessibility and connectivity in rural communities. J Transp Geogr 21:102–112
Acknowledgements
This research was funded by SMARTSOCIETY, a research project of the Seventh Framework Programme for Research of the European Community under grant agreements no. 600854.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Martucci, L.A., Fischer-Hübner, S., Hartswood, M., Jirotka, M. (2017). Privacy and Social Values in Smart Cities. In: Angelakis, V., Tragos, E., Pöhls, H., Kapovits, A., Bassi, A. (eds) Designing, Developing, and Facilitating Smart Cities. Springer, Cham. https://doi.org/10.1007/978-3-319-44924-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-44924-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44922-7
Online ISBN: 978-3-319-44924-1
eBook Packages: EngineeringEngineering (R0)