Abstract
Smart cities accumulate and process large amount of data streams which raise security and privacy concerns at individual and community levels. Sizeable attempts have made to ensure security and privacy of inhabitants' data. However, security and privacy issues of smart cities are not confined to inhabitants only, service provider and local government have their own reservations -- service provider trust, reliability of the sensed data, and data ownership, to name a few. In this research work we identified a comprehensive list of stakeholders and model their involvement in smart cities by using Onion Model approach. Based on the stakeholder model we presented a security and privacy framework for secure and privacy-aware service provisioning in smart cities. Our framework aims to provide end-to-end security and privacy features for trustable data acquisition, transmission, processing and legitimate service provisioning. As a proof of concept we tested core functionalities of authentication protocol for data acquisition and service provisioning using Scyther automated verification tool that demonstrated that the proposed framework mitigates security and privacy concerns of different stakeholders identified in the stakeholder model.
Original language | English |
---|---|
Title of host publication | Utility and Cloud Computing (UCC), 2014 IEEE/ACM 7th International Conference on |
Publisher | IEEE |
Pages | 806-811 |
Number of pages | 6 |
ISBN (Print) | 978-1-4799-7881-6 |
DOIs | |
Publication status | Published - 1 Dec 2014 |
Keywords
- cloud computing
- data privacy
- security of data
- smart cities
- Scyther automated verification tool
- authentication protocol
- cloud based smart cities data security
- data ownership
- data privacy management
- data streams
- end-to-end security
- legitimate service provisioning
- local government
- onion model approach
- privacy-aware service provisioning
- secure service provisioning
- sensed data reliability
- service provider trust
- trustable data acquisition
- trustable data processing
- trustable data transmission
- Authentication
- Cities and towns
- Data privacy
- Data security
- Privacy
- Protocols
- data security
- privacy
- stakeholders
- trust