SlideShare a Scribd company logo
1 of 63
© Waher Data AB, 2018.
Smart City Lecture 2
Privacy in the Smart City
© Waher Data AB, 2018.
1. Recapture
© Waher Data AB, 2018.
Smart City / Society
 Automation
 Open Data
 Transport
 Traffic (C-ITS)
 Parking
 Utilities
 Health Care
 Law enforcement
 Schools
 Libraries
 Waste management
 Citizens?
 …
Smart for whom?
© Waher Data AB, 2018.
What can be
© Waher Data AB, 2018.
Chinese Social Credit System
(World’s most?) ambitious “Smart City”
project.
Calculates economic and social
reputation, based on mass surveillance
and AI:
 Honesty
 Commercial Integrity
 Social Integrity
 Judicial Credibility
© Waher Data AB, 2018.
Chinese Social Credit System
Collects data from:
 Online activity
 Searches
 Shopping behavior
 Locations
 Friends
 Health
 Bank accounts
 Messages
 Smart Home appliances
 News sources
 Dating
 …
© Waher Data AB, 2018.
Chinese Social Credit System
Affects:
 Job positions
 Salaries
 Living
 Travel restrictions
 Visa restrictions
 Access to schools
 Social status
 Loans
 Internet bandwidth
 …
© Waher Data AB, 2018.
Universal Declaration of Human Rights
Article 12:
No one shall be subjected to arbitrary
interference with his privacy, family,
home or correspondence, nor to attacks
upon his honour and reputation. Everyone
has the right to the protection of the
law against such interference or
attacks.
https://www.un.org/en/universal-declaration-human-rights/
Well… it all depends on how you choose to interpret
“arbitrary” and “attack”…
© Waher Data AB, 2018.
Vision of a Smart City
 Ubiquitous access to interoperable
sensors and things.
 Ubiquitous access to data and
information from society’s authorities.
 Access to smart services in all niches of
society.
 Definition of ownership of information.
 Protection of Privacy, by design and by
default.
 Market for access to things and data.
Is this Science Fiction?
© Waher Data AB, 2018.
2. Privacy
© Waher Data AB, 2018.
What is privacy?
A fundamental human right:
 The right to have confidential conversations.
 The ability to select with whom we communicate.
 Protection against unwarranted monitoring or
searches.
© Waher Data AB, 2018.
Does privacy extend to Social Networks?
Who can access your information?
Do you want uninvited to know:
 What you think?
 What you like?
 Who you know?
 What you’ve done?
 Spy on you?
Or be able to:
 Steal your ideas?
 Utilize your confidential information?
© Waher Data AB, 2018.
Does privacy extend to the IoT?
Who can communicate with devices around you,
and about what?
Do you want uninvited to know:
 When you’re home?
 If you’re in the shower?
 What places you visit?
 Your health status?
Or be able to:
 Control your vehicle?
 Turn off your pacemaker?
Ex-Director of National Intelligence
James R. Clapper
http://www.popsci.com/clapper-americas-greatest-threat-is-internet-things
”America's greatest
threat is the
Internet of Things”
Feb 9, 2016
© Waher Data AB, 2018.
3. GDPR
General Data Protection Regulation
Can it help?
© Waher Data AB, 2018.
Goals
 EU Regulation
 Automatic law in each Member State.
 Came into full effect May 2018.
 Harmonizes privacy regulations
across the EU.
 Balances
 Privacy of individuals.
 Interests of corporations.
 Legal requirements.
 Facilitate the free flow of information.
© Waher Data AB, 2018.
Limits
 GDPR balances
 Privacy of individuals.
 Interests of corporations.
 Legal requirements.
 Maximum required effort
 Proportionality to the rights of all
participants.
 Minimum required effort
 State of the art
 Lack of knowledge not acceptable
 Severe sanctions
© Waher Data AB, 2018.
Personal Data
Any information relating
directly, or indirectly, to an
identified or identifiable
natural person.
“Personality is contagious”
© Waher Data AB, 2018.
Processing
Any operation or set of operations
which is performed on personal data
or on sets of personal data.
“Automatic” is not mentioned. Manual processes are included.
© Waher Data AB, 2018.
Anonymization
Data subjects are no longer
identifiable.
Examples: Data obfuscation, statistical aggregation, etc.
GDPR
© Waher Data AB, 2018.
Pseudonymization
Data subjects can be identified with
the use of separate data
Examples: Pseudonyms, ordinal numbers, hashes.
GDPR
© Waher Data AB, 2018.
What is allowed?
 As little as possible
 For as short a time as possible
 Share with as few as possible
 For as few purposes as possible
 As correctly as possible
 If there are no other means
 After providing transparent
information
Minimalistic definition: Minimalism
Always with proportional data protection mechanisms.
© Waher Data AB, 2018.
Data Protection
Data must be protected*:
 By design
 By default
 State of the art
cf. Black lists vs. White lists
(*) Proportional to the risks of the data subjects, in the
absence of measures taken to mitigate the risks.
© Waher Data AB, 2018.
Transparent Information
 Easily accessible
 Easily understood
 Clear and plain language
 Explicit
 Purposes of processing
 Risks to the subject
 Safeguards
 Rights of the subjects
Transparency is measured on what is understood, not what is semantically stated.
© Waher Data AB, 2018.
Lawfulness
 Consent
 Legal obligation
 Legitimate interest
 Based on contract
 Vital interest
 Public interest
Research & Development has to be argued is a Legitimate Interest.
© Waher Data AB, 2018.
Individual Rights
 Transparent Information
 Access to ones personal data
 Export personal data provided by oneself
 Correct erroneous data
 Erase data*
 Object to processing*
 Restrict processing*
 Withdrawal of consent (if based on consent)
 Avoid being subject to automatic decisions
(with negative legal consequences) based
on automatic profiling.
(*) in certain cases
© Waher Data AB, 2018.
Propagation of Rights
When sharing information:
 Inform data subjects.
 Delegate responsibilities.
 Forward requests from data subjects.
 Includes links, copies and reproductions.
© Waher Data AB, 2018.
Sanctions
 Authorities are granted access to all
 Information
 Machines
 Data
 Warnings
 Reprimands
 Restrictions
 Shut down processes
 Fines (up to 4% of global annual turnover)
 Damages (even indirect, unless you prove you’re
not responsible)
GDPR
© Waher Data AB, 2018.
Paradigm Shift
Previous paradigm:
The more you collect, the more potential value you have.
This is no longer true.
New paradigm:
The more you collect, the greater the risk, and the greater
the responsibility.
You should only collect that to which you can assign value.
© Waher Data AB, 2018.
4. Ownership
© Waher Data AB, 2018.
Who owns the data?
Who is the owner of data?
 The person/entity generating (inventing) the data?
 The person/entity storing (controlling) the data?
 The person about whom the data relates to?
Is it important?
© Waher Data AB, 2018.
Legislation
Which law is applicable?
 Copyright?
 Trade secrets?
 Intellectual Property?
 Privacy?
Enforcing ownership through legal means
is difficult.
© Waher Data AB, 2018.
Ownership of things
How is normal ownership enforced?
 Protection behind lock & key.
 Access only to trusted parties.
 Monitoring.
 Demonstration of ownership.
© Waher Data AB, 2018.
Ownership of data
Why treat data differently?
Local storage (decentralization) allows:
 Protection behind lock & key.
 Limiting access to trusted parties.
 Monitoring access.
 Demonstrating ownership.
 Enforcing ownership of data.
Added benefit:
 Intrinsic value of data through access.
© Waher Data AB, 2018.
Edge Computing
Processing “on the Edge” instead of
“in the Cloud” allows:
 Access = Value
 Scalability
 Resilience
 Security
And it helps protect privacy…
© Waher Data AB, 2018.
5. Needless problems
© Waher Data AB, 2018.
Making privacy more problematic
Technologies making protecting
privacy more difficult:
 Centralized processing
 HTTP(S)
 CoAP, LWM2M
 MQTT
 Blockchain
You have to develop data protection mechanisms just to
counter-act the side effects of using such technologies.
© Waher Data AB, 2018.
Centralized processing
 Less attack surfaces
 Value of central nodes is huge
 Value/Effort ratio large
 Difficult to protect
External use
Internal use
 Consequences huge
Massive leaks
© Waher Data AB, 2018.
HTTP
 Good for
 Publishing documents
 Providing public services
 Bad at
 Authentication
 Authorization
 Distribution
 Asynchronous processing
 Topology problem promotes
 Centralized processing
 … or “hole punching”
© Waher Data AB, 2018.
CoAP & LWM2M
Tries to solve aspects of HTTP for IoT
 Still has topology problem
 Assumes middleware for Internet use
 LWM2M is standardized middleware
 Some interoperability
 IPSO Smart Objects
 Only for data collection
 Difficult to interoperate between things
© Waher Data AB, 2018.
Publish/Subscribe in MQTT
© Waher Data AB, 2018.
Privacy issues by design in MQTT
 No forwarded identities
 Authorization becomes impossible by things
 Makes injection a great threat
 Control signals
 False data
 Bandwidth depletion
 Lack of privacy
 No negotiation of who can subscribe
 Access control out-of-band (proprietary)
 Wildcards
 Makes it easy to eavesdrop
 Relies on careful operation of broker
 Overview of topic tree difficult
 Who operates the broker across domains?
 Interoperability a problem.
… and many more security-related issues exist.
© Waher Data AB, 2018.
Warnings
 Governments warn against bad
MQTT implementations.
 MQTT is notoriously difficult to use
securely.
 Use it only in internal secured networks.
https://cert.se/2016/09/mqtt-i-sverige
© Waher Data AB, 2018.
Blockchain
 Blocks cannot
 be deleted
 on request
 after a given time
 … or ever
 be corrected
 Access is given to all or nothing
 Public access has to be assumed
 Hashes of personal information is still personal
 Cryptographic Algorithms fixed
 Lends itself to future frauds
Blockchain is not suitable for personal information at all.
© Waher Data AB, 2018.
6. Neutral
© Waher Data AB, 2018.
Security ≠ Privacy
Technologies that do not help, or work
against the protection of privacy:
 TLS
 DTLS
 X.509
 VPN
 …
Using such technologies doesn’t solve any privacy issues.
But at least they don’t add new issues by themselves.
© Waher Data AB, 2018.
7. Ambivalence
© Waher Data AB, 2018.
Identities
Technologies that either help or make it
more difficult to protect privacy:
 Anonymity
 Strong identities
Pseudonyms
Using such technologies have strong privacy-related
implications. Which-way is determined by how they are used.
© Waher Data AB, 2018.
Anonymity
 Protects
Whistle blower
Dissident
(Criminal)
(Terrorist)
 Security decisions difficult
 Facilitates leaking personal data
How do you protect sensitive information, if you don’t know
who’s on the other end?
© Waher Data AB, 2018.
Strong Identities
 Protects information owners
 Allows selective responses
 Can be used to track
individuals
Logging for security purposes is legitimate. How can you
make sure logging is only used for security purposes?
(One answer: Use of standardized, open software that are
agnostic to the purposes of processing, such as brokers and
End-to-End encryption of payloads.)
© Waher Data AB, 2018.
8. Solutions
© Waher Data AB, 2018.
Solving Privacy-related problems
Examples of technologies that help
protect privacy:
 Decentralized Processing
 Edge computing
 XMPP
 Consent-based communication
 IEEE IoT Harmonization
 Data ownership in Smart Cities
Using such technologies solve many privacy related issues
by design and by default.
© Waher Data AB, 2018.
Decentralization & security
Decentralization has security implications:
 More attack surfaces.
 But value of each node is small.
 Value/Effort ratio small.
 Easier to protect.
 Massive data breaches difficult.
 You don’t put all your eggs into the same basket.
 More resilient.
 End-to-end encryption.
© Waher Data AB, 2018.
XMPP
 Authentication of clients
 SASL
 Cooperation (federation)
 Forwarding identities
 Authorization
 Roster
 Presence
 Subscription
 Solves
 Topology problem.
 Latency problem.
 Scalability problem.
© Waher Data AB, 2018.
Communication Patterns
Async.
Msg.
Req/Resp Pub/Sub Federation Broker P2P7
MQTT ✓ ✓
HTTP ✓ ✓
CoAP ✓ ✓ ✓
XMPP ✓ ✓ ✓✓✓ ✓ ✓* ✓
* Note: XMPP supports server-less communication as well.
© Waher Data AB, 2018.
XMPP & Data Protection by Design
XMPP supports data protection by design:
 Decentralization
 Ubiquitous encryption
 Even end-to-end encryption
 Global identities
 Authenticated
 Forwarded
 Federated
 Basic communication authorized
© Waher Data AB, 2018.
XMPP & Data Protection by Default
XMPP supports data protection by default:
 Presence negotiation
 Consent-based authorization
 Required to be able to communicate
properly.
 Consent can be withdrawn.
© Waher Data AB, 2018.
IEEE IoT Harmonization (1451-99)
 Sensor Data
 Control Operations
 Localization (M2M, M2H)
 Tokens for distributed transactions
 Decision Support (for devices)
 Provisioning (for owners)
 Peer-to-Peer communication
 End-to-end encryption
 Concentrator/Bridge (“Thing of things”)
 Discovery
 Ownership
 Clock Synchronization
 Secure Account Creation
 Legal Identities
 Contracts
 Automated provisioning
 Economic feedback
https://gitlab.com/IEEE-SA/XMPPI/IoT
© Waher Data AB, 2018.
9. Events
© Waher Data AB, 2018.
Smart City Lectures*
1. How to build a Smart City (Oct 4th)
2. Privacy in the Smart City (Oct 18th)
3. An Open and/or Secure Smart City (Oct 25th)
4. Harmonizing the Internet of Things (Nov 8th)
5. Introduction to Encryption (Nov 15th)
6. Earning by Sharing in the Smart City (Nov 22th)
7. …
8. …
(*) Funded by Swedish Internet Fund.
© Waher Data AB, 2018.
Smart City Labs*
1. Sensors and actuators (Oct 10th)
2. Connect and chat with your device (Oct 17th)
3. Publishing data from your sensor (Oct 24th)
4. Publishing and discovering devices (Nov 7th)
5. Controlling actuators (Nov 14th)
6. Decision Support for your devices (Nov 21th)
7. …
8. …
(*) Funded by Swedish Internet Fund.
© Waher Data AB, 2018.
 Raspberry Pi & Arduino
 Sensors, Actuators, Controllers,
Concentrators, Bridges
 Protocols:
MQTT, HTTP, CoAP, LWM2M, XMPP
 Interoperability
 Social Interaction
 Decision Support
 Product Lifecycle
 IoT Service Platforms
 IoT Harmonization
 Security
 Privacy
Amazon
Packt
Microsoft Store
Contact: https://waher.se/, https://littlesister.se/
Mastering Internet of Things
© Waher Data AB, 2018.
10. Open Discussion
Ownership?
Privacy?
Security?
Surveillance?
Interoperability?
Cool stuff?
Qué?
Where’s the Money?
Who pays?
What could go wrong?
Little Sister?
Harmonization?

More Related Content

What's hot

When IoT Meets Artificial Intelligence
 When IoT Meets Artificial Intelligence When IoT Meets Artificial Intelligence
When IoT Meets Artificial IntelligenceVeselin Pizurica
 
Machine Learning Algorithms
Machine Learning AlgorithmsMachine Learning Algorithms
Machine Learning AlgorithmsHichem Felouat
 
Natural Language processing
Natural Language processingNatural Language processing
Natural Language processingSanzid Kawsar
 
Adversarial machine learning
Adversarial machine learning Adversarial machine learning
Adversarial machine learning nullowaspmumbai
 
Deep Learning Explained
Deep Learning ExplainedDeep Learning Explained
Deep Learning ExplainedMelanie Swan
 
AI vs Machine Learning vs Deep Learning | Machine Learning Training with Pyth...
AI vs Machine Learning vs Deep Learning | Machine Learning Training with Pyth...AI vs Machine Learning vs Deep Learning | Machine Learning Training with Pyth...
AI vs Machine Learning vs Deep Learning | Machine Learning Training with Pyth...Edureka!
 
Natural language processing and transformer models
Natural language processing and transformer modelsNatural language processing and transformer models
Natural language processing and transformer modelsDing Li
 
Introduction to Data Science.pptx
Introduction to Data Science.pptxIntroduction to Data Science.pptx
Introduction to Data Science.pptxVrishit Saraswat
 
Fairness and Privacy in AI/ML Systems
Fairness and Privacy in AI/ML SystemsFairness and Privacy in AI/ML Systems
Fairness and Privacy in AI/ML SystemsKrishnaram Kenthapadi
 
Data Science Case Studies: The Internet of Things: Implications for the Enter...
Data Science Case Studies: The Internet of Things: Implications for the Enter...Data Science Case Studies: The Internet of Things: Implications for the Enter...
Data Science Case Studies: The Internet of Things: Implications for the Enter...VMware Tanzu
 
A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...
A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...
A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...Edureka!
 
What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...
What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...
What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...Simplilearn
 
Artificial Neural Network | Deep Neural Network Explained | Artificial Neural...
Artificial Neural Network | Deep Neural Network Explained | Artificial Neural...Artificial Neural Network | Deep Neural Network Explained | Artificial Neural...
Artificial Neural Network | Deep Neural Network Explained | Artificial Neural...Simplilearn
 
Unlocking the Power of Generative AI An Executive's Guide.pdf
Unlocking the Power of Generative AI An Executive's Guide.pdfUnlocking the Power of Generative AI An Executive's Guide.pdf
Unlocking the Power of Generative AI An Executive's Guide.pdfPremNaraindas1
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT ArchitectureNaseeba P P
 
AI Solutions in Manufacturing
AI Solutions in ManufacturingAI Solutions in Manufacturing
AI Solutions in ManufacturingSri Ambati
 
Introduction To Artificial Intelligence PowerPoint Presentation Slides
Introduction To Artificial Intelligence PowerPoint Presentation SlidesIntroduction To Artificial Intelligence PowerPoint Presentation Slides
Introduction To Artificial Intelligence PowerPoint Presentation SlidesSlideTeam
 
Speech Recognition Using Python | Edureka
Speech Recognition Using Python | EdurekaSpeech Recognition Using Python | Edureka
Speech Recognition Using Python | EdurekaEdureka!
 

What's hot (20)

When IoT Meets Artificial Intelligence
 When IoT Meets Artificial Intelligence When IoT Meets Artificial Intelligence
When IoT Meets Artificial Intelligence
 
Machine Learning Algorithms
Machine Learning AlgorithmsMachine Learning Algorithms
Machine Learning Algorithms
 
Natural Language processing
Natural Language processingNatural Language processing
Natural Language processing
 
Adversarial machine learning
Adversarial machine learning Adversarial machine learning
Adversarial machine learning
 
Deep Learning Explained
Deep Learning ExplainedDeep Learning Explained
Deep Learning Explained
 
AI vs Machine Learning vs Deep Learning | Machine Learning Training with Pyth...
AI vs Machine Learning vs Deep Learning | Machine Learning Training with Pyth...AI vs Machine Learning vs Deep Learning | Machine Learning Training with Pyth...
AI vs Machine Learning vs Deep Learning | Machine Learning Training with Pyth...
 
Natural language processing and transformer models
Natural language processing and transformer modelsNatural language processing and transformer models
Natural language processing and transformer models
 
Introduction to Data Science.pptx
Introduction to Data Science.pptxIntroduction to Data Science.pptx
Introduction to Data Science.pptx
 
Fairness and Privacy in AI/ML Systems
Fairness and Privacy in AI/ML SystemsFairness and Privacy in AI/ML Systems
Fairness and Privacy in AI/ML Systems
 
Data Science Case Studies: The Internet of Things: Implications for the Enter...
Data Science Case Studies: The Internet of Things: Implications for the Enter...Data Science Case Studies: The Internet of Things: Implications for the Enter...
Data Science Case Studies: The Internet of Things: Implications for the Enter...
 
A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...
A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...
A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...
 
A.I.PPT
A.I.PPTA.I.PPT
A.I.PPT
 
What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...
What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...
What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...
 
Artificial Neural Network | Deep Neural Network Explained | Artificial Neural...
Artificial Neural Network | Deep Neural Network Explained | Artificial Neural...Artificial Neural Network | Deep Neural Network Explained | Artificial Neural...
Artificial Neural Network | Deep Neural Network Explained | Artificial Neural...
 
Unlocking the Power of Generative AI An Executive's Guide.pdf
Unlocking the Power of Generative AI An Executive's Guide.pdfUnlocking the Power of Generative AI An Executive's Guide.pdf
Unlocking the Power of Generative AI An Executive's Guide.pdf
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT Architecture
 
AI Solutions in Manufacturing
AI Solutions in ManufacturingAI Solutions in Manufacturing
AI Solutions in Manufacturing
 
Introduction To Artificial Intelligence PowerPoint Presentation Slides
Introduction To Artificial Intelligence PowerPoint Presentation SlidesIntroduction To Artificial Intelligence PowerPoint Presentation Slides
Introduction To Artificial Intelligence PowerPoint Presentation Slides
 
Speech Recognition Using Python | Edureka
Speech Recognition Using Python | EdurekaSpeech Recognition Using Python | Edureka
Speech Recognition Using Python | Edureka
 
IoT
IoTIoT
IoT
 

Similar to Smart City Lecture 2 - Privacy in the Smart City

Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CityPeter Waher
 
Privacy for IoT with XMPP
Privacy for IoT with XMPPPrivacy for IoT with XMPP
Privacy for IoT with XMPPPeter Waher
 
Smart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CitySmart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CityPeter Waher
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Smart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart CitySmart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart CityPeter Waher
 
Privacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital SetupPrivacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital SetupPiwik PRO
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachSLA-Ready Network
 
GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.James Seville
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...FLUZO
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO
 
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxChapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxwalterl4
 
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer EthicsBaase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethicsdordunureubenmawukok
 
Baase_Henry_GoF5e_Ch5.ppt Gift of Fire, Computer Ethics
Baase_Henry_GoF5e_Ch5.ppt Gift of Fire, Computer EthicsBaase_Henry_GoF5e_Ch5.ppt Gift of Fire, Computer Ethics
Baase_Henry_GoF5e_Ch5.ppt Gift of Fire, Computer Ethicsdordunureubenmawukok
 
Top 4 Emerging Technologies To Look Out For
Top 4 Emerging Technologies To Look Out ForTop 4 Emerging Technologies To Look Out For
Top 4 Emerging Technologies To Look Out ForIan Yun
 
Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.
Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.
Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.Mo Works
 
Smart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of ThingsSmart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of ThingsPeter Waher
 

Similar to Smart City Lecture 2 - Privacy in the Smart City (20)

Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart City
 
Privacy for IoT with XMPP
Privacy for IoT with XMPPPrivacy for IoT with XMPP
Privacy for IoT with XMPP
 
Smart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CitySmart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart City
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Smart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart CitySmart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart City
 
Privacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital SetupPrivacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital Setup
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy
 
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxChapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer EthicsBaase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
Baase_Henry_GoF5e_Ch5.ppt Gift of Fire, Computer Ethics
Baase_Henry_GoF5e_Ch5.ppt Gift of Fire, Computer EthicsBaase_Henry_GoF5e_Ch5.ppt Gift of Fire, Computer Ethics
Baase_Henry_GoF5e_Ch5.ppt Gift of Fire, Computer Ethics
 
Top 4 Emerging Technologies To Look Out For
Top 4 Emerging Technologies To Look Out ForTop 4 Emerging Technologies To Look Out For
Top 4 Emerging Technologies To Look Out For
 
Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.
Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.
Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.
 
Smart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of ThingsSmart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of Things
 

More from Peter Waher

Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...Peter Waher
 
Interoperabilidad e Internet
Interoperabilidad e InternetInteroperabilidad e Internet
Interoperabilidad e InternetPeter Waher
 
Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Peter Waher
 
New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0Peter Waher
 
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...Peter Waher
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...Peter Waher
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...Peter Waher
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewPeter Waher
 
Smart contracts for certification of smart devices
Smart contracts for certification of smart devicesSmart contracts for certification of smart devices
Smart contracts for certification of smart devicesPeter Waher
 
Federated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applicationsFederated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applicationsPeter Waher
 
Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Peter Waher
 
Cross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationCross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationPeter Waher
 
Smart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesSmart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesPeter Waher
 
Smart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling ActuatorsSmart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling ActuatorsPeter Waher
 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionPeter Waher
 
Smart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering DevicesSmart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering DevicesPeter Waher
 
Smart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your SensorSmart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your SensorPeter Waher
 
Smart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your DeviceSmart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your DevicePeter Waher
 
Smart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and ActuatorsSmart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and ActuatorsPeter Waher
 

More from Peter Waher (20)

Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
 
Interoperabilidad e Internet
Interoperabilidad e InternetInteroperabilidad e Internet
Interoperabilidad e Internet
 
Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99
 
New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0
 
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
 
Smart contracts for certification of smart devices
Smart contracts for certification of smart devicesSmart contracts for certification of smart devices
Smart contracts for certification of smart devices
 
Federated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applicationsFederated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applications
 
Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...
 
Cross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationCross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperation
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Smart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesSmart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your Devices
 
Smart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling ActuatorsSmart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling Actuators
 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to Encryption
 
Smart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering DevicesSmart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering Devices
 
Smart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your SensorSmart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your Sensor
 
Smart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your DeviceSmart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your Device
 
Smart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and ActuatorsSmart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and Actuators
 

Recently uploaded

Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 

Recently uploaded (20)

Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 

Smart City Lecture 2 - Privacy in the Smart City

  • 1. © Waher Data AB, 2018. Smart City Lecture 2 Privacy in the Smart City
  • 2. © Waher Data AB, 2018. 1. Recapture
  • 3. © Waher Data AB, 2018. Smart City / Society  Automation  Open Data  Transport  Traffic (C-ITS)  Parking  Utilities  Health Care  Law enforcement  Schools  Libraries  Waste management  Citizens?  … Smart for whom?
  • 4. © Waher Data AB, 2018. What can be
  • 5. © Waher Data AB, 2018. Chinese Social Credit System (World’s most?) ambitious “Smart City” project. Calculates economic and social reputation, based on mass surveillance and AI:  Honesty  Commercial Integrity  Social Integrity  Judicial Credibility
  • 6. © Waher Data AB, 2018. Chinese Social Credit System Collects data from:  Online activity  Searches  Shopping behavior  Locations  Friends  Health  Bank accounts  Messages  Smart Home appliances  News sources  Dating  …
  • 7. © Waher Data AB, 2018. Chinese Social Credit System Affects:  Job positions  Salaries  Living  Travel restrictions  Visa restrictions  Access to schools  Social status  Loans  Internet bandwidth  …
  • 8. © Waher Data AB, 2018. Universal Declaration of Human Rights Article 12: No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks. https://www.un.org/en/universal-declaration-human-rights/ Well… it all depends on how you choose to interpret “arbitrary” and “attack”…
  • 9. © Waher Data AB, 2018. Vision of a Smart City  Ubiquitous access to interoperable sensors and things.  Ubiquitous access to data and information from society’s authorities.  Access to smart services in all niches of society.  Definition of ownership of information.  Protection of Privacy, by design and by default.  Market for access to things and data. Is this Science Fiction?
  • 10. © Waher Data AB, 2018. 2. Privacy
  • 11. © Waher Data AB, 2018. What is privacy? A fundamental human right:  The right to have confidential conversations.  The ability to select with whom we communicate.  Protection against unwarranted monitoring or searches.
  • 12. © Waher Data AB, 2018. Does privacy extend to Social Networks? Who can access your information? Do you want uninvited to know:  What you think?  What you like?  Who you know?  What you’ve done?  Spy on you? Or be able to:  Steal your ideas?  Utilize your confidential information?
  • 13. © Waher Data AB, 2018. Does privacy extend to the IoT? Who can communicate with devices around you, and about what? Do you want uninvited to know:  When you’re home?  If you’re in the shower?  What places you visit?  Your health status? Or be able to:  Control your vehicle?  Turn off your pacemaker?
  • 14. Ex-Director of National Intelligence James R. Clapper http://www.popsci.com/clapper-americas-greatest-threat-is-internet-things ”America's greatest threat is the Internet of Things” Feb 9, 2016
  • 15. © Waher Data AB, 2018. 3. GDPR General Data Protection Regulation Can it help?
  • 16. © Waher Data AB, 2018. Goals  EU Regulation  Automatic law in each Member State.  Came into full effect May 2018.  Harmonizes privacy regulations across the EU.  Balances  Privacy of individuals.  Interests of corporations.  Legal requirements.  Facilitate the free flow of information.
  • 17. © Waher Data AB, 2018. Limits  GDPR balances  Privacy of individuals.  Interests of corporations.  Legal requirements.  Maximum required effort  Proportionality to the rights of all participants.  Minimum required effort  State of the art  Lack of knowledge not acceptable  Severe sanctions
  • 18. © Waher Data AB, 2018. Personal Data Any information relating directly, or indirectly, to an identified or identifiable natural person. “Personality is contagious”
  • 19. © Waher Data AB, 2018. Processing Any operation or set of operations which is performed on personal data or on sets of personal data. “Automatic” is not mentioned. Manual processes are included.
  • 20. © Waher Data AB, 2018. Anonymization Data subjects are no longer identifiable. Examples: Data obfuscation, statistical aggregation, etc. GDPR
  • 21. © Waher Data AB, 2018. Pseudonymization Data subjects can be identified with the use of separate data Examples: Pseudonyms, ordinal numbers, hashes. GDPR
  • 22. © Waher Data AB, 2018. What is allowed?  As little as possible  For as short a time as possible  Share with as few as possible  For as few purposes as possible  As correctly as possible  If there are no other means  After providing transparent information Minimalistic definition: Minimalism Always with proportional data protection mechanisms.
  • 23. © Waher Data AB, 2018. Data Protection Data must be protected*:  By design  By default  State of the art cf. Black lists vs. White lists (*) Proportional to the risks of the data subjects, in the absence of measures taken to mitigate the risks.
  • 24. © Waher Data AB, 2018. Transparent Information  Easily accessible  Easily understood  Clear and plain language  Explicit  Purposes of processing  Risks to the subject  Safeguards  Rights of the subjects Transparency is measured on what is understood, not what is semantically stated.
  • 25. © Waher Data AB, 2018. Lawfulness  Consent  Legal obligation  Legitimate interest  Based on contract  Vital interest  Public interest Research & Development has to be argued is a Legitimate Interest.
  • 26. © Waher Data AB, 2018. Individual Rights  Transparent Information  Access to ones personal data  Export personal data provided by oneself  Correct erroneous data  Erase data*  Object to processing*  Restrict processing*  Withdrawal of consent (if based on consent)  Avoid being subject to automatic decisions (with negative legal consequences) based on automatic profiling. (*) in certain cases
  • 27. © Waher Data AB, 2018. Propagation of Rights When sharing information:  Inform data subjects.  Delegate responsibilities.  Forward requests from data subjects.  Includes links, copies and reproductions.
  • 28. © Waher Data AB, 2018. Sanctions  Authorities are granted access to all  Information  Machines  Data  Warnings  Reprimands  Restrictions  Shut down processes  Fines (up to 4% of global annual turnover)  Damages (even indirect, unless you prove you’re not responsible) GDPR
  • 29. © Waher Data AB, 2018. Paradigm Shift Previous paradigm: The more you collect, the more potential value you have. This is no longer true. New paradigm: The more you collect, the greater the risk, and the greater the responsibility. You should only collect that to which you can assign value.
  • 30. © Waher Data AB, 2018. 4. Ownership
  • 31. © Waher Data AB, 2018. Who owns the data? Who is the owner of data?  The person/entity generating (inventing) the data?  The person/entity storing (controlling) the data?  The person about whom the data relates to? Is it important?
  • 32. © Waher Data AB, 2018. Legislation Which law is applicable?  Copyright?  Trade secrets?  Intellectual Property?  Privacy? Enforcing ownership through legal means is difficult.
  • 33. © Waher Data AB, 2018. Ownership of things How is normal ownership enforced?  Protection behind lock & key.  Access only to trusted parties.  Monitoring.  Demonstration of ownership.
  • 34. © Waher Data AB, 2018. Ownership of data Why treat data differently? Local storage (decentralization) allows:  Protection behind lock & key.  Limiting access to trusted parties.  Monitoring access.  Demonstrating ownership.  Enforcing ownership of data. Added benefit:  Intrinsic value of data through access.
  • 35. © Waher Data AB, 2018. Edge Computing Processing “on the Edge” instead of “in the Cloud” allows:  Access = Value  Scalability  Resilience  Security And it helps protect privacy…
  • 36. © Waher Data AB, 2018. 5. Needless problems
  • 37. © Waher Data AB, 2018. Making privacy more problematic Technologies making protecting privacy more difficult:  Centralized processing  HTTP(S)  CoAP, LWM2M  MQTT  Blockchain You have to develop data protection mechanisms just to counter-act the side effects of using such technologies.
  • 38. © Waher Data AB, 2018. Centralized processing  Less attack surfaces  Value of central nodes is huge  Value/Effort ratio large  Difficult to protect External use Internal use  Consequences huge Massive leaks
  • 39. © Waher Data AB, 2018. HTTP  Good for  Publishing documents  Providing public services  Bad at  Authentication  Authorization  Distribution  Asynchronous processing  Topology problem promotes  Centralized processing  … or “hole punching”
  • 40. © Waher Data AB, 2018. CoAP & LWM2M Tries to solve aspects of HTTP for IoT  Still has topology problem  Assumes middleware for Internet use  LWM2M is standardized middleware  Some interoperability  IPSO Smart Objects  Only for data collection  Difficult to interoperate between things
  • 41. © Waher Data AB, 2018. Publish/Subscribe in MQTT
  • 42. © Waher Data AB, 2018. Privacy issues by design in MQTT  No forwarded identities  Authorization becomes impossible by things  Makes injection a great threat  Control signals  False data  Bandwidth depletion  Lack of privacy  No negotiation of who can subscribe  Access control out-of-band (proprietary)  Wildcards  Makes it easy to eavesdrop  Relies on careful operation of broker  Overview of topic tree difficult  Who operates the broker across domains?  Interoperability a problem. … and many more security-related issues exist.
  • 43. © Waher Data AB, 2018. Warnings  Governments warn against bad MQTT implementations.  MQTT is notoriously difficult to use securely.  Use it only in internal secured networks. https://cert.se/2016/09/mqtt-i-sverige
  • 44. © Waher Data AB, 2018. Blockchain  Blocks cannot  be deleted  on request  after a given time  … or ever  be corrected  Access is given to all or nothing  Public access has to be assumed  Hashes of personal information is still personal  Cryptographic Algorithms fixed  Lends itself to future frauds Blockchain is not suitable for personal information at all.
  • 45. © Waher Data AB, 2018. 6. Neutral
  • 46. © Waher Data AB, 2018. Security ≠ Privacy Technologies that do not help, or work against the protection of privacy:  TLS  DTLS  X.509  VPN  … Using such technologies doesn’t solve any privacy issues. But at least they don’t add new issues by themselves.
  • 47. © Waher Data AB, 2018. 7. Ambivalence
  • 48. © Waher Data AB, 2018. Identities Technologies that either help or make it more difficult to protect privacy:  Anonymity  Strong identities Pseudonyms Using such technologies have strong privacy-related implications. Which-way is determined by how they are used.
  • 49. © Waher Data AB, 2018. Anonymity  Protects Whistle blower Dissident (Criminal) (Terrorist)  Security decisions difficult  Facilitates leaking personal data How do you protect sensitive information, if you don’t know who’s on the other end?
  • 50. © Waher Data AB, 2018. Strong Identities  Protects information owners  Allows selective responses  Can be used to track individuals Logging for security purposes is legitimate. How can you make sure logging is only used for security purposes? (One answer: Use of standardized, open software that are agnostic to the purposes of processing, such as brokers and End-to-End encryption of payloads.)
  • 51. © Waher Data AB, 2018. 8. Solutions
  • 52. © Waher Data AB, 2018. Solving Privacy-related problems Examples of technologies that help protect privacy:  Decentralized Processing  Edge computing  XMPP  Consent-based communication  IEEE IoT Harmonization  Data ownership in Smart Cities Using such technologies solve many privacy related issues by design and by default.
  • 53. © Waher Data AB, 2018. Decentralization & security Decentralization has security implications:  More attack surfaces.  But value of each node is small.  Value/Effort ratio small.  Easier to protect.  Massive data breaches difficult.  You don’t put all your eggs into the same basket.  More resilient.  End-to-end encryption.
  • 54. © Waher Data AB, 2018. XMPP  Authentication of clients  SASL  Cooperation (federation)  Forwarding identities  Authorization  Roster  Presence  Subscription  Solves  Topology problem.  Latency problem.  Scalability problem.
  • 55. © Waher Data AB, 2018. Communication Patterns Async. Msg. Req/Resp Pub/Sub Federation Broker P2P7 MQTT ✓ ✓ HTTP ✓ ✓ CoAP ✓ ✓ ✓ XMPP ✓ ✓ ✓✓✓ ✓ ✓* ✓ * Note: XMPP supports server-less communication as well.
  • 56. © Waher Data AB, 2018. XMPP & Data Protection by Design XMPP supports data protection by design:  Decentralization  Ubiquitous encryption  Even end-to-end encryption  Global identities  Authenticated  Forwarded  Federated  Basic communication authorized
  • 57. © Waher Data AB, 2018. XMPP & Data Protection by Default XMPP supports data protection by default:  Presence negotiation  Consent-based authorization  Required to be able to communicate properly.  Consent can be withdrawn.
  • 58. © Waher Data AB, 2018. IEEE IoT Harmonization (1451-99)  Sensor Data  Control Operations  Localization (M2M, M2H)  Tokens for distributed transactions  Decision Support (for devices)  Provisioning (for owners)  Peer-to-Peer communication  End-to-end encryption  Concentrator/Bridge (“Thing of things”)  Discovery  Ownership  Clock Synchronization  Secure Account Creation  Legal Identities  Contracts  Automated provisioning  Economic feedback https://gitlab.com/IEEE-SA/XMPPI/IoT
  • 59. © Waher Data AB, 2018. 9. Events
  • 60. © Waher Data AB, 2018. Smart City Lectures* 1. How to build a Smart City (Oct 4th) 2. Privacy in the Smart City (Oct 18th) 3. An Open and/or Secure Smart City (Oct 25th) 4. Harmonizing the Internet of Things (Nov 8th) 5. Introduction to Encryption (Nov 15th) 6. Earning by Sharing in the Smart City (Nov 22th) 7. … 8. … (*) Funded by Swedish Internet Fund.
  • 61. © Waher Data AB, 2018. Smart City Labs* 1. Sensors and actuators (Oct 10th) 2. Connect and chat with your device (Oct 17th) 3. Publishing data from your sensor (Oct 24th) 4. Publishing and discovering devices (Nov 7th) 5. Controlling actuators (Nov 14th) 6. Decision Support for your devices (Nov 21th) 7. … 8. … (*) Funded by Swedish Internet Fund.
  • 62. © Waher Data AB, 2018.  Raspberry Pi & Arduino  Sensors, Actuators, Controllers, Concentrators, Bridges  Protocols: MQTT, HTTP, CoAP, LWM2M, XMPP  Interoperability  Social Interaction  Decision Support  Product Lifecycle  IoT Service Platforms  IoT Harmonization  Security  Privacy Amazon Packt Microsoft Store Contact: https://waher.se/, https://littlesister.se/ Mastering Internet of Things
  • 63. © Waher Data AB, 2018. 10. Open Discussion Ownership? Privacy? Security? Surveillance? Interoperability? Cool stuff? Qué? Where’s the Money? Who pays? What could go wrong? Little Sister? Harmonization?