scholarly journals The Design of Personal Privacy and Security Risk Scores for Minimizing Consumers' Cognitive Gaps in IoT Settings

Author(s):  
Daeeun Choi ◽  
Paul Lowry ◽  
Alan Wang
2021 ◽  
Vol 4 ◽  
Author(s):  
Vibhushinie Bentotahewa ◽  
Chaminda Hewage ◽  
Jason Williams

The growing dependency on digital technologies is becoming a way of life, and at the same time, the collection of data using them for surveillance operations has raised concerns. Notably, some countries use digital surveillance technologies for tracking and monitoring individuals and populations to prevent the transmission of the new coronavirus. The technology has the capacity to contribute towards tackling the pandemic effectively, but the success also comes at the expense of privacy rights. The crucial point to make is regardless of who uses and which mechanism, in one way another will infringe personal privacy. Therefore, when considering the use of technologies to combat the pandemic, the focus should also be on the impact of facial recognition cameras, police surveillance drones, and other digital surveillance devices on the privacy rights of those under surveillance. The GDPR was established to ensure that information could be shared without causing any infringement on personal data and businesses; therefore, in generating Big Data, it is important to ensure that the information is securely collected, processed, transmitted, stored, and accessed in accordance with established rules. This paper focuses on Big Data challenges associated with surveillance methods used within the COVID-19 parameters. The aim of this research is to propose practical solutions to Big Data challenges associated with COVID-19 pandemic surveillance approaches. To that end, the researcher will identify the surveillance measures being used by countries in different regions, the sensitivity of generated data, and the issues associated with the collection of large volumes of data and finally propose feasible solutions to protect the privacy rights of the people, during the post-COVID-19 era.


Author(s):  
Wissam Abbass ◽  
Amine Baina ◽  
Mostafa Bellafkih

The rapid growth of the world's population is placing a huge strain on the existing infrastructures. As a quest for accommodating this growth, interest is turned to the internet of things (IoT). In fact, the IoT is significantly improving today's quality of life by innovating the provided services and enhancing communication and interaction. Furthermore, it has also empowered real-time decision making by introducing dynamic services for innovative traffic handling, energy-efficient infrastructure saving, and public safety ensuring. However, IoT applications for smart cities is still a major issue as it lacks assuring privacy and security within provided services. In this chapter, the authors pinpoint IoT's security risk assessment challenges and examine its critical influence on smart cities. Additionally, they highlight the key aspects characterizing a smart city which also represent the critical assets requiring security risk assessment. Moreover, they discuss the resulting issues and their related countermeasures.


Author(s):  
S. M. Wu ◽  
Y. C. Wu

Abstract. Cloud computing is an important part of the development of smart cities and also the focus of the information and communication technology (ICT) industry. From the concept of cloud computing, people and objects in cities are organized based on their application needs and computed in real time. It is a comprehensive utilization of the new generation of information and communication technology. This paper first introduces the concept of cloud computing, smart city construction in Taiwan, and the information security management standard of cloud computing, then describes the cloud computing security framework from three areas,and summarizes the implementation status of cloud computing in Taiwan, government policies, and measures, reaching the conclusion that information transmission must be fast and reliable and ensure personal privacy and security. Any type of information security problem will bring catastrophic consequences. Therefore, cloud computing also brings severe challenges to the traditional information security system.


2021 ◽  
Vol 11 (18) ◽  
pp. 8496
Author(s):  
Salah T. Alshammari ◽  
Khalid Alsubhi

Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is versatile, and extensive amounts of data can be stored in the cloud. Businesses can access various services over the cloud without having to install applications. However, cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Although there are a number of advantages to cloud computing services, especially for business owners, various challenges are posed in terms of the privacy and security of information and online services. A threat that is widely faced in the cloud environment is the on/off attack, in which entities exhibit proper behavior for a given time period to develop a positive reputation and gather trust, after which they exhibit deception. Another threat often faced by trust management services is a collusion attack, which is also known as collusive malicious feedback behavior. This is carried out when a group of people work together to make false recommendations with the intention of damaging the reputation of another party, which is referred to as a slandering attack, or to enhance their own reputation, which is referred to as a self-promoting attack. In this paper, a viable solution is provided with the given trust model for preventing these attacks. This method works by providing effective security to cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on/off attacks and collusion attacks by applying different security criteria. Finally, the results show that the proposed trust model system can provide high security by decreasing security risk and improving the quality of decisions of data owners and cloud operators.


2020 ◽  
Vol 8 (6) ◽  
pp. 3892-3895

Internet of Things network today naturally is one of the huge quantities of devices from sensors linked through the communication framework to give value added service to the society and mankind. That allows equipment to be connected at anytime with anything rather using network and service. By 2020 there will be 50 to 100 billion devices connected to Internet and will generate heavy data that is to be analyzed for knowledge mining is a forecast. The data collected from individual devices of IoT is not going to give sufficient information to perform any type of analysis like disaster management, sentiment analysis, and smart cities and on surveillance. Privacy and Security related research increasing from last few years. IoT generated data is very huge, and the existing mechanisms like k- anonymity, l-diversity and differential privacy were not able to address these personal privacy issues because the Internet of Things Era is more vulnerable than the Internet Era [10][20]. To solve the personal privacy related problems researchers and IT professionals have to pay more attention to derive policies and to address the key issues of personal privacy preservation, so the utility and trade off will be increased to the Internet of Things applications. Personal Privacy Preserving Data Publication (PPPDP) is the area where the problems are identified and fixed in this IoT Era to ensure better personal privacy.


2019 ◽  
Vol 2019 ◽  
pp. 1-35 ◽  
Author(s):  
Yasuyuki Kawanishi ◽  
Hideaki Nishihara ◽  
Daisuke Souma ◽  
Hirotaka Yoshida ◽  
Yoichi Hata

In recent years, much attention has been paid to autonomous vehicles and security threats on such vehicles have become an important issue. One of these examples is a command injection issue on a gateway ECU, which was reported in 2016. In order to mitigate these threats, the secure design of connected vehicle systems, which is done at the concept phase during development, has become increasingly important in industry. From this perspective, a security guideline such as JASO TP15002 which specifies two concrete methods, CRSS (CVSS Based Risk Scoring System) and RSMA (Risk Scoring Methodology for Automotive System), was made public in 2015. The latest work on the application of TP15002 to the ITU-T X.1373 standard was published in 2017. However, the risk assessment in this publication seems limited. It is not clear from this publication how systematically the risk assessment task in TP15002 can be performed at the implementation level. Another interesting question is how different methods affect the risk scores of connected vehicle systems. In this paper, we focus on the risk assessment phase in JASO TP15002. For a systematic risk assessment, we introduce an idea of asset container and propose to extend CRSS to a novel RSS (Risk Scoring System), RSS-CVSSv3, by appropriately replacing CVSSv2 vulnerability scoring system on which CRSS is based with CVSSv3. To address the above questions, we perform a comparative study on CRSS, RSMA, and RSS-CVSSv3 for multiple use cases such as a CGW (Central Gateway) and a drone, to examine the efficiency and usefulness of our methods. For this comparative purpose, we devise an interesting approach for the refinement of RSMA to the obstacles in comparing CRSS with RSMA.


2013 ◽  
Vol 339 ◽  
pp. 292-296
Author(s):  
Hong Ji

With the rapid development of computer technology and network technology, the information age is quietly approaching. The development and application of the Email system is to be promoted. Email system plays an important role which provides efficient, convenient, safe and accurate transmission of information. The Email delivery relates to the activities of the personal privacy, however, the internet is an open network, the mail transmission will be a security threat from all sides which through the internet. The mail system security issue has become increasingly prominent and become the focus of growing concern. The paper describes basic principle of mail system, furthermore, it analyses the property of security risk and proposes mail security policy based on network technology.


Sign in / Sign up

Export Citation Format

Share Document