Protecting user Data in the Smart City scenario: Difference between revisions

From OpenCommons
Jump to navigation Jump to search
m (1 revision imported)
No edit summary
Line 1: Line 1:
{{ActionCluster  
{{ActionCluster
| title              =  
|image=ITESM.png
Protecting user Data in the Smart City scenario: the case of the NGSI Encryption Layer.
|team=Tecnológico de Monterrey, State of Mexico Campus
| description       =  
|leader=Nestor Velasco-Bermeo
Data is exchanged intensively within a Smart City, the correct usage of such information is vital to provide a better service to the citizens. Protecting user’s details is the key of a broader adoption of any application with intense data exchange and exploitation.
|imagecaption=Architecture of Open & Agile Smart Cities Solutions
| challenges         =  
|municipalities=Mexico City<!-- Mexican Federal Government, Office of Open Data, -->
The challenge resides on protecting user’s details (GPS position, health details/information) while at the same time being able to use it within the scope of an application.  
|status=Launched
| solutions         =  
|download=[https://drive.google.com/open?id=1NNuBdaajUkZBahiNA-B0vFRjCrgKiJvq Tech Jam Presentation]
The proposed solution consists of an Encryption layer that allows the user to select what information he/she will be willing to share, and which details will remain private.
|description=Data is exchanged intensively within a Smart City, the correct usage of such information is vital to provide a better service to the citizens. Protecting user’s details is the key of a broader adoption of any application with intense data exchange and exploitation.
| requirements       =  
|challenges=The challenge resides on protecting user’s details (GPS position, health details/information) while at the same time being able to use it within the scope of an application.
The approach we are trying to implement is a multi-level encryption tool that will allow the user to decide which information they will share and which will be kept private. Also, a white-list approach will be tested to provide the user the possibility of selecting which kind of applications will be able to consume the user’s details without any restriction and which other applications will be blocked.
|solutions=The proposed solution consists of an Encryption layer that allows the user to select what information he/she will be willing to share, and which details will remain private.
|requirements=The approach we are trying to implement is a multi-level encryption tool that will allow the user to decide which information they will share and which will be kept private. Also, a white-list approach will be tested to provide the user the possibility of selecting which kind of applications will be able to consume the user’s details without any restriction and which other applications will be blocked.
The solution includes a developer’s API that will implement SOTA encryption methods before consuming and storing any data.
The solution includes a developer’s API that will implement SOTA encryption methods before consuming and storing any data.
| kpi               =  
|kpi=Our performance targets/KPIs currently focus on anonymizing all the basic private data from users (sex, age, location) we will also focus on providing at least top of the line encryption algorithms to encrypt the generated data. Finally we will have the developers API up and running on an cloud instance that will accept petitions from any application.
Our performance targets/KPIs currently focus on anonymizing all the basic private data from users (sex, age, location) we will also focus on providing at least top of the line encryption algorithms to encrypt the generated data. Finally we will have the developers API up and running on an cloud instance that will accept petitions from any application.
|measurement=User’s data is encrypted and successfully stored, if there is any security breach the downloaded data will be useless without the proper de-cryption keys and algorithms.
| measurement       =  
|standards=The project will be developed using open source & royalty free applications which will ensure the sustainability and replicability. The Standards used will be according to HIPAA regarding data protection and we will also consider EU regulations regarding protecting user Data. Regarding scalability the usage of FIWARE data models will allow us the possibility of taking models built and tested by a big and strong community to ensure the integration of the solution with additional Smart City applications.
User’s data is encrypted and successfully stored, if there is any security breach the downloaded data will be useless without the proper de-cryption keys and algorithms.
|impacts=The benefits of this approach consider new jobs (regarding the participating developers that will work on the creation of this system) also the security improvements regarding data collection and storage due to the possibility that any public agency or any private institution will be able to implement this encryption and privacy methods on their organizations.
| standards         =  
|demonstration=On the demonstration phase we will look at having the system up and running to provide the encryption services both to users and developers compliant with the standards and regulations of personal data protection.
The project will be developed using open source & royalty free applications which will ensure the sustainability and replicability. The Standards used will be according to HIPAA regarding data protection and we will also consider EU regulations regarding protecting user Data. Regarding scalability the usage of FIWARE data models will allow us the possibility of taking models built and tested by a big and strong community to ensure the integration of the solution with additional Smart City applications.
<!--
| cybersecurity      =
|chapter=Practical Guide: IoT Cybersecurity & Privacy
| impacts           =  
|supercluster=Data
The benefits of this approach consider new jobs (regarding the participating developers that will work on the creation of this system) also the security improvements regarding data collection and storage due to the possibility that any public agency or any private institution will be able to implement this encryption and privacy methods on their organizations.  
|year=2018
| demonstration     =  
|title=Protecting user Data in the Smart City scenario: the case of the NGSI Encryption Layer.
On the demonstration phase we will look at having the system up and running to provide the encryption services both to users and developers compliant with the standards and regulations of personal data protection.
|email=nestorvb@gmail.com
<!--| leader            = [mailto:nestorvb@gmail.com Nestor Velasco-Bermeo, Miguel Gonzalez-Mendoza]
| municipalities    = [https://theodi.org/project/labora/ Mexican Federal Government, Office of Open Data, Mexico City]
| team              = [https://tec.mx/es Tecnológico de Monterrey], State of Mexico Campus-->
| leader            = Nestor Velasco-Bermeo
| email             = nestorvb@gmail.com
| municipalities    = Mexico City
<!-- Mexican Federal Government, Office of Open Data, -->
| team              = Tecnológico de Monterrey, State of Mexico Campus
| image              = ITESM.png
| imagecaption      = Architecture of Open & Agile Smart Cities Solutions
| status            = Launched
| website            =
| download          = [https://drive.google.com/open?id=1NNuBdaajUkZBahiNA-B0vFRjCrgKiJvq Tech Jam Presentation]
| supercluster      = Data
| year              = 2018
}}
}}

Revision as of 04:59, January 25, 2023

{{ActionCluster |image=ITESM.png |team=Tecnológico de Monterrey, State of Mexico Campus |leader=Nestor Velasco-Bermeo |imagecaption=Architecture of Open & Agile Smart Cities Solutions |municipalities=Mexico City |status=Launched |download=Tech Jam Presentation |description=Data is exchanged intensively within a Smart City, the correct usage of such information is vital to provide a better service to the citizens. Protecting user’s details is the key of a broader adoption of any application with intense data exchange and exploitation. |challenges=The challenge resides on protecting user’s details (GPS position, health details/information) while at the same time being able to use it within the scope of an application. |solutions=The proposed solution consists of an Encryption layer that allows the user to select what information he/she will be willing to share, and which details will remain private. |requirements=The approach we are trying to implement is a multi-level encryption tool that will allow the user to decide which information they will share and which will be kept private. Also, a white-list approach will be tested to provide the user the possibility of selecting which kind of applications will be able to consume the user’s details without any restriction and which other applications will be blocked. The solution includes a developer’s API that will implement SOTA encryption methods before consuming and storing any data. |kpi=Our performance targets/KPIs currently focus on anonymizing all the basic private data from users (sex, age, location) we will also focus on providing at least top of the line encryption algorithms to encrypt the generated data. Finally we will have the developers API up and running on an cloud instance that will accept petitions from any application. |measurement=User’s data is encrypted and successfully stored, if there is any security breach the downloaded data will be useless without the proper de-cryption keys and algorithms. |standards=The project will be developed using open source & royalty free applications which will ensure the sustainability and replicability. The Standards used will be according to HIPAA regarding data protection and we will also consider EU regulations regarding protecting user Data. Regarding scalability the usage of FIWARE data models will allow us the possibility of taking models built and tested by a big and strong community to ensure the integration of the solution with additional Smart City applications. |impacts=The benefits of this approach consider new jobs (regarding the participating developers that will work on the creation of this system) also the security improvements regarding data collection and storage due to the possibility that any public agency or any private institution will be able to implement this encryption and privacy methods on their organizations. |demonstration=On the demonstration phase we will look at having the system up and running to provide the encryption services both to users and developers compliant with the standards and regulations of personal data protection.