Security and privacy challenges in smart cities

Abstract The construction of smart cities will bring about a higher quality of life to the masses through digital interconnectivity, leading to increased efficiency and accessibility in cities. Smart cities must ensure individual privacy and security in order to ensure that its citizens will participate. If citizens are reluctant to participate, the core advantages of a smart city will dissolve. This article will identify and offer possible solutions to five smart city challenges, in hopes of anticipating destabilizing and costly disruptions. The challenges include privacy preservation with high dimensional data, securing a network with a large attack surface, establishing trustworthy data sharing practices, properly utilizing artificial intelligence, and mitigating failures cascading through the smart network. Finally, further research directions are provided to encourage further exploration of smart city challenges before their construction.

[1]  Benjamin C. M. Fung,et al.  Differentially private transit data publication: a case study on the montreal transportation system , 2012, KDD.

[2]  M. Sen,et al.  Issues of Privacy and Security in the Role of Software in Smart Cities , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[3]  Vachik S. Dave,et al.  Feature Selection for Classification under Anonymity Constraint , 2015, Trans. Data Priv..

[4]  Agusti Solanas,et al.  The pursuit of citizens' privacy: a privacy-aware smart city is possible , 2013, IEEE Communications Magazine.

[5]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[6]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[7]  S. Shankar Sastry,et al.  A Taxonomy of Cyber Attacks on SCADA Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[8]  E.J. Byres,et al.  Industrial cybersecurity for power system and SCADA networks , 2005, Record of Conference Papers Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference.

[9]  Benjamin C. M. Fung,et al.  Anonymizing trajectory data for passenger flow analysis , 2014 .

[10]  Adam D. Smith,et al.  Composition attacks and auxiliary information in data privacy , 2008, KDD.

[11]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[12]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[13]  John R. Goodall,et al.  Visualizing Cascading Failures in Critical Cyber Infrastructures , 2007, Critical Infrastructure Protection.

[14]  Carlos E. Restrepo,et al.  The next step: quantifying infrastructure interdependencies to improve security , 2006, Int. J. Crit. Infrastructures.

[15]  Jordi Forné,et al.  Reconciling privacy and efficient utility management in smart cities , 2014, Trans. Emerg. Telecommun. Technol..

[16]  Zaheer Abbas Khan,et al.  Towards Cloud Based Smart Cities Data Security and Privacy Management , 2014, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing.

[17]  Dima Alhadidi,et al.  Privacy-preserving data mashup model for trading person-specific information , 2016, Electron. Commer. Res. Appl..

[18]  Adel Said Elmaghraby,et al.  Cyber security challenges in Smart Cities: Safety, security and privacy , 2014, Journal of advanced research.

[19]  Murat Kantarcioglu,et al.  Privacy-aware dynamic feature selection , 2015, 2015 IEEE 31st International Conference on Data Engineering.

[20]  James P. Peerenboom,et al.  Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .

[21]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[22]  M. Dohler,et al.  Security and Privacy in your Smart City , 2011 .

[23]  Lior Rokach,et al.  Privacy-preserving data mining: A feature set partitioning approach , 2010, Inf. Sci..

[24]  Benjamin C. M. Fung,et al.  Service-Oriented Architecture for High-Dimensional Private Data Mashup , 2012, IEEE Transactions on Services Computing.

[25]  Mansoor Ahmed,et al.  Smart Cities: A Survey on Security Concerns , 2016 .

[26]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[27]  Philip S. Yu,et al.  Differentially private data release for data mining , 2011, KDD.

[28]  Daniel Kifer,et al.  Attacks on privacy and deFinetti's theorem , 2009, SIGMOD Conference.

[29]  Benjamin C. M. Fung,et al.  Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data , 2014, IEEE Transactions on Dependable and Secure Computing.