Difference between revisions of "IoTSec:Privacy Label explanation"

From its-wiki.no

Jump to: navigation, search
Line 6: Line 6:
  
 
<span style="color:#009000">Open issues
 
<span style="color:#009000">Open issues
* access control (authentication) - transparency of authentication level
+
<span style="color:#009000">* access control (authentication) - transparency of authentication level
* maintenance and update</span>
+
<span style="color:#009000">* maintenance and update</span>
  
 
A++
 
A++
* no data are shared  
+
<span style="color:#009000">* no data are shared  
  
 
A+
 
A+
  
 
A - Very high
 
A - Very high
*  
+
* <span style="color:#009000"> restricted use of data to purpose only (particular service)
 
* supplier should bear the risk of incidents, e.g. they rathe than I get penalised when things go wrong - equivalent to finansavtaleloven
 
* supplier should bear the risk of incidents, e.g. they rathe than I get penalised when things go wrong - equivalent to finansavtaleloven
 
* if device is stolen - nobody else  
 
* if device is stolen - nobody else  
  
 
B
 
B
 +
* <span style="color:#009000"> specify the data to be collected, re-use for statistical data only, ensured integrity
 
* customizable access control, eg.. add stronger authentication or consent requirements
 
* customizable access control, eg.. add stronger authentication or consent requirements
 
* must be able to trade off the various security requirements, e.g. confidentiality agains availability - i.e. I want flexibility
 
* must be able to trade off the various security requirements, e.g. confidentiality agains availability - i.e. I want flexibility
Line 27: Line 28:
  
 
C
 
C
 +
* <span style="color:#009000"> data are collected without control (GPS+activity+heart rate), re-use only for statistical, encrypted storage
 +
 
* must be possible to withdraw consent - and that this results in all relevant information being deleted - and proof of deletion
 
* must be possible to withdraw consent - and that this results in all relevant information being deleted - and proof of deletion
  
 
D
 
D
 +
* <span style="color:#009000"> data are collected, transparency of re-use 
 
* Data is not sold without consent/knowledge
 
* Data is not sold without consent/knowledge
 
* transparency - I get told about the criteria that the supplier has used in their information classification
 
* transparency - I get told about the criteria that the supplier has used in their information classification
Line 36: Line 40:
  
 
E
 
E
 +
* <span style="color:#009000"> collected data, no transparency of re-use
 +
 
* in compliance with GDPR
 
* in compliance with GDPR
 
* if data is stolen, I will get told
 
* if data is stolen, I will get told
Line 42: Line 48:
  
 
F - Failure
 
F - Failure
 +
* no privacy, no control of data, ''everyone can see''
 
* nothing , no expectations
 
* nothing , no expectations
 +
 +
Group 2:
 +
 +
strong,
 +
 +
medium,
 +
 +
weak
 +
 +
 +
* data
 +
* control functionality
 +
* security techniques
 +
* accountability
 +
* access to data

Revision as of 14:35, 20 November 2017

Security in IoT for Smart Grids
Home Research Security Centre Publications Student corner About
English-Language-icon.png

Four areas

  1. which data are collected
  2. sharing to my phone, my cloud, public cloud,...
  3. data communication integrity and storage
  4. further distribution of data, ownership of data, further processing

Open issues * access control (authentication) - transparency of authentication level * maintenance and update

A++ * no data are shared

A+

A - Very high

  • restricted use of data to purpose only (particular service)
  • supplier should bear the risk of incidents, e.g. they rathe than I get penalised when things go wrong - equivalent to finansavtaleloven
  • if device is stolen - nobody else

B

  • specify the data to be collected, re-use for statistical data only, ensured integrity
  • customizable access control, eg.. add stronger authentication or consent requirements
  • must be able to trade off the various security requirements, e.g. confidentiality agains availability - i.e. I want flexibility
  • compliance with other standards - and this be listed (information requirement) - clipper compatible
  • anonymity of my interaction with the supplier
  • customer can control with how the information is transferred and used by a third party

C

  • data are collected without control (GPS+activity+heart rate), re-use only for statistical, encrypted storage
  • must be possible to withdraw consent - and that this results in all relevant information being deleted - and proof of deletion

D

  • data are collected, transparency of re-use
  • Data is not sold without consent/knowledge
  • transparency - I get told about the criteria that the supplier has used in their information classification
  • Information is only used for its legitimate purpose


E

  • collected data, no transparency of re-use
  • in compliance with GDPR
  • if data is stolen, I will get told
  • notification if DSO is hacked


F - Failure

  • no privacy, no control of data, everyone can see
  • nothing , no expectations

Group 2:

strong,

medium,

weak


  • data
  • control functionality
  • security techniques
  • accountability
  • access to data