Difference between revisions of "IoTSec:Privacy Label explanation"

From its-wiki.no

Jump to: navigation, search
Line 1: Line 1:
Four areas
+
<span style="color:#009000">Four areas
# which data are collected
+
# <span style="color:#009000">which data are collected
# sharing to my phone, my cloud, public cloud,...
+
# <span style="color:#009000">sharing to my phone, my cloud, public cloud,...
# data communication integrity and storage
+
# <span style="color:#009000">data communication integrity and storage
# further distribution of data, ownership of data, further processing
+
# <span style="color:#009000">further distribution of data, ownership of data, further processing
  
 
<span style="color:#009000">Open issues
 
<span style="color:#009000">Open issues

Revision as of 14:45, 20 November 2017

Security in IoT for Smart Grids
Home Research Security Centre Publications Student corner About
English-Language-icon.png

Four areas

  1. which data are collected
  2. sharing to my phone, my cloud, public cloud,...
  3. data communication integrity and storage
  4. further distribution of data, ownership of data, further processing

Open issues

  • access control (authentication) - transparency of authentication level
  • maintenance and update

A++

  • no data are shared

A+

A - Very high

  • restricted use of data to purpose only (particular service)
  • supplier should bear the risk of incidents, e.g. they rather than I get penalised when things go wrong - equivalent to finansavtaleloven
  • if device is stolen - nobody else

B

  • specify the data to be collected, re-use for statistical data only, ensured integrity
  • customizable access control, eg.. add stronger authentication or consent requirements
  • must be able to trade off the various security requirements, e.g. confidentiality agains availability - i.e. I want flexibility
  • compliance with other standards - and this be listed (information requirement) - clipper compatible
  • anonymity of my interaction with the supplier
  • customer can control with how the information is transferred and used by a third party

C

  • data are collected without control (GPS+activity+heart rate), re-use only for statistical, encrypted storage
  • must be possible to withdraw consent - and that this results in all relevant information being deleted - and proof of deletion

D

  • data are collected, transparency of re-use
  • Data is not sold without consent/knowledge
  • transparency - I get told about the criteria that the supplier has used in their information classification
  • Information is only used for its legitimate purpose


E

  • collected data, no transparency of re-use
  • in compliance with GDPR
  • if data is stolen, I will get told
  • notification if DSO is hacked


F - Failure

  • no privacy, no control of data, everyone can see
  • nothing , no expectations

Group 2:

  • 3 grades: strong, medium, weak

Group 3:

  • consent,
  • level of control,
  • notion of data sensitivity
  • transparency

Influence parameters

  • data
  • control functionality
  • security techniques
  • accountability
  • access to data