Difference between revisions of "IoTSec:Privacy Label explanation"

From its-wiki.no

Jump to: navigation, search
(Other aspects)
Line 1: Line 1:
 
{{TOCright}}
 
{{TOCright}}
 +
= Process =
 
<span style="color:#009000">Four areas
 
<span style="color:#009000">Four areas
 
# <span style="color:#009000">which data are collected
 
# <span style="color:#009000">which data are collected
Line 5: Line 6:
 
# <span style="color:#009000">data communication integrity and storage
 
# <span style="color:#009000">data communication integrity and storage
 
# <span style="color:#009000">further distribution of data, ownership of data, further processing
 
# <span style="color:#009000">further distribution of data, ownership of data, further processing
 +
 +
== Influence on data types ==
 +
* freshness of data
 +
* consent,
 +
* level of control,
 +
* notion of data sensitivity
 +
* transparency
 +
 +
Influence parameters
 +
* data
 +
* control functionality
 +
* security techniques
 +
* accountability
 +
* access to data
 +
  
 
<span style="color:#009000">Open issues
 
<span style="color:#009000">Open issues

Revision as of 15:01, 20 November 2017

Security in IoT for Smart Grids
Home Research Security Centre Publications Student corner About
English-Language-icon.png

Process

Four areas

  1. which data are collected
  2. sharing to my phone, my cloud, public cloud,...
  3. data communication integrity and storage
  4. further distribution of data, ownership of data, further processing

Influence on data types

  • freshness of data
  • consent,
  • level of control,
  • notion of data sensitivity
  • transparency

Influence parameters

  • data
  • control functionality
  • security techniques
  • accountability
  • access to data


Open issues

  • access control (authentication) - transparency of authentication level
  • maintenance and update

Level A++

  • no data are shared

Level A+

Level A - Very high

  • restricted use of data to purpose only (particular service)
  • supplier should bear the risk of incidents, e.g. they rather than I get penalised when things go wrong - equivalent to finansavtaleloven
  • if device is stolen - nobody else

Level B

  • specify the data to be collected, re-use for statistical data only, ensured integrity
  • customizable access control, eg.. add stronger authentication or consent requirements
  • must be able to trade off the various security requirements, e.g. confidentiality agains availability - i.e. I want flexibility
  • compliance with other standards - and this be listed (information requirement) - clipper compatible
  • anonymity of my interaction with the supplier
  • customer can control with how the information is transferred and used by a third party

Level C

  • data are collected without control (GPS+activity+heart rate), re-use only for statistical, encrypted storage
  • must be possible to withdraw consent - and that this results in all relevant information being deleted - and proof of deletion

Level D

  • data are collected, transparency of re-use
  • Data is not sold without consent/knowledge
  • transparency - I get told about the criteria that the supplier has used in their information classification
  • Information is only used for its legitimate purpose


Level E

  • collected data, no transparency of re-use
  • in compliance with GDPR
  • if data is stolen, I will get told
  • notification if DSO is hacked


Level F - Failure

  • no privacy, no control of data, everyone can see
  • nothing , no expectations

Other aspects

how many levels to be consider:

  • only three labels to consider