Difference between revisions of "IoTSec:T2.1"
From its-wiki.no
Josef.Noll (Talk | contribs) |
Josef.Noll (Talk | contribs) (→Subtasks) |
||
Line 18: | Line 18: | ||
== Subtasks == | == Subtasks == | ||
− | :T2.1.1 Research (xx pm), 1 year Post Doc | + | :T2.1.1 Research (xx pm), 1 year Post Doc |
Analyse and specify how to design and build privacy designs for metering and control of grid-connected devices and protocols with privacy design patterns; how to carry out risk analysis, privacy impact analysis, and how to deploy user-centric privacy technology. | Analyse and specify how to design and build privacy designs for metering and control of grid-connected devices and protocols with privacy design patterns; how to carry out risk analysis, privacy impact analysis, and how to deploy user-centric privacy technology. | ||
Line 24: | Line 24: | ||
* D1.1 and D2.1: The outcome will be construction of privacy by Design patterns for IoT applications and will be contributions to D1.1 and D2.1 as technical reports and 1 conference paper. | * D1.1 and D2.1: The outcome will be construction of privacy by Design patterns for IoT applications and will be contributions to D1.1 and D2.1 as technical reports and 1 conference paper. | ||
− | :T2.1.2 Research (xx pm), | + | :T2.1.2 Research (xx pm), |
Analyse and specify security technology task-technology-fit which deals with the alignment of technology, business model, security model, and privacy requirements into processes such that they overlap sufficiently with business model and the economic constraints. | Analyse and specify security technology task-technology-fit which deals with the alignment of technology, business model, security model, and privacy requirements into processes such that they overlap sufficiently with business model and the economic constraints. | ||
Deliverables | Deliverables | ||
* D3.1 and D4.1: The outcome will be contributions to D3.1 and D4.1 as technical reports and 3 conference paper. | * D3.1 and D4.1: The outcome will be contributions to D3.1 and D4.1 as technical reports and 3 conference paper. |
Revision as of 14:18, 17 August 2015
Security in IoT for Smart Grids | |||||||
---|---|---|---|---|---|---|---|
|
T2.1 Privacy-aware models
Task Title | Development of privacy-aware models and measures |
---|---|
WP | IoTSec:WP2 |
Lead partner | Simula |
Leader | |
Contributors | UNIK, NR, NCE Smart, Simula |
edit this task |
Objective
This task will establish privacy-aware models and related measures of privacy
Category:Task |
Deliverables in T2.1 Privacy-aware models
Title | Due month | Lead partner | Editor | Dissemination level | |
---|---|---|---|---|---|
D2.1.1 | Technical Report - Privacy Awareness (draft) | M12 | NR | Habtamu Abie | Restricted |
D2.1.2 | Privacy-preservation framework | M12 | SIMULA | Yan Zhang | Public |
D2.1.3 | Technical Report - Privacy Awareness (final) | M24 | NR | Habtamu Abie | Public |
D2.1.4 | Privacy-preservation yet accountable framework | M36 | SIMULA | Yan Zhang | Public |
Contributions
Yosh: Two challenges:
- To establish secure communication among the customers and the service providers
- To build privacy preserving yet accountable authentication framework among the entities in a distributed manner without relying on a trusted third party
Approaches
- Utilize competition between the service providers to build a reputation scheme and enforce cooperation among the providers to attract a larger number of consumers
- Study competition and cooperation between the service providers
- Develop analytical modeling focusing on the security and privacy issues in the smart grid, exploiting both cooperative and competitive frameworks.
Subtasks
- T2.1.1 Research (xx pm), 1 year Post Doc
Analyse and specify how to design and build privacy designs for metering and control of grid-connected devices and protocols with privacy design patterns; how to carry out risk analysis, privacy impact analysis, and how to deploy user-centric privacy technology.
Deliverables
- D1.1 and D2.1: The outcome will be construction of privacy by Design patterns for IoT applications and will be contributions to D1.1 and D2.1 as technical reports and 1 conference paper.
- T2.1.2 Research (xx pm),
Analyse and specify security technology task-technology-fit which deals with the alignment of technology, business model, security model, and privacy requirements into processes such that they overlap sufficiently with business model and the economic constraints.
Deliverables
- D3.1 and D4.1: The outcome will be contributions to D3.1 and D4.1 as technical reports and 3 conference paper.