Difference between revisions of "IoTSec:T2.1"

From its-wiki.no

Jump to: navigation, search
(Subtasks)
Line 18: Line 18:
  
 
== Subtasks ==  
 
== Subtasks ==  
:T2.1.1 Research (xx pm), 1 year Post Doc [lead by NR]
+
:T2.1.1 Research (xx pm), 1 year Post Doc  
 
Analyse and specify how to design and build privacy designs for metering and control of grid-connected devices and protocols with privacy design patterns; how to carry out risk analysis, privacy impact analysis, and how to deploy user-centric privacy technology.
 
Analyse and specify how to design and build privacy designs for metering and control of grid-connected devices and protocols with privacy design patterns; how to carry out risk analysis, privacy impact analysis, and how to deploy user-centric privacy technology.
  
Line 24: Line 24:
 
* D1.1 and D2.1: The outcome will be construction of privacy by Design patterns for IoT applications and will be contributions to D1.1 and D2.1 as technical reports and 1 conference paper.
 
* D1.1 and D2.1: The outcome will be construction of privacy by Design patterns for IoT applications and will be contributions to D1.1 and D2.1 as technical reports and 1 conference paper.
  
:T2.1.2 Research (xx pm), [lead by NR]
+
:T2.1.2 Research (xx pm),  
 
Analyse and specify security technology task-technology-fit which deals with the alignment of technology, business model, security model, and privacy requirements into processes such that they overlap sufficiently with business model and the economic constraints.  
 
Analyse and specify security technology task-technology-fit which deals with the alignment of technology, business model, security model, and privacy requirements into processes such that they overlap sufficiently with business model and the economic constraints.  
  
 
Deliverables
 
Deliverables
 
* D3.1 and D4.1: The outcome will be contributions to D3.1 and D4.1 as technical reports and 3 conference paper.
 
* D3.1 and D4.1: The outcome will be contributions to D3.1 and D4.1 as technical reports and 3 conference paper.

Revision as of 14:18, 17 August 2015

Security in IoT for Smart Grids
Home Research Security Centre Publications Student corner About
English-Language-icon.png

T2.1 Privacy-aware models

Task Title Development of privacy-aware models and measures
WP IoTSec:WP2
Lead partner Simula
Leader
Contributors UNIK, NR, NCE Smart, Simula
edit this task

Objective

This task will establish privacy-aware models and related measures of privacy

Category:Task


Deliverables in T2.1 Privacy-aware models

 TitleDue monthLead partnerEditorDissemination level
D2.1.1Technical Report - Privacy Awareness (draft)M12NRHabtamu AbieRestricted
D2.1.2Privacy-preservation frameworkM12SIMULAYan ZhangPublic
D2.1.3Technical Report - Privacy Awareness (final)M24NRHabtamu AbiePublic
D2.1.4Privacy-preservation yet accountable frameworkM36SIMULAYan ZhangPublic

Add Deliverable

Contributions

Yosh: Two challenges:

  • To establish secure communication among the customers and the service providers
  • To build privacy preserving yet accountable authentication framework among the entities in a distributed manner without relying on a trusted third party

Approaches

  • Utilize competition between the service providers to build a reputation scheme and enforce cooperation among the providers to attract a larger number of consumers
  • Study competition and cooperation between the service providers
  • Develop analytical modeling focusing on the security and privacy issues in the smart grid, exploiting both cooperative and competitive frameworks.

Subtasks

T2.1.1 Research (xx pm), 1 year Post Doc

Analyse and specify how to design and build privacy designs for metering and control of grid-connected devices and protocols with privacy design patterns; how to carry out risk analysis, privacy impact analysis, and how to deploy user-centric privacy technology.

Deliverables

  • D1.1 and D2.1: The outcome will be construction of privacy by Design patterns for IoT applications and will be contributions to D1.1 and D2.1 as technical reports and 1 conference paper.
T2.1.2 Research (xx pm),

Analyse and specify security technology task-technology-fit which deals with the alignment of technology, business model, security model, and privacy requirements into processes such that they overlap sufficiently with business model and the economic constraints.

Deliverables

  • D3.1 and D4.1: The outcome will be contributions to D3.1 and D4.1 as technical reports and 3 conference paper.