Difference between revisions of "IoTSec:T2.1"
From its-wiki.no
Josef.Noll (Talk | contribs) |
(→Expected outcome) |
||
Line 18: | Line 18: | ||
The task expects to deliver | The task expects to deliver | ||
* [[has result::xxxxxxx ]] | * [[has result::xxxxxxx ]] | ||
− | + | * construction of privacy by Design patterns for IoT applications and the deployment of user-centric privacy technology. | |
+ | * security technology analysis and specifification | ||
+ | * cooperation and competition framework among different players in the smart grid | ||
+ | * Trust scheme based privacy and security solutions for the smart grid. | ||
For the a more detailed approach, see [[IoTAdmin:T2.1]] | For the a more detailed approach, see [[IoTAdmin:T2.1]] |
Revision as of 08:27, 31 August 2015
Security in IoT for Smart Grids | |||||||
---|---|---|---|---|---|---|---|
|
T2.1 Privacy-aware models
Task Title | Development of privacy-aware models and measures |
---|---|
WP | IoTSec:WP2 |
Lead partner | Simula |
Leader | |
Contributors | UNIK, NR, NCE Smart, Simula |
edit this task |
Objective
This task will establish privacy-aware models and related measures of privacy. It will also introduce privacy design patterns for industrial devices and programs. The task will also address security models for business interactions between shareholders.
Category:Task |
Deliverables in T2.1 Privacy-aware models
Title | Due month | Lead partner | Editor | Dissemination level | |
---|---|---|---|---|---|
D2.1.1 | Technical Report - Privacy Awareness (draft) | M12 | NR | Habtamu Abie | Restricted |
D2.1.2 | Privacy-preservation framework | M12 | SIMULA | Yan Zhang | Public |
D2.1.3 | Technical Report - Privacy Awareness (final) | M24 | NR | Habtamu Abie | Public |
D2.1.4 | Privacy-preservation yet accountable framework | M36 | SIMULA | Yan Zhang | Public |
= Detailed objectives
In this task, we will build privacy-preserving yet accountable authentication framework among the key entities in a distributed manner without relying on a trusted their party. We will also design and build privacy designs for metering and control of grid-connected devices and protocols with privacy design patterns. In addition, ww will carry out risk analysis, privacy impact analysis, and deploy user-centric privacy technology. This will
- establish secure communication among the customers and the service providers, and also key players
- protect end users private information. Here, end users can be residential users, electric vehicle drivers, and business users in large office.
- efficiently handle communication failures while ensuring privacy
- build secure processes for business model, security model, and requirements
Expected outcome
The task expects to deliver
- xxxxxxx
- construction of privacy by Design patterns for IoT applications and the deployment of user-centric privacy technology.
- security technology analysis and specifification
- cooperation and competition framework among different players in the smart grid
- Trust scheme based privacy and security solutions for the smart grid.
For the a more detailed approach, see IoTAdmin:T2.1