Blockchain Mechanism for Resolving Privacy Issues in a Smart City
Abstract With the continuous emergence of smart cities around the world, not only the economic development has been improved, but also the convenience of people's life has been improved. However, in the construction of smart cities, a large number of data references have been leaked, causing people to panic about privacy information. Firstly, this paper summarizes the security and privacy issues in smart city based on the literature about smart city and then summarizes the classification, characteristics and applications of blockchain applied in smart city. Finally, according to the wisdom of the city construction, according to the data acquisition, recording, and analysis of the privacy and security issues of wisdom city in the future were brought forward the research question, research methods in data security and data privacy, and data security and privacy protection for the study of wisdom city provided an important research direction, to fill the gaps in this field.KeywordsNetworkingCryptographicBlockchainPrivacySmart city
- Research Article
351
- 10.1109/access.2020.3009876
- Jan 1, 2020
- IEEE Access
The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world's digital economy are at the top of the tide. The continuous growth of data storage pressure drives the rapid development of the entire storage market on account of massive data generated. By providing data storage and management, cloud storage system becomes an indispensable part of the new era. Currently, the governments, enterprises and individual users are actively migrating their data to the cloud. Such a huge amount of data can create magnanimous wealth. However, this increases the possible risk, for instance, unauthorized access, data leakage, sensitive information disclosure and privacy disclosure. Although there are some studies on data security and privacy protection, there is still a lack of systematic surveys on the subject in cloud storage system. In this paper, we make a comprehensive review of the literatures on data security and privacy issues, data encryption technology, and applicable countermeasures in cloud storage system. Specifically, we first make an overview of cloud storage, including definition, classification, architecture and applications. Secondly, we give a detailed analysis on challenges and requirements of data security and privacy protection in cloud storage system. Thirdly, data encryption technologies and protection methods are summarized. Finally, we discuss several open research topics of data security for cloud storage.
- Research Article
- 10.54254/2754-1169/2024.19465
- Jan 6, 2025
- Advances in Economics, Management and Political Sciences
In recent years, the construction of smart cities has become a critical focus worldwide, as cities leverage digital solutions to address complex governance and societal challenges. This article discusses the achievements, challenges and how to optimize the construction path in the construction of smart cities in the construction of smart cities, and aims to provide reference and reference for other cities to build smart cities. The level of intelligence of urban governance in China is constantly improving, and it is gradually changing from traditional urban governance models to modern science and technology. In the process of the construction of smart cities, it exists to varying degrees as a pioneering city for the development of China's smart cities. Hangzhou has made significant progress in digital infrastructure, smart transportation, public service intelligence, and environmental management. However, with the rapid advancement of the construction of smart cities, Hangzhou still faces challenges in terms of data security and privacy protection, governance collaboration, digital gap and sustainable development.
- Book Chapter
3
- 10.4018/978-1-6684-3448-2.ch006
- Jun 24, 2022
Data privacy (also known as information privacy or data protection) refers to the legal right of the data subject to access, use, and collection of data. For the development of a digital economy, privacy protection and identity management are critical. The current regulatory framework's efficiency has been called into consideration from a legal standpoint. In both industry and academia, big data has become a hot issue for research. This chapter presents a succinct but comprehensive examination of data security and privacy issues at all phases of the data life cycle. The chapter then goes over some of the current solutions. Finally, this chapter discusses future research projects related to data security and privacy protection. It further explores other facets of the privacy problem that turn out to be critical for the broad adoption of privacy-enhancing technology, giving a more holistic picture of the situation.
- Research Article
2
- 10.1109/mwc.007.2100444
- Apr 1, 2022
- IEEE Wireless Communications
With the rapid development of the Internet of Things, a large number of mobile devices participate in the perception and aggregation of data, outsourcing and storing massive data on various cloud platforms. Thus, a new data perception and privacy protection model based on mobile group intelligence perception and cloud computing is required. The existing work on data security and privacy protection mainly focuses on the independent link of data collection, aggregation, and services, which lacks holistic consideration for the different service requirements. To end this issue, this article comprehensively integrates the security and privacy protection requirements of various stages in the mobile group intelligence perception for data collection, aggregation, and service from a global perspective. Aiming at data privacy and security issues in the existing mobile group intelligence perception system, and the difficulty in guaranteeing the quantity and quality of data at the same time, a mobile group intelligence perception mechanism oriented to user privacy and data security is proposed. This mechanism uses deep learning as its core algorithm to handle big data cases. It can provide authenticity and reliability guarantees for the subsequent data application on the premise of protecting user privacy. Experimental results prove that the mechanism proposed in this article meets the security requirements, and its user-end computing overhead is small.
- Research Article
20
- 10.1016/j.commtr.2022.100053
- Mar 10, 2022
- Communications in Transportation Research
With the known evidence that potential connected vehicle (CV) users are worried about sharing data because of the associated data privacy and security issues, this study investigates the importance of the reputation of the data manager (who collects, stores, and owns the data) of CV technology (CVT). Based on a questionnaire survey of 2400 US adults, this study asserts that the data manager's reputation has a significant impact on the public perception of data privacy and security issues in CVT along with overall CV acceptance. The results show that data privacy issues have a more negative impact on CV acceptance than data security issues. In addition, the reputation of a data manager has a bigger role in the eyes of the public in shaping their perception of data privacy in comparison to data security. Based on the results, the public considers data privacy as the responsibility of the data manager to protect their data from unauthorized/illegal third-party access, whereas data security is the technological strength of CVT to protect the data from hacking. Finally, it is recommended that CV stakeholders take actions to improve potential CV users' confidence in the privacy of data shared by disclosing the data management process, data privacy protection efforts, building public trust in the data manager, and introducing/enforcing laws regarding data privacy protection.
- Book Chapter
- 10.1007/978-981-15-2568-1_91
- Jan 1, 2020
In recent years, smart city has gradually become popular. Smart city of big data plays an active role in urban fine management, easing traffic jams, improving emergency security system, improving urban environment, eliminating information islands, etc. However, smart city management in big data environment is faced with data privacy protection issues, which is necessary in traditional smart city. There are three ways to protect the privacy of smart city in big data environment. One is to enhance the data security and privacy protection awareness of data managers from the moral level; the other is to formulate comprehensive data security and privacy protection laws from the legal level to prevent malicious data theft and abuse; the third is from the security technology level and incorporate the data protection algorithm into the smart city technology framework. In this article, according to the basic characteristics of smart city of big data, on the basis of the basic technical framework of big data smart city, from the three important aspects of big data storage, search and calculation, respectively, big data privacy protection is included in the basic technical framework to improve the privacy protection of smart city.
- Book Chapter
1
- 10.1007/978-3-030-51103-6_5
- Jan 1, 2020
In order to improve the security of online social network security and privacy data and shorten the delay of privacy data protection, this paper proposes a method of online social network security and privacy data protection in the era of big data. In order to enhance the security of online social network security and privacy data, a network security and privacy data architecture is constructed. In view of the risk of online social network security and privacy data loss, this paper proposes a set of security and privacy data backup processing scheme. Complete the formulation of online social network security and privacy data protection scheme; Combined with the current attack methods commonly used by attackers, the shortcomings of the traditional privacy protection algorithm in protecting the security of online social network privacy data security are concluded. Design online social network security privacy data privacy protection algorithm; Finally, complete homomorphic encryption of online social network security and privacy data is adopted to realize online social network security and privacy data protection in the era of big data. Experimental results show that the proposed privacy data protection method has a shorter delay than the traditional one.
- Research Article
44
- 10.1016/j.eti.2021.101381
- Jan 18, 2021
- Environmental Technology & Innovation
Rational planning and urban governance based on smart cities and big data
- Research Article
4
- 10.1088/1742-6596/1883/1/012144
- Apr 1, 2021
- Journal of Physics: Conference Series
In the process of rapid development of information technology, to promote the further construction of new smart cities, comprehensive utilization of cloud computing technology, big data technology and Internet of Things technology will help improve the convenience of residents’ lives. The development of blockchain technology provides more possibilities for the construction of new smart cities. The use of blockchain and other new technologies to build a smart city big data platform can realize a point-to-point communication mechanism. At the same time, this can also establish a more reliable trust agreement. It is conducive to the realization of applications such as smart IoT, government affairs, and big data. Using the blockchain big data platform to build a new type of smart city can break information islands and achieve the purpose of data sharing and information security. This is a key issue that must be paid attention to in the current construction of new smart cities. In this link, it is necessary to strengthen the research and analysis of blockchain technology to understand the problems that exist in the process of building a smart city on a big data platform. This article discusses the application advantages and related strategies of a smart city big data platform based on blockchain technology.
- Preprint Article
- 10.2196/preprints.50715
- Jul 10, 2023
BACKGROUND Mobile health (mHealth) apps have the potential to enhance health care service delivery. However, concerns regarding patients’ confidentiality, privacy, and security consistently affect the adoption of mHealth apps. Despite this, no review has comprehensively summarized the findings of studies on this subject matter. OBJECTIVE This systematic review aims to investigate patients’ perspectives and awareness of the confidentiality, privacy, and security of the data collected through mHealth apps. METHODS Using the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines, a comprehensive literature search was conducted in 3 electronic databases: PubMed, Ovid, and ScienceDirect. All the retrieved articles were screened according to specific inclusion criteria to select relevant articles published between 2014 and 2022. RESULTS A total of 33 articles exploring mHealth patients’ perspectives and awareness of data privacy, security, and confidentiality issues and the associated factors were included in this systematic review. Thematic analyses of the retrieved data led to the synthesis of 4 themes: concerns about data privacy, confidentiality, and security; awareness; facilitators and enablers; and associated factors. Patients showed discordant and concordant perspectives regarding data privacy, security, and confidentiality, as well as suggesting approaches to improve the use of mHealth apps (facilitators), such as protection of personal data, ensuring that health status or medical conditions are not mentioned, brief training or education on data security, and assuring data confidentiality and privacy. Similarly, awareness of the subject matter differed across the studies, suggesting the need to improve patients’ awareness of data security and privacy. Older patients, those with a history of experiencing data breaches, and those belonging to the higher-income class were more likely to raise concerns about the data security and privacy of mHealth apps. These concerns were not frequent among patients with higher satisfaction levels and those who perceived the data type to be less sensitive. CONCLUSIONS Patients expressed diverse views on mHealth apps’ privacy, security, and confidentiality, with some of the issues raised affecting technology use. These findings may assist mHealth app developers and other stakeholders in improving patients’ awareness and adjusting current privacy and security features in mHealth apps to enhance their adoption and use. CLINICALTRIAL PROSPERO CRD42023456658; https://tinyurl.com/ytnjtmca
- Supplementary Content
45
- 10.2196/50715
- May 31, 2024
- Journal of Medical Internet Research
BackgroundMobile health (mHealth) apps have the potential to enhance health care service delivery. However, concerns regarding patients’ confidentiality, privacy, and security consistently affect the adoption of mHealth apps. Despite this, no review has comprehensively summarized the findings of studies on this subject matter.ObjectiveThis systematic review aims to investigate patients’ perspectives and awareness of the confidentiality, privacy, and security of the data collected through mHealth apps.MethodsUsing the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines, a comprehensive literature search was conducted in 3 electronic databases: PubMed, Ovid, and ScienceDirect. All the retrieved articles were screened according to specific inclusion criteria to select relevant articles published between 2014 and 2022.ResultsA total of 33 articles exploring mHealth patients’ perspectives and awareness of data privacy, security, and confidentiality issues and the associated factors were included in this systematic review. Thematic analyses of the retrieved data led to the synthesis of 4 themes: concerns about data privacy, confidentiality, and security; awareness; facilitators and enablers; and associated factors. Patients showed discordant and concordant perspectives regarding data privacy, security, and confidentiality, as well as suggesting approaches to improve the use of mHealth apps (facilitators), such as protection of personal data, ensuring that health status or medical conditions are not mentioned, brief training or education on data security, and assuring data confidentiality and privacy. Similarly, awareness of the subject matter differed across the studies, suggesting the need to improve patients’ awareness of data security and privacy. Older patients, those with a history of experiencing data breaches, and those belonging to the higher-income class were more likely to raise concerns about the data security and privacy of mHealth apps. These concerns were not frequent among patients with higher satisfaction levels and those who perceived the data type to be less sensitive.ConclusionsPatients expressed diverse views on mHealth apps’ privacy, security, and confidentiality, with some of the issues raised affecting technology use. These findings may assist mHealth app developers and other stakeholders in improving patients’ awareness and adjusting current privacy and security features in mHealth apps to enhance their adoption and use.Trial RegistrationPROSPERO CRD42023456658; https://tinyurl.com/ytnjtmca
- Conference Article
3
- 10.1109/ccisp52774.2021.9639253
- Nov 1, 2021
Due to the incompleteness of planning ideas and construction methods, there are many problems in urban construction: the planning lacks prospectiveness, does not match the development needs of the city, and repeated construction is common; the community has insufficient functions and transportation. Therefore, it is of great significance to explore the path of smart city construction and development. This article mainly studies the application of intelligent logistics technology and big data in the construction and development of smart cities. Starting from the two main theories of theory and reality, this article first discusses the challenges of the big data era background to urban construction, analyzes the relationship between big data and smart cities, and then takes urban logistics big data as an object to study smart city construction. The smart logistics technology pointed out the convenience brought by the smart logistics technology and big data technology in the construction of smart cities. Finally, by drawing on the advanced experience of using big data in some cities at home and abroad to promote the construction of smart cities, the use of big data and smart logistics Technology assists the construction of smart cities, and has made concrete and detailed suggestions. The experimental results of this paper show that the group size is 60, the number of iterations is 30, and the minimum logistics cost through iteration is 1,284,100 yuan. In this paper, the logistics management method of intelligent logistics technology based on big data can minimize the logistics cost. This article provides some theoretical guidance for the key technical aspects of logistics network warehousing, service and resource management in the construction and development of smart cities, and provides guarantee for urban construction and stable development, which has certain reference significance for better and longer-term development.
- Book Chapter
2
- 10.5772/intechopen.115076
- Oct 2, 2024
This chapter explores how data security and privacy issues affect the deployment of integrated systems, in cities. It discusses concerns, such as access, data breaches, consent mechanisms, data profiling, third party data sharing, transparency, data accuracy, cross border data transfers, rights of individuals regarding their data, security measures for data protection, and intrusive technologies, that invade privacy. The chapter thoroughly examines the impact of these concerns on integrated systems by highlighting risks like diminishing trust, legal and regulatory hurdles, and negative effects on individual rights and freedoms. Additionally, it delves into strategies and best practices for addressing data security and privacy issues in smart city initiatives. The importance of involving stakeholders conducting privacy impact assessments implementing privacy by design principles and adopting user centric approaches to mitigate risks and safeguard privacy is underscored. By emphasizing the role of addressing data security and privacy concerns in integrating systems within city’s infrastructures provides valuable insights for stakeholders involved in smart city projects. Policymakers and researchers can benefit from this information to navigate the realm of data protection, within the realm of city development.
- Conference Article
2
- 10.1145/3291801.3291820
- Oct 27, 2018
With the rapid development of computer science, Internet and information technology, the application scale of network is expanding constantly, and the data volume is increasing day by day. Therefore, the demand for data processing needs to be improved urgently, and Cloud computing and big data technology as the product of the development of computer networks came into being. However, the following data collection, storage, and the security and privacy issues in the process of use are faced with many risks. How to protect the security and privacy of cloud data has become one of the urgent problems to be solved. Aiming at the problem of security and privacy of data in cloud computing environment, the security of the data is ensured from two aspects: the storage scheme and the encryption mode of the cloud data.
- Conference Article
10
- 10.1109/iot-siu.2018.8519858
- Feb 1, 2018
BIG DATA is one of the emerging domain and performing a key role under several applications like, smart city, smart grid and intelligent transportation system, etc. In order to provide the real time services, Big Data has achieved a great success on the other side its counterpart is facing lot of challenges of privacy and security. Keeping in the view of real time access and services, security and privacy issues need to be given the highest priority. Personal and professional information's of an individual or an organization are globally available through cloud storage, which attract the attacker(s) and can be misused. Social media is very active and popular among the young generation, movement of very heavy traffic is involving under social environment, smart attackers capture the personal information from social environment and may create the problems against required information. As per the literature review number of proposals is available for the above mentioned issues but there is no guarantee of data privacy and security, therefore, still lot of scope is there for optimal or sub-optimal solutions. Motive of this study is to investigate the different challenges of big data for privacy and security through Indian prospective. We have collected the existing solutions for data privacy and security, and performed a comprehensive review by including their pros and cons. Impact areas of different cyber attacks have been investigated and covered in details. This study is not only preventing the data from fraud but also interested in knowing the culprit behind this fraud/attack.
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.