skip to main content
10.1145/3313237.3313300acmotherconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

Principles for designed-in security and privacy for smart cities

Published:15 April 2019Publication History

ABSTRACT

This paper presents the design and implementation of a process for an exploratory study that identifies a set of principles for designed-in security and privacy for smart city projects from among Global City Teams Challenge (GCTC) - Smart and Secure Cities and Communities Challenge (SC3) participants. The study was conducted based on information from the National Institute of Standards and Technology (NIST) GCTC Action Clusters database and interactions with the project teams. A research process was developed and implemented, comprising the following three steps:

(1) Investigate project descriptions created by the project leads on the NIST GCTC database and other public sources;

(2) Gather additional input from volunteer GCTC collaborators; and

(3) Identify a set of governing principles commonly shared by examples of GCTC projects.

Based on the outcomes of this process, a set of common principles has been identified that enable designed-in security and privacy considerations among the projects: specific technology usage, implementation of a cybersecurity management process and framework, and cybersecurity expertise and public-private partnerships. Characteristics of planning and implementation of security and privacy considerations from four example GCTC projects are described and analyzed in detail to illustrate the process.

References

  1. PwC US. Smart Cities: Five Smart Steps to Cybersecurity. https://www.pwc.com/us/en/services/consulting/cybersecurity/library/broader-perspectives/smart-cities.html. Published Dec. 2017. Accessed on Nov 9, 2018.Google ScholarGoogle Scholar
  2. Lohrmann, Dan. Securing the Smart City. Government Technology. https://www.govtech.com/security/Securing-the-Samrt-City.html. Published April/May 2018. Accessed on Dec 17, 2018.Google ScholarGoogle Scholar
  3. Data Security Council of India: Nasscom Initiative. PwC India. Creating Cyber Secure Smart Cities. https//www.pwc.in/assets/pdfs/publications/2018/creating-cyber-secure-cities.pdf. Published 2018. Accessed on Dec 17. 2018Google ScholarGoogle Scholar
  4. NIST. Framework for Cyber-Physical Systems. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-201.pdf. Publish 2017. Accessed on Nov 10, 2018.Google ScholarGoogle Scholar
  5. NIST. Global City Teams Challenge. Smart and Secure Cities and Communities Challenge. http://pages.nist.gov/GCTC/. Accessed on Nov 6, 2018.Google ScholarGoogle Scholar
  6. SmartAmerica Challenge. https://smartamerica.org/. Accessed on Feb 7, 2019Google ScholarGoogle Scholar
  7. Rhee, S. Catalyzing the Internet of Things and Smart Cities: Global City Teams Challenge. 2016; 1st International Workshop on Science of Smart City Operations and Platforms Engineering in partnership with Global City Teams Challenge, Pages 1--4, Vienna, Austria, April 11, 2016, IEEE Explore Digital LibraryGoogle ScholarGoogle Scholar
  8. Global City Teams Challenge Action Cluster. https://gctc.opencommons.org/Category:ActionCluster. Accessed on Jan 31, 2019Google ScholarGoogle Scholar
  9. GCTC Wiki. CryptoMove San Leandro Smart Lights Project. https://gctc.opencommons.org/CryptoMove_San_Leandro_Smart_Lights_Project. Accessed on Feb 4, 2019Google ScholarGoogle Scholar
  10. ComputerWeekly.com. Open Information Security Maturity Model (O-ISM3). https://ww.computerweekly.comehandbook/Open-Information-Security-Maturity-Mode-O-ISM3. Published Jan. 2011. Accessed on February 2, 2019.Google ScholarGoogle Scholar
  11. Wikipedia contributors. OSSIM. Wikipedia. The Free Encyclopedia. January 7, 2019. https://en.wikipedia.org/w/index.php?titles=OSSIM&oldid=877265361. Accessed on February 2, 2019.Google ScholarGoogle Scholar
  12. GCTC Wiki. GENIVI Las Vegas Connected Vehicle Pilot Project. .https://gctc.opencommons.org/GENIVI_Las_Vegas_Connected_Vehicle_Pilot_Project. Accessed on Feb 4, 2019Google ScholarGoogle Scholar
  13. GCTC Wiki. Pittsburgh building portfolio cyber-secure, real-time utility data integration and AI analysis. https://gctc.opencommons.org/Pittsburgh_building_portfolio_cyber-secure,_realtime_utility_data_integration_and_AI_analysis. Accessed on Feb 4, 2019Google ScholarGoogle Scholar
  14. GCTC Wiki. Underground Infrastructure Sensing and Mapping. https://gctc.opencommons.org/Underground_Infrastructure_Sensing_and_Mapping. Accessed on Feb 4, 2019Google ScholarGoogle Scholar
  15. NIST. An Introduction to the Components of the Framework. Cybersecurity Framework. http://www.nist.gov/cyberframewwork/online-learning/components-framework. Accessed on Nov 6, 2018.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SCOPE '19: Proceedings of the Fourth Workshop on International Science of Smart City Operations and Platforms Engineering
    April 2019
    59 pages
    ISBN:9781450367035
    DOI:10.1145/3313237

    Copyright © 2019 ACM

    © 2019 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 15 April 2019

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader