5. SMART CITY ARCHITECTURE
Applications
satellite imagery, aerial mapping, GPS, building management system,
CCTV, GIS
Information
user, document, industry, business, revenue, circulation
Management
Integration of communication protocols
Wireless, Bluetooth, Wi-Fi, 3/4/5G, M2M, embedded network
5
6. EXAMPLES
• Smart grids and smart metering
• Intelligence transportation
• Smart and connected healthcare
• Public safety and emergency services
• Wireless connection
• Intelligent buildings
6
7. SENSITIVE DATA IN THE CLOUD
Personally Identifiable Information examples
• Geolocation data
• Medical records
• Banking and insurance records
• Emails and other instant communication
Any serious breach will cause financial, data,
credibility and reputational loss or damage
9. CONCERNS IN SMART CITY
Data
collector/owner
•Outsourcing:
How to select
a cloud vendor?
•How to
maintain
direct control
to safeguard
data integrity?
Cloud service
providers
•How to satisfy
data residency
and privacy
requirements
•How to remain
flexible and
provide cost-effective
service?
Regulator
•Formulation of
relevant
standards and
practices
•How to ensure
adoption and
compliance?
•Would
sensitive data
end up
overseas?
End-users
•Are my data
safe in the
cloud?
•Would I know
if there is
security or
privacy breach?
10. 3 KEY ISSUES
Security
Is the data
protected from
theft, leakage,
spying or attacks?
What is the level
of control and
protection?
Residency
Where is the
data stored?
geographically
disbursed?
What to do with
data in transit &
outside territory?
Privacy
Who can see
personally
identifiable
information (PII)?
Storing,
transferring,
locating and
protecting PII
11. Challenges
of smart
city
services
Maintaining
ownership and
control of data
Info on 3rd
party service
and distributed
infrastructure
Deliver
resiliency,
availability and
flexibility of
smart services
12. MAIN CAUSES OF DATA BREACHES
System glitches Malicious attacks Human factor
12
29% 36% 35%
Source: 2013 Cost of Data Breach Study: Global Analysis“
by Symantec and the Ponemon Institute.
16. HOW? SECURITY BY DESIGN
• Educate people, improve governance and compliance
• Identify critical data
• Disaster Recovery and Continuity
• Breach notification and data residency
• Data management at rest
• Data protection in motion
• Encryption key management
• Identification and Access controls
• Long-term resiliency of the encryption system
16
an evolution of Smart Cities
the concept of Smart Cities has become an urgent necessity.
an urban transformation which, using latest ICT technologies, makes cities more efficient
Increase use of Smart energy meters, security devices and smart appliances
create new economic and social opportunities, pose challenges to our security and expectations of privacy
infrastructures and services are changing with new interconnected systems for monitoring, control and automation
Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates
key challenges
conscious to include privacy and security requirements into architectural designs from the very beginning
What to do??? Emerging standards
Security
illegal access to information
attacks causing physical disruptions in service availability
digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear.