Privacy and Security in Cognitive Cities: A Systematic Review
Abstract
:Featured Application
Abstract
1. Introduction
- In a regular city, traffic lights are hardwired, and their behavior is fixed: if a change is needed, controls have to be rewired.
- In a smart city, traffic lights react to the data coming from nearby sensors to regulate the flow of traffic, and to provide an efficient response when needed, such as in case of traffic incidents.
- In a cognitive city, traffic lights learn from humans and vehicles passing by, generate hypothesis about the future, and evaluate the possible consequences of their decisions. Hence, they are no longer reactive, but proactive.
1.1. Privacy and Security in the Cognitive City
- Following the news of a cognitive city app being hacked, the citizens become reluctant to participate in the cognitive city project that the government is developing. Despite all the funds and high-end technology involved, the project fails.
- A cognitive transportation system provides unmanned vehicles with alternate routes, sensing the status of the transport network and vehicles in real time, by making a trade-off between the best routes and user preferences and learned routines. Unfortunately, due to a bug in the communications protocol, the gateway misses one in five sensors readings. As the system does not validate inputs, it keeps recommending the same routes, regardless of their actual status.
- A participatory government platform feeds a data model to make automatic decisions. A malicious chatbot is introduced to alter the algorithm input. Final decisions do not reflect the will of citizens.
- An error with a faulty sensor makes the water pump feedback mechanism to inject ten times more chlorine into the tap water system. Thousands of citizens get sick.
- Terrorists hack into a self-driving car, weaponizing it. The car runs into the crowd. Fifty people die.
1.2. Contribution and Plan of the Article
- RQ1: Which focus has been used in the scientific literature to address the information security and privacy aspects of cognitive cities (i.e., technical, social, regulatory)?
- RQ2: What are the challenges that have been identified in the field?
- RQ3: What do authors have proposed to address those challenges?
- RQ4: Which issues remain open?
- Population: peer-reviewed published studies.
- Intervention: privacy and information security in cognitive cities.
- Compared: with works selected by issue type, issue category, proposals made, and focus.
- Outcome: privacy and information security in the context of cognitive cities research: focus, challenges, and proposals.
2. Methodology
2.1. Definition of the Review Scope
- Focus: It represents the pivotal area of interest, and it could include: research theories, outcomes, methods, and/or applications. Given the relevance of the topic, we are interested in getting a wide understanding of the field. Therefore, our literature review focuses on all types of academic articles, ranging from theoretical to practical ones.
- Goal: It represents the overall goals that authors aim to accomplish with the review. In particular, we aim to synthesize past literature and to investigate which approaches have been used by the scientific community to address the security and privacy aspects of cognitive cities, what are the challenges identified in the field, and what do authors have proposed to address those challenges.
- Organization: The review is organized using a conceptual structure, i.e., grouping the same ideas.
- Perspective: This category refers to the point of view used by the authors to discuss the literature. In this review, we adopt a neutral but critical position, that is: we have analyzed the articles and then studied them critically.
- Audience: This review is intended for researchers in the field of cognitive cities.
- Coverage: With the aim to include and analyze relevant contributions, an exhaustive coverage of the available scientific literature on the topic is considered.
2.2. Topic Conceptualization
“Information Security is a multidisciplinary area of study and professional activity which is concerned with the development and implementation of security mechanisms of all available types (technical, organizational, human-oriented and legal) to keep information in all its locations (within and outside the organization’s perimeter) and, consequently, information systems, where information is created, processed, stored, transmitted and destructed, free from threats. Threats to information and information systems may be categorised and a corresponding security goal may be defined for each category of threats. A set of security goals, identified as a result of a threat analysis, should be revised periodically to ensure its adequacy and conformance with the evolving environment. The currently relevant set of security goals may include: confidentiality, integrity, availability, privacy, authenticity & trustworthiness, non-repudiation, accountability and auditability.” [43] (p. 191).
2.3. Literature Search
2.3.1. Database Selection
2.3.2. Keyword Search
ALL (( “cognitive city” OR “cognitive cities”) AND (“security” OR “privacy” OR “confidentiality” OR “integrity” OR “availability” OR “authenticity” OR “trustworthiness” OR “non-repudiation” OR “accountability” OR “auditability”))
- S1 was used to query the ACM Digital Library, with the advanced search feature and selecting Anywhere on the Search Within combo.
- S2 was used to query the IEEEXplore, with the command search feature.
- S3 was used to query the Scopus database with the advanced search feature.
- S4 was used to query the Web of Science database with the advanced search feature.
2.3.3. Literature Evaluation
- Step 1: We removed duplicate publications.
- Step 2: We performed an abstract and full-text screening to limit the literature review to only those articles that fulfilled the inclusion criteria. During the screening, we classified each article as: 1, accepted (i.e., the article is relevant, according to the inclusion criteria) or 0, rejected (i.e., the article is not relevant according to the inclusion criteria).
2.3.4. Backward and Forward Search
2.4. Literature Analysis and Synthesis
2.5. Research Agenda
3. Results
3.1. Security and Privacy Challenges
- Data integrity and quality issues: the use of truthful information for analytics and governing policies [46,48,49], protections from false data injection for ML algorithms [6,50,57], the difficulties of data quality testing caused by the variety and volume of data and data sources [48], and data quality and bias concerns resulting from removing context from data [49].
- The need for measuring and verifying the security of alternative systems architectures [54].
- Data misuse caused by the lack of transparency and accountability of UC [49].
- Privacy and threats to civil liberties: predictive capabilities as a threat to privacy and civil liberties [48], the dangers of profiling individuals [48], privacy problems can erode freedom of choice [49], the effects on freedom and liberty of the misuse or unauthorized use of cognitive systems and their insights [49], and the risk that these technologies become a surveillance and manipulation tool against the society [49].
- The lack of knowledge and understanding of these technologies [52].
3.2. Actionable Security and Privacy Proposals
4. Discussion
4.1. Privacy and Security Are Entangled
4.2. Dealing with Legacy Software and Hardware Updates
4.3. The Balance between Computational Power and Intelligence
4.4. The Role of the Physical Layer
4.5. Data Integrity Is Fundamental
4.6. A Unified View
- (i)
- that is built upon a formal description of the entities that constitute a cognitive city and their relations. This would require the creation of a cognitive city ontology.
- (ii)
- that is based on a multi-layered model of the cognitive city, from the technological and agent layers, to the social interaction and city-level layers.
- (iii)
- that encompasses all the stages in the life-cycle of cognitive products, processes, and services for the cognitive city, from the design and build phases, to the operation, monitoring, repairing, and disposal stages.
- (iv)
- that takes into account the potential privacy and security risks that can arise in every phase and architecture layer.
- (v)
- that includes a new specific threat model for cognitive cities, which should include goals, threat actors, attack vectors, and fault trees.
- (vi)
- that includes metrics and risk assessment models to evaluate privacy and security at several levels (per individual, per building, per system, per district, etc.). These metrics should take into account the perspectives of several stakeholders, such as cognitive systems’ manufacturers, infrastructures’ providers, cities’ councils, and citizens’ fellowships, and balance their needs and requirements by using multi-criteria decision-making methods [79].
4.7. User Awareness and Willingness to Share
4.8. Monitoring and the Human Factor
4.9. The Insider Threat
4.10. Regulations and Digital Evidence
5. Conclusions and Further Work
- Privacy and security are interwoven and one can hardly achieve one without the other. In this sense, Privacy-By-Design approaches are a necessary first step, but security cannot be forgotten, for privacy cannot be guaranteed on an insecure basis.
- Legacy software and hardware might be a problem if they are not properly maintained: ICT components will need to be maintained over their entire life-cycles up to their very disposal, and the interaction between newer and older devices should be carefully monitored so as to guarantee proper interoperability and avoid leakages.
- Cognitive cities are complex cyber-physical systems and the physical layer has a decisive role in guaranteeing the security and privacy of citizens, which might be achieved through continuous monitoring processes. Moreover, the inherent distributed and heterogeneous nature of cognitive cities creates a huge attack surface that is hard to protect. Hence, efforts must be devoted to coordinate and efficiently harmonise the functioning of diverse technologies and devices, probably by fostering the creation of international standards and certifications.
- Cognitive cities are funded on learning processes, thus, it is paramount to guarantee the integrity of the data used in training and learning procedures. Also, the intelligence of the city agents will largely depend on their computational capabilities, and efficiently balancing the use of computational and communication resources among agents to maximise resiliency will be fundamental.
- Despite the importance of technology, the most significant aspect of Cognitive Cities is the Human Factor: It is essential to reduce the digital divide and to raise awareness on the security and privacy risks, hence providing citizens with the proper tools to share their data, collaborate and keep themselves safe. Also, it is essential to privately monitor the human interactions with the cognitive city so as to reduce or even avert errors, and lessen risks of insider attacks, which could be timely detected and the authors prosecuted by using strong evidence satisfying the highest international standards.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Conflicts of Interest
Abbreviations
AHP | Analytic Hierarchy Process |
AI | Artificial Intelligence |
DNS | Domain Name System |
GDPR | General Data Protection Regulation |
IAM | Identity and Access Management |
ICT | Information and Communication Technologies |
IEC | International Electrotechnical Commission |
IoT | Internet of Things |
IRR | Inter-Rater Reliability |
ISO | International Organization for Standardization |
IUIPC | Intenet Users’ Information Privacy Concerns |
ML | Machine Learning |
PbD | Privacy by Design |
PRISMA | Preferred Reporting Elements for Systematic Reviews |
WoT | Web of Things |
SOC | Security Operations Center |
References
- Solanas, A.; Patsakis, C.; Conti, M.; Vlachos, I.S.; Ramos, V.; Falcone, F.; Postolache, O.; Perez-martinez, P.A.; Pietro, R.D.; Perrea, D.N.; et al. Smart health: A context-aware health paradigm within smart cities. IEEE Commun. Mag. 2014, 52, 74–81. [Google Scholar] [CrossRef]
- Hall, R.E.; Bowerman, B.; Braverman, J.; Taylor, J.; Todosow, H.; Von Wimmersperg, U. The Vision of a Smart City; Technical report; Brookhaven National Lab.: Upton, NY, USA, 2000. [Google Scholar]
- Siemens, G. Connectivism: A learning theory for the digital age. Int. J. Instr. Technol. Distance Learn. 2005, 2, 3–10. [Google Scholar]
- Mostashari, A.; Arnold, F.; Mansouri, M.; Finger, M. Cognitive Cities and Intelligent Urban Governance. Netw. Ind. Q. 2011, 13, 4–7. [Google Scholar]
- Machin, J.; Solanas, A. A Review on the Meaning of Cognitive Cities. In Proceedings of the 2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA), Zakynthos, Greece, 23–25 July 2018; pp. 1–5. [Google Scholar] [CrossRef]
- Machin, J.; Solanas, A. Conceptual Description of Nature-Inspired Cognitive Cities: Properties and Challenges. In Bioinspired Systems and Biomedical Applications to Machine Learning; Ferrández Vicente, J.M., Álvarez-Sánchez, J.R., de la Paz López, F., Toledo Moreo, J., Adeli, H., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 212–222. [Google Scholar] [CrossRef]
- Ashby, W.R. An Introduction to Cybernetics; Chapman & Hall Ltd.: London, UK, 1961. [Google Scholar]
- Hundepool, A.; Domingo-Ferrer, J.; Franconi, L.; Giessing, S.; Nordholt, E.S.; Spicer, K.; de Wolf, P.P. Statistical Disclosure Control; John Wiley & Sons: Hoboken, NJ, USA, 2012; pp. 1–288. [Google Scholar] [CrossRef]
- Machin, J. Triangulation-Based Multivariate Microaggregation. Master Thesis, Universitat Oberta de Catalunya, Barcelona, Spain, 2016. [Google Scholar]
- Cheng, L.; Liljestrand, H.; Ahmed, M.S.; Nyman, T.; Jaeger, T.; Asokan, N.; Yao, D. Exploitation Techniques and Defenses for Data-Oriented Attacks. In Proceedings of the 2019 IEEE Cybersecurity Development (SecDev), Tysons Corner, VA, USA, 23–25 September 2019; pp. 114–128. [Google Scholar] [CrossRef] [Green Version]
- Hern, A. Berlin artist uses 99 phones to trick Google into traffic jam alert. The Guardian. Available online: https://www.theguardian.com/technology/2020/feb/03/berlin-artist-uses-99-phones-trick-google-maps-traffic-jam-alert (accessed on 12 May 2021).
- Ijaz, S.; Shah, M.A.; Khan, A.; Ahmed, M. Smart cities: A survey on security concerns. Int. J. Adv. Comput. Sci. Appl. 2016, 7, 612–625. [Google Scholar] [CrossRef]
- Baig, Z.A.; Szewczyk, P.; Valli, C.; Rabadia, P.; Hannay, P.; Chernyshev, M.; Johnstone, M.; Kerai, P.; Ibrahim, A.; Sansurooah, K.; et al. Future challenges for smart cities: Cyber-security and digital forensics. Digit. Investig. 2017, 22, 3–13. [Google Scholar] [CrossRef]
- Hamid, B.; Jhanjhi, N.; Humayun, M.; Khan, A.; Alsayat, A. Cyber Security Issues and Challenges for Smart Cities: A survey. In Proceedings of the 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), Karachi, Pakistan, 14–15 December 2019; pp. 1–7. [Google Scholar] [CrossRef]
- Ismagilova, E.; Hughes, L.; Rana, N.P.; Dwivedi, Y.K. Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework. Inf. Syst. Front. 2020, 1–22. [Google Scholar] [CrossRef]
- Dener, M. Cyber Security for Smart Cities. Eurasia Proc. Sci. Technol. Eng. Math. 2019, 7, 249–252. [Google Scholar]
- Martinez-Balleste, A.; Perez-martinez, P.A.; Solanas, A. The pursuit of citizens’ privacy: A privacy-aware smart city is possible. IEEE Commun. Mag. 2013, 51, 136–141. [Google Scholar] [CrossRef]
- van Zoonen, L. Privacy concerns in smart cities. Gov. Inf. Q. 2016, 33, 472–480. [Google Scholar] [CrossRef] [Green Version]
- Zhang, K.; Ni, J.; Yang, K.; Liang, X.; Ren, J.; Shen, X.S. Security and Privacy in Smart City Applications: Challenges and Solutions. IEEE Commun. Mag. 2017, 55, 122–129. [Google Scholar] [CrossRef]
- Eckhoff, D.; Wagner, I. Privacy in the Smart City—Applications, Technologies, Challenges, and Solutions. IEEE Commun. Surv. Tutor. 2018, 20, 489–516. [Google Scholar] [CrossRef] [Green Version]
- Curzon, J.; Almehmadi, A.; El-Khatib, K. A survey of privacy enhancing technologies for smart cities. Pervasive Mob. Comput. 2019, 55, 76–95. [Google Scholar] [CrossRef]
- Barreno, M.; Nelson, B.; Joseph, A.D.; Tygar, J.D. The security of machine learning. Mach. Learn. 2010, 81, 121–148. [Google Scholar] [CrossRef] [Green Version]
- Liu, Q.; Li, P.; Zhao, W.; Cai, W.; Yu, S.; Leung, V.C.M. A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View. IEEE Access 2018, 6, 12103–12117. [Google Scholar] [CrossRef]
- Xue, M.; Yuan, C.; Wu, H.; Zhang, Y.; Liu, W. Machine Learning Security: Threats, Countermeasures, and Evaluations. IEEE Access 2020, 8, 74720–74742. [Google Scholar] [CrossRef]
- Nelson, B.; Olovsson, T. Security and privacy for big data: A systematic literature review. In Proceedings of the 2016 IEEE International Conference on Big Data (Big Data), Washington, DC, USA, 5–8 December 2016; pp. 3693–3702. [Google Scholar] [CrossRef]
- Binjubeir, M.; Ahmed, A.A.; Ismail, M.A.B.; Sadiq, A.S.; Khurram Khan, M. Comprehensive Survey on Big Data Privacy Protection. IEEE Access 2020, 8, 20067–20079. [Google Scholar] [CrossRef]
- Salleh, K.A.; Janczewski, L. Technological, Organizational and Environmental Security and Privacy Issues of Big Data: A Literature Review. Procedia Comput. Sci. 2016, 100, 19–28. [Google Scholar] [CrossRef] [Green Version]
- Aleisa, N.; Renaud, K. Privacy of the Internet of Things: A Systematic Literature Review. In Proceedings of the 50th Hawaii International Conference on System Sciences (2017), Hilton Waikoloa Village, HI, USA, 4–7 January 2017; pp. 5947–5956. [Google Scholar] [CrossRef] [Green Version]
- Abi Sen, A.A.; Eassa, F.A.; Jambi, K.; Yamin, M. Preserving privacy in internet of things: A survey. Int. J. Inf. Technol. 2018, 10, 189–200. [Google Scholar] [CrossRef]
- Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
- Grover, J.; Shikha; Sharma, M. Cloud computing and its security issues—A review. In Proceedings of the Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Hefei, China, 11–13 July 2014; pp. 1–5. [Google Scholar] [CrossRef]
- Chiregi, M.; Jafari Navimipour, N. Cloud computing and trust evaluation: A systematic literature review of the state-of-the-art mechanisms. J. Electr. Syst. Inf. Technol. 2018, 5, 608–622. [Google Scholar] [CrossRef]
- Kaur, J.; Agrawal, A.; Khan, R.A. Security Issues in Fog Environment: A Systematic Literature Review. Int. J. Wirel. Inf. Netw. 2020, 27, 467–483. [Google Scholar] [CrossRef]
- O’Driscoll, C. Privacy in context: Privacy issues in Ubiquitous Computing applications. In Proceedings of the 2008 Third International Conference on Digital Information Management, London, UK, 13–16 November 2008; pp. 827–837. [Google Scholar] [CrossRef]
- Ema, K.; Mark, S. A decade of security research in ubiquitous computing: Results of a systematic literature review. Int. J. Pervasive Comput. Commun. 2016, 12, 216–259. [Google Scholar] [CrossRef]
- López, G.; Marín, G.; Calderón, M. Human aspects of ubiquitous computing: A study addressing willingness to use it and privacy issues. J. Ambient. Intell. Humaniz. Comput. 2017, 8, 497–511. [Google Scholar] [CrossRef]
- Santos, C.M.d.C.; Pimenta, C.A.d.M.; Nobre, M.R.C. The PICO strategy for the research question construction and evidence search. Rev. Lat. Am. Enferm. 2007, 15, 508–511. [Google Scholar] [CrossRef] [Green Version]
- Vom Brocke, J.; Simons, A.; Niehaves, B.; Riemer, K.; Plattfaut, R.; Cleven, A. Reconstructing the giant: On the importance of rigour in documenting the literature search process. In Proceedings of the 17th European Conference on Information Systems, ECIS 2009. Association for Information Systems, Verona, Italy, 8–10 June 2009; Volume 9, pp. 2206–2217. [Google Scholar]
- Webster, J.; Watson, R.T. Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Q. 2002, 26, xiii–xxiii. [Google Scholar]
- Cooper, H.M. Organizing knowledge syntheses: A taxonomy of literature reviews. Knowl. Technol. Policy 1988, 1, 104–126. [Google Scholar] [CrossRef]
- International Organization for Standardization. ISO/IEC 27000:2018(E): Information Technology—Security Techniques—Information Security Management Systems—Overview and Vocabulary (2018) Standard; International Organization for Standardization: Geneva, Switzerland, 2018; p. 27. [Google Scholar]
- Cherdantseva, J.; Hilton, Y. Understanding information assurance and security. J. Organ. End User Comput. 2015, 16, 1. [Google Scholar]
- Cherdantseva, Y.; Hilton, J. Information security and information assurance: Discussion about the meaning, scope, and goals. In Organizational, Legal, and Technological Dimensions of Information System Administration; IGI Global: Hershey, PA, USA, 2013; pp. 167–198. [Google Scholar] [CrossRef] [Green Version]
- Council of Europe/European Court of Human Rights. Guide on Article 8 of the European Convention on Human Rights; European Court of Human Rights: Strasbourg, France, 2019. [Google Scholar]
- Moher, D.; Liberati, A.; Tetzlaff, J.; Altman, D.G.; Group, T.P. Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement. PLoS Med. 2009, 6, 1–6. [Google Scholar] [CrossRef] [Green Version]
- Mansouri, M.; Khansari, N. A conceptual model for intelligent urban governance: Influencing energy behaviour in cognitive cities. Stud. Syst. Decis. Control 2019, 176, 185–202. [Google Scholar] [CrossRef]
- D’Onofrio, S.; Franzelli, S.; Portmann, E. Advancing cognitive cities with the web of things. Stud. Comput. Intell. 2018, 715, 75–91. [Google Scholar] [CrossRef]
- Morabito, V. Big Data and Analytics for Government Innovation. In Big Data and Analytics: Strategic and Organizational Impacts; Springer International Publishing: Cham, Switzerland, 2015; pp. 23–45. [Google Scholar] [CrossRef]
- Cavoukian, A.; Chibba, M. Cognitive cities, big data and citizen participation: The essentials of privacy and security. In Towards Cognitive Cities: Advances in Cognitive Computing and Its Application to the Governance of Large Urban Systems (Studies in Systems, Decision and Control (63)); Portmann, E., Finger, M., Eds.; Springer International Publishing: Cham, Switzerland, 2016; Volume 63, pp. 61–82. [Google Scholar] [CrossRef]
- Mohammadi, M.; Al-Fuqaha, A. Enabling Cognitive Smart Cities Using Big Data and Machine Learning: Approaches and Challenges. IEEE Commun. Mag. 2018, 56, 94–101. [Google Scholar] [CrossRef] [Green Version]
- Kaltenrieder, P.; Portmann, E.; D’onofrio, S. Enhancing multidirectional communication for cognitive cities. In Proceedings of the 2015 Second International Conference on eDemocracy eGovernment (ICEDEG), Quito, Ecuador, 8–10 April 2015; pp. 38–43. [Google Scholar] [CrossRef]
- Moyser, R.; Uffer, S. From smart to cognitive: A roadmap for the adoption of technology in cities. Stud. Syst. Decis. Control 2016, 63, 13–35. [Google Scholar] [CrossRef]
- Kaltenrieder, P.; Portmann, E.; Myrach, T. Fuzzy knowledge representation in cognitive cities. In Proceedings of the IEEE International Conference on Fuzzy Systems, Istanbul, Turkey, 2–5 August 2015. [Google Scholar] [CrossRef]
- Bayuk, J.L.; Mostashari, A. Measuring cyber security in intelligent urban infrastructure systems. In Proceedings of the 2011 8th International Conference and Expo on Emerging Technologies for a Smarter World, Hauppauge, NY, USA, 2–3 November 2011; pp. 1–6. [Google Scholar] [CrossRef]
- Vlacheas, P.; Giaffreda, R.; Stavroulaki, V.; Kelaidonis, D.; Foteinos, V.; Poulios, G.; Demestichas, P.; Somov, A.; Biswas, A.; Moessner, K. Enabling smart cities through a cognitive management framework for the internet of things. IEEE Commun. Mag. 2013, 51, 102–111. [Google Scholar] [CrossRef]
- Kaltenrieder, P.; Papageorgiou, E.; Portmann, E. Digital personal assistant for cognitive cities: A paper prototype. Stud. Syst. Decis. Control 2016, 63, 101–121. [Google Scholar] [CrossRef]
- Al-Turjman, F.; Houdjedj, A. Learning in Cities’ Cloud-Based IoT; CRC Press: Boca Raton, FL, USA, 2019; pp. 209–234. [Google Scholar]
- D’Onofrio, S.; Papageorgiou, E.; Portmann, E. Using fuzzy cognitive maps to arouse learning processes in cities. Stud. Syst. Decis. Control 2019, 176, 107–130. [Google Scholar] [CrossRef]
- Machin, J.; Batista, E.; Martinez-Balleste, A.; Solanas, A. Dataset Privacy and Security in Cognitive Cities: A Systematic Review. Mendeley Data 2020. [Google Scholar] [CrossRef]
- Liu, Z.; Cai, L.; Hu, Y. Research on software quality evaluation for application of smart city. In Proceedings of the 2015 4th International Conference on Computer Science and Network Technology, Harbin, China, 19–20 December 2015; Volume 1, pp. 198–202. [Google Scholar] [CrossRef]
- Cohen, J. A Coefficient of Agreement for Nominal Scales. Educ. Psychol. Meas. 1960, 20, 37–46. [Google Scholar] [CrossRef]
- Tomko, G.J.; Borrett, D.S.; Kwan, H.C.; Steffan, G. SmartData: Make the data “think” for itself. Identity Inf. Soc. 2010, 3, 343–362. [Google Scholar] [CrossRef] [Green Version]
- Duquennoy, S.; Grimaud, G.; Vandewalle, J.J. The web of things: Interconnecting devices with high usability and performance. In Proceedings of the 2009 International Conference on Embedded Software and Systems, Hangzhou, China, 25–27 May 2009; pp. 323–330. [Google Scholar] [CrossRef] [Green Version]
- Rashwan, H.A.; Solanas, A.; Puig, D.; Martínez-Ballesté, A. Understanding trust in privacy-aware video surveillance systems. Int. J. Inf. Secur. 2016, 15, 225–234. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://nakamotoinstitute.org/bitcoin/ (accessed on 12 May 2021).
- Ali, M.S.; Vecchio, M.; Pincheira, M.; Dolui, K.; Antonelli, F.; Rehmani, M.H. Applications of Blockchains in the Internet of Things: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2019, 21, 1676–1717. [Google Scholar] [CrossRef]
- Quad 9. Quad9 Frequently Asked Questions. Available online: https://www.quad9.net/faq/#How_does_Quad9_protect_me_from_malicious_domains (accessed on 12 May 2021).
- Hussain, F.; Hussain, R.; Hassan, S.A.; Hossain, E. Machine Learning in IoT Security: Current Solutions and Future Challenges. IEEE Commun. Surv. Tutor. 2020, 22, 1686–1721. [Google Scholar] [CrossRef] [Green Version]
- Song, L.; Shokri, R.; Mittal, P. Privacy Risks of Securing Machine Learning Models against Adversarial Examples. In CCS ’19, Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 241–257. [Google Scholar] [CrossRef] [Green Version]
- Kwon, H.; Kim, Y.; Yoon, H.; Choi, D. Selective audio adversarial example in evasion attack on speech recognition system. IEEE Trans. Inf. Forensics Secur. 2019, 15, 526–538. [Google Scholar] [CrossRef]
- Kwon, H.; Yoon, H.; Park, K.W. Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system. Neurocomputing 2020, 417, 357–370. [Google Scholar] [CrossRef]
- Kephart, J.O.; Chess, D.M. The vision of autonomic computing. Computer 2003, 36, 41–50. [Google Scholar] [CrossRef]
- Kephart, J.; Chess, D.; Boutillier, C.; Das, R.; Walsh, W. An architectural blueprint for autonomic computing. IBM White Pap. 2006, 31, 1–6. [Google Scholar]
- Hassan, M.U.; Rehmani, M.H.; Chen, J. Differential Privacy Techniques for Cyber Physical Systems: A Survey. IEEE Commun. Surv. Tutor. 2020, 22, 746–789. [Google Scholar] [CrossRef] [Green Version]
- Dwork, C. Differential Privacy. In ICALP’06, Proceedings of the 33rd International Conference on Automata, Languages and Programming, Venice, Italy, 10–14 July 2006; Springer: Berlin/Heidelberg, Germany, 2006; Volume Part II, pp. 1–12. [Google Scholar] [CrossRef]
- Macaulay, T. Someone Let a GPT-3 Bot Loose on Reddit—It Didn’t End Well. Available online: https://thenextweb.com/neural/2020/10/07/someone-let-a-gpt-3-bot-loose-on-reddit-it-didnt-end-well/amp/ (accessed on 12 May 2021).
- Huang, L.; Joseph, A.D.; Nelson, B.; Rubinstein, B.I.P.; Tygar, J.D. Adversarial Machine Learning. In AISec ’11, Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, Chicago, IL, USA, 21 October 2011; Association for Computing Machinery: New York, NY, USA, 2011; pp. 43–58. [Google Scholar] [CrossRef]
- Li, H.; Wen, G. Modeling reverse thinking for machine learning. Soft Comput. 2020, 24, 1483–1496. [Google Scholar] [CrossRef] [Green Version]
- Saaty, T.L. Decision making with the analytic hierarchy process. Int. J. Serv. Sci. 2008, 1, 83–98. [Google Scholar] [CrossRef] [Green Version]
- Malhotra, N.K.; Kim, S.S.; Agarwal, J. Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Inf. Syst. Res. 2004, 15, 336–355. [Google Scholar] [CrossRef] [Green Version]
- Powers, B. Data Privacy as the New User Experience. Available online: https://martechseries.com/mts-insights/guest-authors/data-privacy-new-user-experience/ (accessed on 12 May 2021).
- Nobles, C. Botching Human Factors in Cybersecurity in Business Organizations. HOLISTICA J. Bus. Public Adm. 2018, 9, 71–88. [Google Scholar] [CrossRef] [Green Version]
- Lazarus, R.S.; Folkman, S. Stress, appraisal and coping. Assess. Coping Strateg. 1984, 56, 267–283. [Google Scholar]
- D’Arcy, J.; Herath, T.; Shoss, M.K. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. J. Manag. Inf. Syst. TA TT 2014, 31, 285–318. [Google Scholar] [CrossRef]
- Andrade, R.O.; Yoo, S.G. Cognitive security: A comprehensive study of cognitive science in cybersecurity. J. Inf. Secur. Appl. 2019, 48, 102352. [Google Scholar] [CrossRef]
- Ponemon Institute LLC. 2020 Cost of Insider Threat Global Report; Technical report; Ponemon Institute: Traverse City, MI, USA, 2020. [Google Scholar]
- Colwill, C. Human factors in information security: The insider threat—Who can you trust these days? Inf. Secur. Tech. Rep. 2009, 14, 186–196. [Google Scholar] [CrossRef]
- Paternoster, R.; Simpson, S. Sanction threats and appeals to morality: Testing a rational choice model of corporate crime. Law Soc. Rev. 1996, 30, 549–583. [Google Scholar] [CrossRef]
- Cornish, D.B.; Clarke, R.V. The Reasoning Criminal: Rational Choice Perspectives on Offending; Routledge: New York, NY, USA, 2017; pp. 1–246. [Google Scholar] [CrossRef]
- Vance, A.; Siponen, M.T. IS security policy violations: A rational choice perspective. J. Organ. End User Comput. (JOEUC) 2012, 24, 21–41. [Google Scholar] [CrossRef] [Green Version]
- Buldas, A.; Laud, P.; Priisalu, J.; Saarepera, M.; Willemson, J. Rational choice of security measures via multi-parameter attack trees. In International Workshop on Critical Information Infrastructures Security; Springer: Berlin/Heidelberg, Germany, 2006; pp. 235–248. [Google Scholar]
- Vance, A.; Lowry, P.; Eggett, D. Using accountability to reduce access policy violations in information systems. J. Manag. Inf. Syst. TA TT 2013, 29, 263–289. [Google Scholar] [CrossRef]
- Vance, A.; Lowry, P.; Eggett, D. Increasing accountability through user-interface design artifacts: A new approach to addressing the problem of access-policy violations. MIS Q. Manag. Inf. Syst. TA TT 2015, 39, 345–366. [Google Scholar] [CrossRef] [Green Version]
- European Union. Lawful evidence collecting and continuity platform development. Inf. Intell. Syst. Appl. 2018, 1, 51–55. [Google Scholar]
Database | Search Feature | Query | Results |
---|---|---|---|
ACM DL | Advanced search (Anywhere on the Search Within combo) | [[All: “cognitive city”] OR [All: “cognitive cities”]] AND [[All: “security”] OR [All: “privacy”] OR [All: “confidentiality”] OR [All: “integrity”] OR [All: “availability”] OR [All: “authenticity”] OR [All: “trustworthiness”] OR [All: “non-repudiation”] OR [All: “accountability”] OR [All: “auditability”]] | 6 |
IEEExplore | Command search | (“Full Text .AND. Metadata”:“cognitive city” OR “Full Text .AND. Metadata”:“cognitive cities”) AND ( “Full Text .AND. Metadata”:“security” OR “Full Text .AND. Metadata”:“privacy” OR “Full Text .AND. Metadata”:“confidentiality” OR “Full Text .AND. Metadata”:“integrity” OR “Full Text .AND. Metadata”:“availability” OR “Full Text .AND. Metadata”:“authenticity” OR “Full Text .AND. Metadata”:“trustworthiness” OR “Full Text .AND. Metadata”:“non-repudiation” OR “Full Text .AND. Metadata”:“accountability” OR “Full Text .AND. Metadata”:“auditability” ) | 42 |
Scopus | Advanced search | ALL ((“cognitive city” OR “cognitive cities”) AND (“security” OR “privacy” OR “confidentiality” OR “integrity” OR “availability” OR “authenticity” OR “trustworthiness” OR “non-repudiation” OR “accountability” OR “auditability”)) | 88 |
Web of Science | Advanced search | ALL = ((“cognitive city” OR “cognitive cities”) AND (“security” OR “privacy” OR “confidentiality” OR “integrity” OR “availability” OR “authenticity” OR “trustworthiness” OR “non-repudiation” OR “accountability” OR “auditability”)) | 15 |
Ref. | Excerpts | Issues | P/S | Proposals |
---|---|---|---|---|
[46] | “The main challenge for urban governance is achieving the conflicting goal of enhancing accessibility to resources, security, and empowerment of citizens at the same time.” | Balance and trade-off. | S | - |
“The significant point is to secure the shared data (particularly those who were shared with citizens) and to verify correct information is used in analytics and thus, making policies. The procedures for verification of authenticity, sanitation of data, and security of the anonymous information and ultimately knowledge bases, should also become a part of urban governance in cognitive cities. Only the secure data should be shared through city dashboards in public or through smart phone applications.” | Authenticity and integrity of anonymous data used for analytics and policy making. | S | Integration of the procedures for verification of authenticity, sanitation of data, and security into urban governance in cognitive cities. Only secured (anoynmized and sanitized) data should be shared through city dashboards. | |
“Privacy, security, and understanding of human behaviour are main challenges of network society and user experience design and social computing are the tools that can be considered to deal with these challenges.” | Privacy and security as challenges of the network society (unspecified). | P/S | user experience design and social computing | |
[5] | “Also, it is essential to consider the risks, which are not few, and might prevent the early adoption of the concept. In this sense, focusing on the healthcare domain, we have to learn from the errors of the past and avert the privacy and security problems of mobile health and smart healthcare. Important challenges in data security and privacy, accountability, transparency, and ethical issues must be addressed” | Privacy and security challenges (unspecified) that might impede the development of the concept. | P/S | Briefly advises to learn from the errors of the past and avert the privacy and security problems of mobile health and smart healthcare, citing technical-related articles. |
[47] | Privacy in IoT: “Potential harm is amplified in the IoT by the scale and greater intimacy of personal data collection”, “Privacy breach (i.e., when a thing is put online, it remains online)”, “Privacy requirement in the IoT is currently only partially covered” Vs privacy in WoT: “Potential privacy violations (i.e., Web services having drawbacks)”, “Public sharing might result in serious privacy implications”, “Standard protocols for securely encrypting data between clients and servers on the Web” | IoT-related and WoT-related privacy issues. | P | |
Security in IoT: “Vulnerable to attack (e.g., unattended components, wireless, communications, low capabilities of energy and computing resources)”, “Possibility of personal data being stolen”, “Security problems” Vs security in WoT: “Secure interactions with HTTPS”, “Less risky (i.e., constantly tested, updated, and fixed systems)”, “Authenticated and secure communication between clients and gateways with HTTPS and OAuth” | IoT-related and WoT-related security issues. | S | Use WoT (it is more secure than IoT.) | |
“However, both approaches are confronted by issues of privacy and security. In the IoT, privacy requirements are generally only partially addressed, which makes the connected devices highly vulnerable to attack. In the worst case, personal data might be stolen. In the WoT, the Web continues to display several drawbacks that could have serious privacy implications. However, by applying the HTTP programming model, particularly HTTPS, it is possible to offer authenticated, secure communication between mobile clients and gateways. In addition, there is less risk of attack because Web services are constantly used, tested, updated, and fixed. Even if the issues of security and privacy are difficult, the Web is better able to counter these challenges than the Internet.” | IoT privacy requirements are generally only partially addressed and in Wot, the Web continues to display several drawbacks that could have serious privacy implications. | P/S | HTTPS to secure and authenticate communication between mobile clients and gateways. In addition, “less risk of attack”. | |
[48] | “Data should be checked for completeness, conformity, consistency, accuracy, duplication, and integrity, and good practices around data quality do exist. Data issues can also emerge from the integration, federation or conglomeration of data, and given the variety and volume of big data, testing this data can be a big task”. | Volume and variety of data complicates data integrity and quality testing. | S | A new global regulatory framework is needed to address invalid conclusions that may arise from data analysis difficulties. |
On predictive capabilities: “Preemptive action is based on prediction and prediction on predictive algorithm based on social information and this curtails civil liberties replacing proof with risk estimates.” | Threats to civil liberties (predictive capabilities). | P | ||
“Profiling individuals on the basis of their health, location, electricity use, and online activity raise risks of discrimination, exclusion and loss of control.” | Discrimination, exclusion, and loss of control (profiling individuals). | P | ||
[49] | “Privacy protections will be critical to the adoption of Cognitive City sensor technologies—individuals must feel comfortable that their privacy will not be violated as they move about in public spaces” | Willingness of sharing information. | P | Privacy-by-design for every technology, system, standard, protocol and process that touches the lives and identities of citizens in a Cognitive City. |
“More broadly, privacy underpins freedom. Privacy relates to freedom of choice and exercising control in the sphere of one’s identity or self—making choices regarding what personal information one wishes to share and, perhaps more importantly, what information one does not wish to share with others.” | Threats to civil liberties: freedom of choice (depends on privacy). | P | ||
“[…] the digitization of data has caused the definition of personal information to expand. It now includes, for example, biological, genealogical, historical, transactional, locational, relational, computational, vocational, or reputational information. Grey areas are also arising from the collection of metadata. In the case of our internet communications, the detailed pattern of associations revealed through metadata can be far more revealing and invasive of privacy than merely accessing the content of one’s communications” | Patterns inferred from big data and metadata aggregation threatens privacy. | P | ||
“individuals, with the growth of networked infrastructures and ICTs, no longer have complete control over one’s own personal information. The potential exists for technology to become a surveillance tool that will diminish individual privacy, dignity and freedom.” | Threats to civil liberties: technology as a surveillance tool. | P | ||
[49] | “Users are concerned about lack of control, lack of transparency and more importantly privacy […] So despite the promise of these technologies, in the context of a Cognitive City, there could be a backlash by citizens if their privacy is increasingly invaded, thereby diminishing any positive gains or benefits to be achieved” | Willingness of sharing information. | P | |
“As data mobility increases vertically and horizontally, there is also less transparency for the individual to make informed decisions about the uses of their data. By removing the individual to whom the data relates, the potential for questionable data quality increases, as do false positives, lack of causality, inference-dependency and greater bias in the results.” | Removing context (e.g. data anonymization) can bring concerns on data quality and result biases. | S | ||
“Asymmetries of knowledge tend to foster asymmetries of power manifested by questionable data quality, lack of causality, inference-dependency, bias and false positives. Armed with greater and more detailed knowledge about its citizens, government organizations can embark on social engineering and manipulation, at an unprecedented scale.” | Governments engaging in social engineering and manipulation. | S | ||
Regarding cognitive systems (which learn from experience, generate and/or evaluate conflicting hypotheses, reports on findings, discover patterns in data, …): “It is easy to see the impact on privacy of such a context computing system not to mention the security challenge. The fear is that the insights arising from such systems will be open to misuse by unauthorized individuals and that the system itself may be misused to further erode one’s freedoms and liberty”. | Threats to civil liberties: misuse or unauthorized use of cognitive systems and their insights can erod freedom and liberty. | P/S | ||
“The privacy challenge for MLA and other sensor based applications, whether deployed in the retail, health or other private or public sectors, is, ironically, the very objective of ubiquitous computing. […] This very premise is one that permits the potential misuse of the technologies because of the lack of transparency and in turn, accountability to the individuals from whom the data is collected.” | Lack of transparency and accountability of ubiquitous computing. | P | ||
“[…] SmartData (or personal avatars) that can think, understand, learn and remember the needs and privacy preferences of the individual to whom the data relates. The goal is to surpass current limited and brittle data protection methods by being able to respond to unforeseen situations, adapt to novel threats, and provide an accurate and nuanced representation of an individual’s privacy and data security preferences. This concept of a smart agent was extended to an application in the realm of intelligence-led surveillance. Privacy-protective surveillance (PPS) uses modern cryptography, to ensure that (a) any personally identifying information (PII) on any unrelated individuals is not collected by the intelligence agency and (b) in transactions associated with targeted activity, PII and the metadata of additional “multi hop” connections will be encrypted upon collection, analyzed securely and effectively, and only divulged to the appropriate authorities with judicial authorization (a warrant).” | - | P/S | Recalls the concept of SmartData and apply it to a privacy-protective surveillance scenario. Authors consider that this cognitive smartdata agent could learn and respond to unforeseen security or privacy situations. | |
[6] | “For instance, the injection of tampered data into a cognitive system could lead to serious unwanted consequences, which could put in danger the very system and people lives. Assuring the trustworthiness and accuracy of communications among agents becomes essential.” | Integrity: injection of false data. | S | Securing communication among agents, for trustworthiness and accuracy. |
“Moreover, the massive collection of citizen data raises serious privacy concerns. Every component of the cognitive systems should be implemented with a privacy-by-design approach in mind, and the appropriate safeguards for the existing risks should be implemented and managed. Open data policies, needed to achieve citizens’ involvement, will have to be balanced with strong privacy-preserving mechanisms.” | The massive collection of citizen data raises serious privacy concerns. | P | Components built with a privacy-by-design approach and risk management, balancing open data policies with strong privacy-preserving mechanisms, and security risks analysis and management. | |
[50] | Preserving Security and Privacy: “Data-driven machine learning approaches (e.g., deep learning) can be attacked by false data injection (FDI), which compromises the validity and trustworthiness of the system. Resilience against such attacks is a must for ML algorithms. Privacy preservation is another important factor since a large part of smart city data comes from individuals who may not prefer their data to be publicly available.” | Integrity: injection of false data. | S | ML algorithms should address false data injection and privacy preservation. |
Privacy preservation for ML algorithms. | P | |||
On-Device Intelligence: “Smart city applications also call for lightweight machine learning algorithms deployable on resource-constrained devices for hard real-time intelligence. This is also in line with the security and privacy preservation requirement since data is not transferred to the fog or cloud.” | - | P/S | On-device intelligence supported by lightweight ML algorithms, so that data is not transferred to the fog or cloud. | |
[51] | “A further challenge is the protection of citizen’s privacy. It is necessary that users of the meta-app allow processing all available information connecting different heterogeneous networks and systems to receive the best possible alternative for a decision-making. As it is a perfect target for attacks willing to disclose sensitive information from citizens, it is crucial to ensure the achievement of privacy within the metaapp to guarantee the fundamental right of them at all times[…] There is still a lot to do for the privacy issue and thus, important to develop techniques to enhance citizen’s privacy.” | Protecting privacy from attacks. | P | |
“A limitation would be that the city, the application providers and the users all must be convinced that data privacy requirements are adhered to, as the meta-app can only reach its full capabilities with access to (open) data and information.” | Willingness to share. | P | ||
[52] | “The use of technology will not only increase the volume of data collected, but also the complexity of how systems interoperate with each other”[…]. “This poses a range of regulatory challenges, predominantly in the domain of data privacy, data security, and commercial liability when things go wrong. Current regulatory frameworks and legal policies are often not sufficient enough to deal with ownership of data, privacy protection, and security breaches” | Regulatory challenges: privacy, security and liability in case of security breaches. | P/S | |
“Sharing data, be it through one’s personal or home devices or in a public space, is becoming ubiquitous.” […] “It is however unclear how privacy is or should be protected when data is transferred across multiple systems and technology owners. This includes the protection of personal information (e.g., social identity, health information, etc.), personal communication (e.g., emails, text messages), and personal behavior (e.g., information on daily routines)” | Regulatory challenge: Ubiquitous nature of data makes hard to know how privacy should be protected. | P | ||
“Another area of regulation that is becoming more complex is the issue of security and liability. Questions around who is responsible for security breaches or other accidents when machine to machine communication fails need to be resolved.” | Regulatory challenges: liability in case of security breaches. | S | ||
“[…] there will be a need for clear and transparent regulations around (data) privacy and security. This is especially important as citizens often do not have the knowledge and understanding of how they are interacting with technology and what the benefits and drawbacks might be.” | Social: citizens do not have the knowledge and understanding of how they are interacting with technology and of the benefits and drawbacks. | P/S | A clear and transparent regulation on data security and privacy. | |
[53] | “Addressing privacy and security concerns in more detail, however, will be an important point for the adoption of this kind of application. Preservation of privacy is of central concern to protect the user from ill will attacks or the sense of the Big Brother effect. The integration of privacy and security needs to be explored further in context with the prototype” | Privacy preservation from attacks. Willingness to share (preservation from the Big Brother effect). | P | |
[54] | “An important consideration in secure system design is the ability to verify and validate the security of alternative systems architectures. In the case of smart infrastructure, verification and validation processes require suitable metrics that both represent the security of the cyber network as well as the physical processes it supports.” | The need for verifying the security of alternative systems architectures. | S | A triple-category security metrics intended to measure and assess the security level of infrastructures. |
[…] “it is important that cyber security is considered as an integral part of the architecture rather than being added on as an afterthought” | S | Cyber security must be an integral part of the architecture, and considered at the design stage. | ||
[54] | “Assuming that security metrics may be established by following the above guidelines, these metrics could then be used to compare two systems of the same type. The target security metrics could be used to verify whether designs were properly implemented. The vulnerability security metrics could be used to determine whether design goals for security were met. The usability security metrics could be used to determine whether the services provided by the infrastructure are themselves secure.” | S | Metrics proposed could be used to compare two systems of the same type: whether designs were properly implemented, design goals for security were met, or the services provided by the infrastructure are themselves secure. | |
“Although systems engineering texts typically present cyber security as a non-functional requirement, increasingly frequent cyber security breaches have fostered recognition that security features are essential to the attribution of integrity and availability of the system as whole. Hence, systems as cyberdependent as a smart infrastructure must consider cyber security as a functional rather than a non-functional requirement” Also, the article considers availability-related metrics like mean time to failure (MTTF), mean time between failure (MTBF), and mean time to repair (MTTR). | Infrastructure availability. | S | ||
[4] | “An important consideration for leveraging citizens as information providers in the urban environment is the issue of data privacy and security. This is an important area of research and policy within the cognitive city context. However, if only 1–2% of the urban population is willing to play an active role in the cognitive grid in exchange for better information access on urban infrastructure services, the implications would be dramatic. The details of such information exchanges have to be worked out in detail in each case, but current research at our research group focuses on frameworks and tools that enable such discussions between city governments and their constituents.” | Willingness to share | P/S | |
[55] | “Building cognition should not spoil but needs to coexist with security and privacy features. In the proposed framework, security and privacy are mainly considered through authentication and access control. Authentication provides the means to validate the identity of the user before s/he interacts with the system. Access control is used to regulate access to data and services (through access to the corresponding VOs/ CVOs). In this respect, VOs/CVOs are created and managed with their associated policies and access rights, which define when, how, and to what extent the enclosed data/function can be disclosed.” | Balance and tradeoff: coexistence of cognition with security and privacy. | P/S | A cognitive management framework for IoT that uses authentication of the user before interacting with the system, as well as access control to data and services. |
[56] | […] “ the privacy menu was introduced. This functionality allows the user to decide which data will be shared only with the system (i.e., the data must be shared with the system because otherwise the meta-app would not work) without allowing other users to access it and which data can be shared in an anonymized manner with other users (which would allow the meta-app to be enhanced).” | willingness to share | P | A privacy menu to allow the user to be in control: decide which data can be shared with the system and which data can be shared (anonymized) with other users. |
[56] | “One of the major challenges of the application of such a meta-app is the privacy issue, [...] One expert stated the importance of storing user information on secure servers and of encrypting all information transmitted to the internet. Additionally, it must be ensured that communication with third-party providers is secure and trustworthy. An expert proposed to address the privacy issue as a possible unique selling point by clearly stating the purpose of the assembled (and shared) information.” | Privacy is a challege for the use of the meta-app | P | Storing user information on secure servers and encrypt all the information transferred to the Internet. Additionally, assuring that communication with third-party providers is secure and trustworthy. An expert proposed to address the privacy issue as a possible unique selling point by clearly stating the purpose of the information. |
“The complexity is mainly technical but also business related and must address the question of willingness to share and provide data and interfaces to the meta-app.” | Privacy: willingness to share is seen as a technical and social challenge. | P | ||
[57] | “Data-driven ML approaches (e.g., DL) can be attacked by false data injection (FDI), which compromises the validity and trustworthiness of the system. Resilience against such attacks is a must for ML algorithms.” | Integrity: Data-driven machine learning can be attacked with false data injection. | S | ML algorithms must be resilient against false data injection. |
“Privacy preservation is another important factor since a large part of SC data comes from individuals who may not prefer their data to be publicly available [58]. ML algorithms should address these concerns to enable the wide acceptance of SC systems by organizations and citizens.” | Privacy preservation for ML algorithms. | P | ||
On-Device Intelligence: “SC applications also call for lightweight ML algorithms deployable on resource-constrained devices for hard real-time intelligence. As intelligence is moving towards edge devices, increased computing power and sensor data along with improved AI algorithms are driving the trend towards ML run on the end device, such as smartphones or automobiles, rather than in the Cloud. This is also in line with the security and privacy preservation requirement because data is not transferred to the edge or Cloud.” | Limited resources of IoT devices make them vulnerable to attacks. | P/S | On-device intelligence with lightweight ML algorithms, so that data is not transferred to the cloud. | |
[58] | “It is likely that citizens will not participate in urban learning processes if they are unsure whether the data they provide will be stored safely and if it is not transparent who will have access to the data. Privacy and data security are thus important concepts that cannot be ignored in city development. In future research, there should be a stronger focus on this aspect.” | Privacy: willingness to share is seen as a technical and social challenge. | P/S | Transparency. |
Search Phase | Reference | Title |
---|---|---|
First | Mansouri and Khansari [46] | A conceptual model for intelligent urban governance: influencing energy behaviour in cognitive cities |
First | Machin and Solanas [5] | A review on the meaning of cognitive cities |
First | D’Onofrio et al. [47] | Advancing cognitive cities with the web of things |
First | Morabito [48] | Big Data and Analytics for Government Innovation |
First | Cavoukian and Chibba [49] | Cognitive cities, big data and citizen participation: The essentials of privacy and security |
First | Machin and Solanas [6] | Conceptual Description of Nature-Inspired Cognitive Cities: Properties and Challenges |
First | Mohammadi and Al-Fuqaha [50] | Enabling Cognitive Smart Cities Using Big Data and Machine Learning: Approaches and Challenges |
First | Kaltenrieder et al. [51] | Enhancing multidirectional communication for cognitive cities |
First | Moyser and Uffer [52] | From smart to cognitive: A roadmap for the adoption of technology in cities |
First | Kaltenrieder et al. [53] | Fuzzy knowledge representation in cognitive cities |
First | Bayuk and Mostashari [54] | Measuring cyber security in intelligent urban infrastructure systems |
First | Liu et al. [60] | Research on software quality evaluation for application of smart city |
Backward | Mostashari et al. [4] | Cognitive Cities and Intelligent Urban Governance |
Backward | Vlacheas et al. [55] | Enabling smart cities through a cognitive management framework for the internet of things |
Forward | Kaltenrieder et al. [56] | Digital personal assistant for cognitive cities: A paper prototype |
Forward | Al-Turjman and Houdjedj [57] | Learning in cities’ cloud-based iot |
Forward | D’Onofrio et al. [58] | Using fuzzy cognitive maps to arouse learning processes in cities |
Stage | R1–R3 | R1–R4 | R2–R3 | R2–R4 |
---|---|---|---|---|
First search | ||||
Backward search | ||||
Forward search |
Reference | QA1 | QA2 | QA3 | QA4 | Result |
---|---|---|---|---|---|
Machin and Solanas [5] (2018) | 1 | 1 | 1 | 1 | 1 |
Morabito [48] (2015) | 1 | 1 | 1 | 1 | 1 |
Liu et al. [60] (2015) | 0 | 0 | 0 | 0 | 0 |
Vlacheas et al. [55] (2013) | 1 | 1 | 1 | 1 | 1 |
Article | Main Focus | ||
---|---|---|---|
Technical | Social | Regulatory | |
Al-Turjman and Houdjedj [57] (2019) | ✓ | ||
Bayuk and Mostashari [54] (2011) | ✓ | ||
Cavoukian and Chibba [49] (2016) | ✓ | ✓ | |
D’Onofrio et al. [47] (2018) | ✓ | ||
D’Onofrio et al. [58] (2019) | ✓ | ✓ | |
Kaltenrieder et al. [51] (2015) | ✓ | ✓ | |
Kaltenrieder et al. [53] (2015) | ✓ | ||
Kaltenrieder et al. [56] (2016) | ✓ | ✓ | |
Machin and Solanas [5] (2018) | ✓ | ||
Machin and Solanas [6] (2019) | ✓ | ||
Mansouri and Khansari [46] (2019) | ✓ | ||
Mohammadi and Al-Fuqaha [50] (2018) | ✓ | ||
Morabito [48] (2015) | ✓ | ✓ | |
Mostashari et al. [4] (2011) | ✓ | ||
Moyser and Uffer [52] (2016) | ✓ | ||
Vlacheas et al. [55] (2013) | ✓ |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Machin, J.; Batista, E.; Martínez-Ballesté, A.; Solanas, A. Privacy and Security in Cognitive Cities: A Systematic Review. Appl. Sci. 2021, 11, 4471. https://doi.org/10.3390/app11104471
Machin J, Batista E, Martínez-Ballesté A, Solanas A. Privacy and Security in Cognitive Cities: A Systematic Review. Applied Sciences. 2021; 11(10):4471. https://doi.org/10.3390/app11104471
Chicago/Turabian StyleMachin, Juvenal, Edgar Batista, Antoni Martínez-Ballesté, and Agusti Solanas. 2021. "Privacy and Security in Cognitive Cities: A Systematic Review" Applied Sciences 11, no. 10: 4471. https://doi.org/10.3390/app11104471
APA StyleMachin, J., Batista, E., Martínez-Ballesté, A., & Solanas, A. (2021). Privacy and Security in Cognitive Cities: A Systematic Review. Applied Sciences, 11(10), 4471. https://doi.org/10.3390/app11104471