Discreet City: Protecting Privacy at Large Scale

School of Electrical and Computer Engineering, National Technical University of Athens


Recent advances in mobile communications, location/sensing technologies and data processing are boosting the deployment of context-aware services and smart spaces creation. This is reflected in urban environments by the smart-city vision, a city with advanced ICT and surveillance infrastructures offering to citizens a diversity of services. Nevertheless, privacy risks and threats ambush, since collection and process of large amount of personal data occur. Although technology enables the collection of data, its protection against abuse is left to data protection legislation. However, privacy and security requirements, other than being general and abstract terms to be regarded as legislature issues, should be brought down in the technological reality and carefully accounted for in devising technical solutions. In order to limit the disclosure and misuse of citizens' personal data, this report introduces a distributed unit of trust, as a mediating entity that manages, in a privacy respectful manner, the exchange of private data.

Download full-text


Available from: Dimitra I Kaklamani, Oct 04, 2015
23 Reads
  • Source
    2 01/2006; Morgan Kauffman Publishers.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system. The technique does not require a universally trusted authority. one correspondent can remain anonymous to a second, while allowing the second to respond via an untraceable return address. The technique can also be used to form rosters of untraceable digital pseudonyms from selected applications. Applicants retain the exclusive ability to form digital signatures corresponding to their pseudonyms. Elections in which any interested party can verify that the ballots have been properly counted are possible if anonymously mailed ballots are signed with pseudonyms from a roster of registered voters. Another use allows an individual to correspond with a record-keeping organization under a unique pseudonym which appears in a roster of acceptable clients.
    Communications of the ACM 02/1981; 24(2):84-88. DOI:10.1145/358549.358563 · 3.62 Impact Factor
  • Source
    Marquette law review 01/1997;
Show more