مطالعه حقوقی و امنیتی حریم خصوصی دادهها در شهرهای هوشمند با تمرکز بر اینترنت اشیا و بلاکچین
الموضوعات :
غزاله شاهین زاده
1
,
خداداد خدادادی دشتکی
2
,
زهرا مرادی
3
,
سید محمدعلی زنجانی
4
1 - دانشکده حقوق و علوم اجتماعی، دانشگاه پیام نور، اصفهان، ايران
2 - گروه حقوق، دانشکده حقوق و علوم اجتماعی، دانشگاه پیام نور، تهران، ايران
3 - گروه حقوق، دانشکده حقوق و علوم اجتماعی، دانشگاه پیام نور، تهران، ايران
4 - دانشکده مهندسی برق، واحد نجف آباد، دانشگاه آزاد اسلامی، نجف آباد، ایران
الکلمات المفتاحية: شهرهای هوشمند, حفظ حریم خصوصی, اینترنت اشیا, بلاک چین, امنیت داده,
ملخص المقالة :
پیشرفت شهرهای هوشمند و گسترش اینترنت اشیا، به همراه نیاز به کاهش مصرف انرژی در شهرهای هوشمند سبز، نمایانگر یک انقلاب در شهرسازی و مدیریت شهری است. با وجود بهبودهای اجتماعی و افزایش کارایی، این پیشرفتها چالشهای جدیدی بهخصوص در زمینه امنیت و حفظ حریم خصوصی به همراه دارند. استفاده بیشازپیش از حسگرها و دستگاههای هوشمند، منجر به جمعآوری و پردازش حجم زیادی از اطلاعات شده است که در صورت مدیریت نامناسب، میتواند به تهدیدی برای امنیت دادهها و حریم خصوصی افراد تبدیل شود. بلاکچین بهعنوان یک فناوری نوین، قابلیتهای جدیدی برای افزایش امنیت و حفظ حریم خصوصی ارائه میدهد. این تحقیق به بررسی دقیق تأثیر سیاستها و قوانین موجود بر امنیت و حریم خصوصی در شهرهای هوشمند پرداخته و نقش فناوریهای اینترنت اشیا و بلاکچین را در بهبود این زمینهها تحلیل میکند. همچنین چالشهای امنیتی و حریم خصوصی و نحوه ادغام این فناوریها در مدیریت شهری موردبررسی قرارگرفته است. هدف این تحقیق، استفاده بهینه از فناوریهای نوین و حفظ امنیت و حریم خصوصی شهروندان در شهرهای هوشمند است، تا به این وسیله کارایی و رفاه عمومی ارتقا یابد و حقوق حریم خصوصی شهروندان محافظت شود.
- Analysis of data privacy and security challenges in the context of IoT and blockchain technologies in smart cities.
- In-depth examination of legal frameworks governing data protection and privacy in urban environments.
- Proposal of blockchain as a solution for addressing privacy concerns in IoT ecosystems within smart city infrastructure.
- Case study focusing on smart city legal and regulatory environments, with a spotlight on Iranian data protection laws.
[1] F. Moqaddari, “Redefining the concept of smart cities and the process of urban smartification based on the conceptual and functional evolution of smart cities,” Urban Design Discourse; Review of Contemporary Literature and Theories, vol. 1, no. 2, 2020 [in Persian].
[2] H. M. Kim, S. Sabri, and A. Kent, “Smart cities as a platform for technological and social innovation in productivity, sustainability, and livability: A conceptual framework,” in Smart Cities for Technological and Social Innovation, Academic Press, 2021, pp. 9–28, doi: 10.1016/b978-0-12-818886-6.00002-2.
[3] A. Randhawa and A. Kumar, “Exploring sustainability of smart development initiatives in India,” International Journal of Sustainable Built Environment, vol. 6, no. 2, pp. 701–710, 2017, doi: 10.1016/j.ijsbe.2017.08.002.
[4] M. Whaiduzzaman, A. Barros, M. Chanda, S. Barman, T. Sultana, M. S. Rahman, and C. Fidge, “A review of emerging technologies for IoT-based smart cities,” Sensors, vol. 22, no. 23, p. 9271, 2022, doi: 10.3390/s22239271.
[5] A. Venkatesh and M. S. Eastaff, “A study of data storage security issues in cloud computing,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 3, no. 1, pp. 1741–1745, 2018, doi: 10.9756/bijsesc.9012.
[6] M. Sookhak, H. Tang, Y. He, and F. R. Yu, “Security and privacy of smart cities: a survey, research issues and challenges,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1718–1743, 2018, doi: 10.1109/comst.2018.2867288.
[7] B. Hammi, R. Khatoun, S. Zeadally, A. Fayad, and L. Khoukhi, “IoT technologies for smart cities,” IET Networks, vol. 7, no. 1, pp. 1–13, 2018, doi: 10.1049/iet-net.2017.0163.
[8] M. H. P. Rizi and S. A. H. Seno, “A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city,” Internet of Things, vol. 20, p. 100584, 2022, doi: 10.1016/j.iot.2022.100584.
[9] L. D. Radu, “Disruptive technologies in smart cities: a survey on current trends and challenges,” Smart Cities, vol. 3, no. 3, pp. 1022–1038, 2020, doi: 10.3390/smartcities3030051.
[10] E. Ismagilova, L. Hughes, N. P. Rana, and Y. K. Dwivedi, “Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework,” Information Systems Frontiers, pp. 1–22, 2022, doi: 10.1007/s10796-020-10044-1.
[11] S. M. Zanjani, S. M. Zanjani, H. Shahinzadeh, M. Moazzami, F. Ebrahimi and N. Nourmahnad, "Leveraging Big Data Intelligence for Electronic Health Data Collection and Mining in Smart Innovative Cities: Approaches and Applications," 7th Iranian Conference on Advances in Enterprise Architecture (ICAEA), Tehran, Iran, Islamic Republic of, 2023, pp. 45-52, doi: 10.1109/ICAEA60387.2023.10414446.
[12] H. K. Channi and R. Kumar, “The role of smart sensors in smart city,” in Smart Sensor Networks: Analytics, Sharing and Control, Cham: Springer International Publishing, 2021, pp. 27–48, doi: 10.1007/978-3-030-77214-7_2.
[13] A. Jantarani, M. Barati, M. Ghobakhloo, A. Shahin, and M. Talari, “Identifying the requirements of using the Industrial Internet of Things in the automotive supply chain,” Journal of Operations Management, vol. 2, no. 7, pp. 27–54, 2022.
[14] L. Xia, D. T. Semirumi, and R. Rezaei, “A thorough examination of smart city applications: Exploring challenges and solutions throughout the life cycle with emphasis on safeguarding citizen privacy,” Sustainable Cities and Society, vol. 98, p. 104771, 2023, doi: 10.1016/j.scs.2023.104771.
[15] Faghihi and Jamshidi, “A review of user data protection laws in selected countries,” Expert Reports (Islamic Consultative Assembly Research Center), vol. 94, no. 26, pp. 506–543, 2018 [in Persian].
[16] F. Farahmand, “A comparative study of the data protection regulation with the General Data Protection Regulation (GDPR),” Technology Law, 2023, doi: 10.22133/mtlj.2023.383528.1164 [in Persian].
[17] S. G. Jamison, “Creating a National Data Privacy Law for the United States,” Cybaris Intell. Prop. L. Rev., vol. 10, p. 1, 2019.
[18] G. Pyo and C. Ji, “Cybersecurity and Data Protection: A Study on China's New Cybersecurity Legal Regime and How It Affects Inbound Investment in China,” International Lawyer, vol. 51, p. 537, 2018.
[19] J. Eslami and K. Pishgadam, “A comparative study of the concept of freedom in the Citizen Rights Charter and the Universal Declaration of Human Rights,” Legal Research, vol. 20, no. 45, pp. 95–123, 2021, doi: 10.48300/jlr.2021.129106 [in Persian].
[20] H. Mazarei, M. Dadvar, and M. Atabakzadeh, “Distributed Denial of Service Attacks Detection in Internet of Things Using the Majority Voting Approach,” Journal of Southern Communication Engineering, vol. 13, no. 49, pp. 23–48, 2023, doi: 10.30495/jce.2023.1984927.1201.
[21] F. Fazli, M. Mansubbassiri, and F. Babazadeh, “A-RPL: Routing Algorithm with the Ability to Support Mobility in Internet of Things Networks,” Journal of Southern Communication Engineering, vol. 13, no. 50, pp. 11–32, 2023, doi: 10.30495/jce.2023.1975641.1183.
[22] S. Tahmasebi Limooni, S. Ghasemi, and R. Ghorbanloo, “Identifying the common threats and vulnerabilities in the Internet of Things (IoT) and offering security policies for confronting them,” Journal of Knowledge Studies, vol. 12, no. 44, pp. 32–54, 2019.
[23] D. Mishra, P. Vijayakumar, V. Sureshkumar, R. Amin, S. H. Islam, and P. Gope, “Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks,” Multimedia Tools and Applications, vol. 77, pp. 18295–18325, 2018, doi: 10.1007/s11042-017-5376-4.
[24] A. H. Salehi Shayegan, A. Zakeri, and A. Salehi Shayegan, “Optimizing resources allocation for fog computing-based internet of things networks to reduce latency cost,” Computational Economics, vol. 1, no. 3, pp. 99–112, 2022.
[25] P. Lis and J. Mendel, “Cyberattacks on critical infrastructure: An economic perspective,” Economics and Business Review, vol. 5, no. 2, pp. 24–47, 2019, doi: 10.18559/ebr.2019.2.2.
[26] A. R. Berkel, P. M. Singh, and M. J. van Sinderen, "An information security architecture for smart cities," in Business Modeling and Software Design: 8th International Symposium, BMSD 2018, Vienna, Austria, July 2-4, 2018, Proceedings 8, Springer International Publishing, 2018, pp. 167-184, doi: 10.1007/978-3-319-94214-8_11.
[27] R. Gupta, N. K. Jadav, A. Nair, S. Tanwar, and H. Shahinzadeh, "Blockchain and AI-based secure onion routing framework for data dissemination in IoT environment underlying 6g networks," in 2022 Sixth International Conference on Smart Cities, Internet of Things and Applications (SCIoT), 2022, pp. 1-6, doi: 10.1109/sciot56583.2022.9953671.
[28] G. Shahinzadeh, H. Shahinzadeh, and S. Tanwar, "Security and Privacy Issues in the Internet of Things: A Comprehensive Survey of Protocols, Standards, and the Revolutionary Role of Blockchain," in 2024 8th International Conference on Smart Cities, Internet of Things and Applications (SCIoT), 2024, pp. 59-67, doi: 10.1109/sciot62588.2024.10570131.
[29] A. Asilian, H. Shahinzadeh, S. M. Zanjani, G. B. Gharehpetian, A. Y. Abdelaziz, and S. Tanwar, "The Role of Microelectronics for Smart Cities, Smart Grids and Industry 5.0: Challenges, Solutions, and Opportunities," in 13th Smart Grid Conference (SGC), 2023, pp. 1-12, doi: 10.1109/sgc61621.2023.10459310.
[30] S. M. Zanjani, H. Shahinzadeh, S. M. Kargar, M. Moazzami, F. Ebrahimi, and M. Hemmati, "Internet of Things Security: A Review on Challenges, Solutions and Research Directions," in 2023 7th International Conference on Internet of Things and Applications (IoT), 2023, pp. 1-8, doi: 10.1109/iot60973.2023.10365381.
[31] L. Cui, G. Xie, Y. Qu, L. Gao, and Y. Yang, "Security and privacy in smart cities: Challenges and opportunities," IEEE Access, vol. 6, pp. 46134-46145, 2018, doi: 10.1109/ACCESS.2018.2853985.
[32] M. Taghavayi and M. Shafie, "Analysis of indicators and strategies for achieving urban smartification (Case study: Isfahan City)," Spatial Planning, vol. 12, no. 1, pp. 51-80, 2022, doi: 10.22108/sppl.2022.131222.1621 [in Persian].
[33] A. Tavakoli and D. Dehghani, "The conflict between security-oriented approaches and fair trial principles," Criminal Law Research Quarterly, vol. 1, no. 3, pp. 7-34, 2013 [in Persian].
[34] Esmaeili and T. Tahan-Nazif, "An analysis of the nature of the Supreme Council of the Cultural Revolution in the Constitutional Law of the Islamic Republic of Iran," Islamic Law Research Journal, vol. 28, no. 9, pp. 87-120, 2008 [in Persian].
[35] S. E. Hosseini, "The limitations of the Islamic Consultative Assembly in legislation (Article 71 of the Constitution)," Islamic Government, vol. 66, no. 17, pp. 163-194, 2012 [in Persian].
[36] B. Ansari and Alvandenjad, "The nature and position of regulatory bodies in cyberspace governance in Iran," Legal Lessons, vol. 6, no. 1, pp. 281-314, 2020 (in Persian).
[37] A. Asgharnia, Rostami, and Vali, "Critique and pathology of the legal system regulating economic competition in Iran from a competition law perspective," Industrial Economics Research Quarterly, vol. 4, no. 11, pp. 61-76, 2020, doi: 10.30473/indeco.2020.7549 [in Persian].
[38] K. Khorramdel, Estavarsangari, K. Alaei, and Zarabi, "Challenges related to regulatory authorities overseeing audio and video production in cyberspace," Administrative Law Research Quarterly, vol. 9, no. 30, pp. 31-56, 2022, doi: 10.52547/qjal.9.30.31 [in Persian].
[39] Salami, Mazhari, and Mohammadi, "Urban management responsibilities in realizing citizens’ environmental rights (with a focus on the resolutions of Tehran City Council)," Comparative Law Research and Development Quarterly, vol. 4, no. 11, pp. 84-111, 2021, doi: 10.22034/law.2021.533814.1092 [in Persian].
[40] F. Elashti and J. Javan Jafari Bojnordi, "Violation of the freedom of information flow in situational crime prevention in cyberspace," Criminal Law Research Quarterly, vol. 5, no. 18, pp. 69-100, 2017, doi: 10.22054/jclr.2017.7400 [in Persian].
[41] N. A. Nemati, Nabiollah, and S. Sadeghi-Neshat, "Civil liability for breaches of data security in cyber threats," Security and Protective Research, vol. 23, no. 6, pp. 157-186, 2017 [in Persian].
[42] Ghanad, Aligholi, and Amireh, "The concept and importance of personal data and privacy protection in cyberspace," Technology Law, vol. 1, no. 1, pp. 297-322, 2020, doi: 10.22133/clj.2020.243290.1016 [in Persian].
[43] W. Kozłowski and K. Suwar, "Smart city: definitions, dimensions, and initiatives," 2021, doi: 10.35808/ersj/2442.