A Legal and Security Study on Data Privacy in Smart Cities with a Focus on IoT and Blockchain
Subject Areas : Computer Network and Security
Ghazaleh Shahinzadeh
1
,
Khodadad Khodadadi Dashtaki
2
,
Zahra Moradi
3
,
S. Mohammadali Zanjani
4
1 - Faculty of Law and Social Sciences, Payame Noor University, Isfahan, Iran,
2 - Department of Law, Faculty of Law and Social Sciences, Payam Noor University, Tehran, Iran
3 - Faculty member of Department of Law, Faculty of Law and Social Sciences, Payam Noor University, Tehran, Iran
4 - Department of Electrical Engineering, Na.C., Islamic Azad University, Najafabad, Iran.
Keywords: Smart cities, Privacy, Internet of things, Blockchain, Data security.,
Abstract :
The advancement of smart cities and the expansion of the Internet of Things (IoT), along with the need to reduce energy consumption in green smart cities, signify a revolution in urban planning and management. Despite social improvements and increased efficiency, these advancements bring new challenges, particularly in the realm of security and privacy protection. The widespread use of sensors and smart devices leads to the collection and processing of vast amounts of data, which, if mismanaged, can pose significant threats to data security and individual privacy. Blockchain, as an emerging technology, offers new capabilities for enhancing security and privacy. This study conducts a detailed examination of the impact of existing policies and laws on security and privacy in smart cities and analyzes the role of IoT and blockchain technologies in improving these areas. It also explores the security and privacy challenges and the integration of these technologies into urban management. This research aims to optimize the use of modern technologies while ensuring the security and privacy of citizens in smart cities, thereby enhancing overall efficiency and public welfare while safeguarding citizens' privacy rights.
- Analysis of data privacy and security challenges in the context of IoT and blockchain technologies in smart cities.
- In-depth examination of legal frameworks governing data protection and privacy in urban environments.
- Proposal of blockchain as a solution for addressing privacy concerns in IoT ecosystems within smart city infrastructure.
- Case study focusing on smart city legal and regulatory environments, with a spotlight on Iranian data protection laws.
[1] F. Moqaddari, “Redefining the concept of smart cities and the process of urban smartification based on the conceptual and functional evolution of smart cities,” Urban Design Discourse; Review of Contemporary Literature and Theories, vol. 1, no. 2, 2020 [in Persian].
[2] H. M. Kim, S. Sabri, and A. Kent, “Smart cities as a platform for technological and social innovation in productivity, sustainability, and livability: A conceptual framework,” in Smart Cities for Technological and Social Innovation, Academic Press, 2021, pp. 9–28, doi: 10.1016/b978-0-12-818886-6.00002-2.
[3] A. Randhawa and A. Kumar, “Exploring sustainability of smart development initiatives in India,” International Journal of Sustainable Built Environment, vol. 6, no. 2, pp. 701–710, 2017, doi: 10.1016/j.ijsbe.2017.08.002.
[4] M. Whaiduzzaman, A. Barros, M. Chanda, S. Barman, T. Sultana, M. S. Rahman, and C. Fidge, “A review of emerging technologies for IoT-based smart cities,” Sensors, vol. 22, no. 23, p. 9271, 2022, doi: 10.3390/s22239271.
[5] A. Venkatesh and M. S. Eastaff, “A study of data storage security issues in cloud computing,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 3, no. 1, pp. 1741–1745, 2018, doi: 10.9756/bijsesc.9012.
[6] M. Sookhak, H. Tang, Y. He, and F. R. Yu, “Security and privacy of smart cities: a survey, research issues and challenges,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1718–1743, 2018, doi: 10.1109/comst.2018.2867288.
[7] B. Hammi, R. Khatoun, S. Zeadally, A. Fayad, and L. Khoukhi, “IoT technologies for smart cities,” IET Networks, vol. 7, no. 1, pp. 1–13, 2018, doi: 10.1049/iet-net.2017.0163.
[8] M. H. P. Rizi and S. A. H. Seno, “A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city,” Internet of Things, vol. 20, p. 100584, 2022, doi: 10.1016/j.iot.2022.100584.
[9] L. D. Radu, “Disruptive technologies in smart cities: a survey on current trends and challenges,” Smart Cities, vol. 3, no. 3, pp. 1022–1038, 2020, doi: 10.3390/smartcities3030051.
[10] E. Ismagilova, L. Hughes, N. P. Rana, and Y. K. Dwivedi, “Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework,” Information Systems Frontiers, pp. 1–22, 2022, doi: 10.1007/s10796-020-10044-1.
[11] S. M. Zanjani, S. M. Zanjani, H. Shahinzadeh, M. Moazzami, F. Ebrahimi and N. Nourmahnad, "Leveraging Big Data Intelligence for Electronic Health Data Collection and Mining in Smart Innovative Cities: Approaches and Applications," 7th Iranian Conference on Advances in Enterprise Architecture (ICAEA), Tehran, Iran, Islamic Republic of, 2023, pp. 45-52, doi: 10.1109/ICAEA60387.2023.10414446.
[12] H. K. Channi and R. Kumar, “The role of smart sensors in smart city,” in Smart Sensor Networks: Analytics, Sharing and Control, Cham: Springer International Publishing, 2021, pp. 27–48, doi: 10.1007/978-3-030-77214-7_2.
[13] A. Jantarani, M. Barati, M. Ghobakhloo, A. Shahin, and M. Talari, “Identifying the requirements of using the Industrial Internet of Things in the automotive supply chain,” Journal of Operations Management, vol. 2, no. 7, pp. 27–54, 2022.
[14] L. Xia, D. T. Semirumi, and R. Rezaei, “A thorough examination of smart city applications: Exploring challenges and solutions throughout the life cycle with emphasis on safeguarding citizen privacy,” Sustainable Cities and Society, vol. 98, p. 104771, 2023, doi: 10.1016/j.scs.2023.104771.
[15] Faghihi and Jamshidi, “A review of user data protection laws in selected countries,” Expert Reports (Islamic Consultative Assembly Research Center), vol. 94, no. 26, pp. 506–543, 2018 [in Persian].
[16] F. Farahmand, “A comparative study of the data protection regulation with the General Data Protection Regulation (GDPR),” Technology Law, 2023, doi: 10.22133/mtlj.2023.383528.1164 [in Persian].
[17] S. G. Jamison, “Creating a National Data Privacy Law for the United States,” Cybaris Intell. Prop. L. Rev., vol. 10, p. 1, 2019.
[18] G. Pyo and C. Ji, “Cybersecurity and Data Protection: A Study on China's New Cybersecurity Legal Regime and How It Affects Inbound Investment in China,” International Lawyer, vol. 51, p. 537, 2018.
[19] J. Eslami and K. Pishgadam, “A comparative study of the concept of freedom in the Citizen Rights Charter and the Universal Declaration of Human Rights,” Legal Research, vol. 20, no. 45, pp. 95–123, 2021, doi: 10.48300/jlr.2021.129106 [in Persian].
[20] H. Mazarei, M. Dadvar, and M. Atabakzadeh, “Distributed Denial of Service Attacks Detection in Internet of Things Using the Majority Voting Approach,” Journal of Southern Communication Engineering, vol. 13, no. 49, pp. 23–48, 2023, doi: 10.30495/jce.2023.1984927.1201.
[21] F. Fazli, M. Mansubbassiri, and F. Babazadeh, “A-RPL: Routing Algorithm with the Ability to Support Mobility in Internet of Things Networks,” Journal of Southern Communication Engineering, vol. 13, no. 50, pp. 11–32, 2023, doi: 10.30495/jce.2023.1975641.1183.
[22] S. Tahmasebi Limooni, S. Ghasemi, and R. Ghorbanloo, “Identifying the common threats and vulnerabilities in the Internet of Things (IoT) and offering security policies for confronting them,” Journal of Knowledge Studies, vol. 12, no. 44, pp. 32–54, 2019.
[23] D. Mishra, P. Vijayakumar, V. Sureshkumar, R. Amin, S. H. Islam, and P. Gope, “Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks,” Multimedia Tools and Applications, vol. 77, pp. 18295–18325, 2018, doi: 10.1007/s11042-017-5376-4.
[24] A. H. Salehi Shayegan, A. Zakeri, and A. Salehi Shayegan, “Optimizing resources allocation for fog computing-based internet of things networks to reduce latency cost,” Computational Economics, vol. 1, no. 3, pp. 99–112, 2022.
[25] P. Lis and J. Mendel, “Cyberattacks on critical infrastructure: An economic perspective,” Economics and Business Review, vol. 5, no. 2, pp. 24–47, 2019, doi: 10.18559/ebr.2019.2.2.
[26] A. R. Berkel, P. M. Singh, and M. J. van Sinderen, "An information security architecture for smart cities," in Business Modeling and Software Design: 8th International Symposium, BMSD 2018, Vienna, Austria, July 2-4, 2018, Proceedings 8, Springer International Publishing, 2018, pp. 167-184, doi: 10.1007/978-3-319-94214-8_11.
[27] R. Gupta, N. K. Jadav, A. Nair, S. Tanwar, and H. Shahinzadeh, "Blockchain and AI-based secure onion routing framework for data dissemination in IoT environment underlying 6g networks," in 2022 Sixth International Conference on Smart Cities, Internet of Things and Applications (SCIoT), 2022, pp. 1-6, doi: 10.1109/sciot56583.2022.9953671.
[28] G. Shahinzadeh, H. Shahinzadeh, and S. Tanwar, "Security and Privacy Issues in the Internet of Things: A Comprehensive Survey of Protocols, Standards, and the Revolutionary Role of Blockchain," in 2024 8th International Conference on Smart Cities, Internet of Things and Applications (SCIoT), 2024, pp. 59-67, doi: 10.1109/sciot62588.2024.10570131.
[29] A. Asilian, H. Shahinzadeh, S. M. Zanjani, G. B. Gharehpetian, A. Y. Abdelaziz, and S. Tanwar, "The Role of Microelectronics for Smart Cities, Smart Grids and Industry 5.0: Challenges, Solutions, and Opportunities," in 13th Smart Grid Conference (SGC), 2023, pp. 1-12, doi: 10.1109/sgc61621.2023.10459310.
[30] S. M. Zanjani, H. Shahinzadeh, S. M. Kargar, M. Moazzami, F. Ebrahimi, and M. Hemmati, "Internet of Things Security: A Review on Challenges, Solutions and Research Directions," in 2023 7th International Conference on Internet of Things and Applications (IoT), 2023, pp. 1-8, doi: 10.1109/iot60973.2023.10365381.
[31] L. Cui, G. Xie, Y. Qu, L. Gao, and Y. Yang, "Security and privacy in smart cities: Challenges and opportunities," IEEE Access, vol. 6, pp. 46134-46145, 2018, doi: 10.1109/ACCESS.2018.2853985.
[32] M. Taghavayi and M. Shafie, "Analysis of indicators and strategies for achieving urban smartification (Case study: Isfahan City)," Spatial Planning, vol. 12, no. 1, pp. 51-80, 2022, doi: 10.22108/sppl.2022.131222.1621 [in Persian].
[33] A. Tavakoli and D. Dehghani, "The conflict between security-oriented approaches and fair trial principles," Criminal Law Research Quarterly, vol. 1, no. 3, pp. 7-34, 2013 [in Persian].
[34] Esmaeili and T. Tahan-Nazif, "An analysis of the nature of the Supreme Council of the Cultural Revolution in the Constitutional Law of the Islamic Republic of Iran," Islamic Law Research Journal, vol. 28, no. 9, pp. 87-120, 2008 [in Persian].
[35] S. E. Hosseini, "The limitations of the Islamic Consultative Assembly in legislation (Article 71 of the Constitution)," Islamic Government, vol. 66, no. 17, pp. 163-194, 2012 [in Persian].
[36] B. Ansari and Alvandenjad, "The nature and position of regulatory bodies in cyberspace governance in Iran," Legal Lessons, vol. 6, no. 1, pp. 281-314, 2020 (in Persian).
[37] A. Asgharnia, Rostami, and Vali, "Critique and pathology of the legal system regulating economic competition in Iran from a competition law perspective," Industrial Economics Research Quarterly, vol. 4, no. 11, pp. 61-76, 2020, doi: 10.30473/indeco.2020.7549 [in Persian].
[38] K. Khorramdel, Estavarsangari, K. Alaei, and Zarabi, "Challenges related to regulatory authorities overseeing audio and video production in cyberspace," Administrative Law Research Quarterly, vol. 9, no. 30, pp. 31-56, 2022, doi: 10.52547/qjal.9.30.31 [in Persian].
[39] Salami, Mazhari, and Mohammadi, "Urban management responsibilities in realizing citizens’ environmental rights (with a focus on the resolutions of Tehran City Council)," Comparative Law Research and Development Quarterly, vol. 4, no. 11, pp. 84-111, 2021, doi: 10.22034/law.2021.533814.1092 [in Persian].
[40] F. Elashti and J. Javan Jafari Bojnordi, "Violation of the freedom of information flow in situational crime prevention in cyberspace," Criminal Law Research Quarterly, vol. 5, no. 18, pp. 69-100, 2017, doi: 10.22054/jclr.2017.7400 [in Persian].
[41] N. A. Nemati, Nabiollah, and S. Sadeghi-Neshat, "Civil liability for breaches of data security in cyber threats," Security and Protective Research, vol. 23, no. 6, pp. 157-186, 2017 [in Persian].
[42] Ghanad, Aligholi, and Amireh, "The concept and importance of personal data and privacy protection in cyberspace," Technology Law, vol. 1, no. 1, pp. 297-322, 2020, doi: 10.22133/clj.2020.243290.1016 [in Persian].
[43] W. Kozłowski and K. Suwar, "Smart city: definitions, dimensions, and initiatives," 2021, doi: 10.35808/ersj/2442.