SlideShare a Scribd company logo
1 of 6
Download to read offline
7.9.2018
1
5GANDLOCATIONDATAPRIVACY
-THENEXTGENERATIONOFCHALLENGES
FORDATAPROTECTION?
Prof. Päivi Korpisaari & postdoc researcher Anette Alén-Savikko
University of Helsinki
SLS / 7 Sept 2018
• L. Chen, S. Thombre, K. Järvinen, E S. Lohan, A. Alén-Savikko, H.
Leppäkoski, M. Z. H. Bhuiyan, S. Bu-Pasha, G. N. Ferrara, S. Honkala,
J. Lindqvist, L. Ruotsalainen, P. Korpisaari & H. Kuusniemi: Robustness,
Security and Privacy in Location-Based Services in Future IoT: A Survay.
IEEE Access 2017.
• E. S. Lohan, A. Alén-Savikko, L. Chen, K. Järvinen, H. Leppäkoski, H.
Kuusniemi & P. Korpisaari, 5G positioning: security and privacy aspects,
in M. Liyanage et al (eds) A Comprehensive Guide to 5G Security (Wiley
Publishers 2018) 281-320.
• Two forthcoming articles by A. Alén-Savikko / P. Korpisaari (co-author)
respectively
OUR RESEARCH
SLS London 2018 Alén-Savikko & Korpisaari
7.9.2018
2
Our society relies increasingly on
- wireless communication
- IoT, smart localization tech, (location) data
- location-based services (LSB)
- (5G)
 data protection / security & privacy concerns
• sharing personal location data unintentionally or unknowingly
• sensitive data (eg via tracking habits and movements)
• EU law, GDPR, ePD(R)
BACKGROUND
SLS London 2018 Alén-Savikko & Korpisaari
• art 4(1)
personal data is defined as ‘any information relating to an identified or
identifiable natural person’, while ‘an identifiable natural person is one who
can be identified, directly or indirectly, in particular by reference to an
identifier such as a name, an identification number, location data, an
online identifier or to one or more factors specific to the physical,
physiological, genetic, mental, economic, cultural or social identity of that
natural person’
• GDPR art 9(1) “sensitive data”
GDPR
7.9.2018
3
• GDPR, recital 26:
• ‘When determining whether a natural person is identifiable, account
should be taken of all the means reasonably likely to be used (...) To
ascertain whether means are reasonably likely to be used to identify the
natural person, account should be taken of all objective factors, such as
the costs of and the amount of time required for identification, taking into
consideration the available technology at the time of the processing and
technological developments.’
 restricts the use of spatial/geographic/location data (even if public data)
PERSONAL LOCATION
DATA
SLS London 2018 Alén-Savikko & Korpisaari
• location data is ‘any data with an implicit or explicit geographic or
geospatial reference, ranging from address data to radio signal-based
triangulation or IP address location’
(Leda Bargiotti et al: Guidelines for public administrations on location privacy.
European Commission. JRC Technical Reports, European Union 2016, 9)
• personal location data  ‘any location data directly or indirectly linked to
an individual or that can be directly or indirectly used to identify an
individual’; ‘This becomes possible by making any combination of
(different/several) location and personal data.’ (Bargiotti 2016, 9)
 any information, relating to, identified/identifiable, natural person
GDPR art 4, recital 26
CJEU C-582/14 Breyer
WP 136
LOCATION DATA
SLS London 2018 Alén-Savikko & Korpisaari
7.9.2018
4
• updated features catering for new types of applications
• greater speed, lower latency
 reliability, capacity for numerous devices, massive connectivity, M2M
communication, automation, AI etc.
• eg millimeter (mm) waves (more banwidth), small cells (dense base
stations), massive multiple-input multiple-output (MIMO) (many
antennas), beamforming (traffic control), full duplex (simultaneous
transmission and reception of signals)
• “network slicing”; virtualization, softwarization
 multiple network functions with one hardware
5G INANUTSHELL
SLS London 2018 Alén-Savikko & Korpisaari
(Lohan et al. 2018, 282)
7.9.2018
5
• Problems and challenges
- individuals position and data flows in IoT / M2M: consenting?
- personal data as an asset / method of payment
- big data / analytics: data minimization? purpose limitation? (D)PbD?
- misuse or unauthorized use of location data (secondary uses; terms of
use)
- data security: eg ill-secured devices, leakage of location data due to
hacking or accident, non-transparent privacy policies esp. with regard to
third-party use
(Lohan et al. 2018; S. Khajuria & K. E. Skouby: Privacy and Economics in a 5G
Environment. Wireless Personal Communications 95(1) 2017, 145-154)
LOCATION PRIVACYAND
SECURITY IN 5G
• Privacy assistants
• Encryption (eg identity verification, purpose specification)
• Biometrics (eg access control)
(Lohan et al. 2018, 310)
• Rights or ownership of data
(Khajuria & Skouby 2017; N. Purtova: The Illusion of Personal Data as No One’s
Property. Law, Innovation, and Technology 7(1) 2015, 83-111)
SOLUTION: ENHANCED
USER CONTROL?
7.9.2018
6
• “It seems clear, however, from the above analysis that transparency is
not sufficient to constitute a user side with relevant power […]. This can
only be established with clearly established users’ rights to data—also in
secondary and following usages. This again is a condition for a
functioning 5G ecosystem.” (Khajuria & Skouby 2017, 153)
• “the core question of data protection should be not if there should be
property rights in personal data, but how to structure those property
rights in a way that is both economically sound and respectful of the
individual’s rights” (Purtova 2015, 111)
SOLUTIONS: ENHANCED
USER CONTROL?
THANK YOU FOR YOUR
ATTENTION
12

More Related Content

What's hot

Discovering Things and Things’ data/services
Discovering Things and  Things’ data/servicesDiscovering Things and  Things’ data/services
Discovering Things and Things’ data/servicesPayamBarnaghi
 
Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things PayamBarnaghi
 
Physical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPhysical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPayamBarnaghi
 
Internet of Things and Data Analytics for Smart Cities and eHealth
Internet of Things and Data Analytics for Smart Cities and eHealthInternet of Things and Data Analytics for Smart Cities and eHealth
Internet of Things and Data Analytics for Smart Cities and eHealthPayamBarnaghi
 
CityPulse: Large-scale data analytics for smart cities
CityPulse: Large-scale data analytics for smart cities CityPulse: Large-scale data analytics for smart cities
CityPulse: Large-scale data analytics for smart cities PayamBarnaghi
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next? PayamBarnaghi
 
Large-scale data analytics for smart cities
Large-scale data analytics for smart citiesLarge-scale data analytics for smart cities
Large-scale data analytics for smart citiesPayamBarnaghi
 
Dynamic Data Analytics for the Internet of Things: Challenges and Opportunities
Dynamic Data Analytics for the Internet of Things: Challenges and OpportunitiesDynamic Data Analytics for the Internet of Things: Challenges and Opportunities
Dynamic Data Analytics for the Internet of Things: Challenges and OpportunitiesPayamBarnaghi
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so farPayamBarnaghi
 
Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things PayamBarnaghi
 
Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things PayamBarnaghi
 
IBM-ISSIP Presentation
IBM-ISSIP Presentation IBM-ISSIP Presentation
IBM-ISSIP Presentation Ali Yavari
 
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing ResearchFuture Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing ResearchAntonio Marcos Alberti
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGSChidiogo Mbonu
 
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...Amélie Gyrard
 
Working with real world data
Working with real world dataWorking with real world data
Working with real world dataPayamBarnaghi
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanDeris Stiawan
 

What's hot (20)

Discovering Things and Things’ data/services
Discovering Things and  Things’ data/servicesDiscovering Things and  Things’ data/services
Discovering Things and Things’ data/services
 
Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things
 
Physical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPhysical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City Applications
 
Internet of Things and Data Analytics for Smart Cities and eHealth
Internet of Things and Data Analytics for Smart Cities and eHealthInternet of Things and Data Analytics for Smart Cities and eHealth
Internet of Things and Data Analytics for Smart Cities and eHealth
 
CityPulse: Large-scale data analytics for smart cities
CityPulse: Large-scale data analytics for smart cities CityPulse: Large-scale data analytics for smart cities
CityPulse: Large-scale data analytics for smart cities
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
Large-scale data analytics for smart cities
Large-scale data analytics for smart citiesLarge-scale data analytics for smart cities
Large-scale data analytics for smart cities
 
Dynamic Data Analytics for the Internet of Things: Challenges and Opportunities
Dynamic Data Analytics for the Internet of Things: Challenges and OpportunitiesDynamic Data Analytics for the Internet of Things: Challenges and Opportunities
Dynamic Data Analytics for the Internet of Things: Challenges and Opportunities
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
Responsible Use of IoT Data in Research
Responsible Use of IoT Data in Research Responsible Use of IoT Data in Research
Responsible Use of IoT Data in Research
 
Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things
 
What is io t
What is io tWhat is io t
What is io t
 
Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things
 
IBM-ISSIP Presentation
IBM-ISSIP Presentation IBM-ISSIP Presentation
IBM-ISSIP Presentation
 
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing ResearchFuture Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
 
Working with real world data
Working with real world dataWorking with real world data
Working with real world data
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang Kesehatan
 
3TU.NIRICT
3TU.NIRICT3TU.NIRICT
3TU.NIRICT
 

Similar to Sls2018 5 gd-pshare-final[1]

User privacy in mobility data
User privacy in mobility data User privacy in mobility data
User privacy in mobility data Chiara Renso
 
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIJNSA Journal
 
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIJNSA Journal
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptxSyedSaqlain32
 
Top 10 cited Computer Networks & Communications Research Articles From 2017 I...
Top 10 cited Computer Networks & Communications Research Articles From 2017 I...Top 10 cited Computer Networks & Communications Research Articles From 2017 I...
Top 10 cited Computer Networks & Communications Research Articles From 2017 I...IJCNCJournal
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
10.1.1.10.527 (1)
10.1.1.10.527 (1)10.1.1.10.527 (1)
10.1.1.10.527 (1)nilesh_2188
 
Io t research_arpanpal_iem
Io t research_arpanpal_iemIo t research_arpanpal_iem
Io t research_arpanpal_iemArpan Pal
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Vehicle Monitoring System based On IOT, Using 4G/LTE
Vehicle Monitoring System based On IOT, Using 4G/LTEVehicle Monitoring System based On IOT, Using 4G/LTE
Vehicle Monitoring System based On IOT, Using 4G/LTEDr. Amarjeet Singh
 
SEMINAR REPORT (1)
SEMINAR REPORT (1)SEMINAR REPORT (1)
SEMINAR REPORT (1)AISWARYA T
 
Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...IRJET Journal
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of ThingsDeris Stiawan
 
So where are we now? The TDM landscape
So where are we now? The TDM landscapeSo where are we now? The TDM landscape
So where are we now? The TDM landscapeFutureTDM
 
Australia 5 Years Full Time PhD Research In Australia From 2006 To 2010 With ...
Australia 5 Years Full Time PhD Research In Australia From 2006 To 2010 With ...Australia 5 Years Full Time PhD Research In Australia From 2006 To 2010 With ...
Australia 5 Years Full Time PhD Research In Australia From 2006 To 2010 With ...Amber Ford
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
 
IRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET Journal
 

Similar to Sls2018 5 gd-pshare-final[1] (20)

User privacy in mobility data
User privacy in mobility data User privacy in mobility data
User privacy in mobility data
 
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
 
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
Top 10 cited Computer Networks & Communications Research Articles From 2017 I...
Top 10 cited Computer Networks & Communications Research Articles From 2017 I...Top 10 cited Computer Networks & Communications Research Articles From 2017 I...
Top 10 cited Computer Networks & Communications Research Articles From 2017 I...
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
10.1.1.10.527 (1)
10.1.1.10.527 (1)10.1.1.10.527 (1)
10.1.1.10.527 (1)
 
Io t research_arpanpal_iem
Io t research_arpanpal_iemIo t research_arpanpal_iem
Io t research_arpanpal_iem
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
Vehicle Monitoring System based On IOT, Using 4G/LTE
Vehicle Monitoring System based On IOT, Using 4G/LTEVehicle Monitoring System based On IOT, Using 4G/LTE
Vehicle Monitoring System based On IOT, Using 4G/LTE
 
SEMINAR REPORT (1)
SEMINAR REPORT (1)SEMINAR REPORT (1)
SEMINAR REPORT (1)
 
Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 
Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
 
So where are we now? The TDM landscape
So where are we now? The TDM landscapeSo where are we now? The TDM landscape
So where are we now? The TDM landscape
 
Australia 5 Years Full Time PhD Research In Australia From 2006 To 2010 With ...
Australia 5 Years Full Time PhD Research In Australia From 2006 To 2010 With ...Australia 5 Years Full Time PhD Research In Australia From 2006 To 2010 With ...
Australia 5 Years Full Time PhD Research In Australia From 2006 To 2010 With ...
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
IRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AI
 

More from Päivi Korpisaari

Korpisaari_Päätoimittajan_vastuuu.pdf
Korpisaari_Päätoimittajan_vastuuu.pdfKorpisaari_Päätoimittajan_vastuuu.pdf
Korpisaari_Päätoimittajan_vastuuu.pdfPäivi Korpisaari
 
Smart_cities_and_sustainability_Korpisaari.pdf
Smart_cities_and_sustainability_Korpisaari.pdfSmart_cities_and_sustainability_Korpisaari.pdf
Smart_cities_and_sustainability_Korpisaari.pdfPäivi Korpisaari
 
Korpisaari how to combat hate speech without sacrificing freedom of speech?
Korpisaari how to combat hate speech without sacrificing freedom of speech?Korpisaari how to combat hate speech without sacrificing freedom of speech?
Korpisaari how to combat hate speech without sacrificing freedom of speech?Päivi Korpisaari
 
Paikkatietomarkkinat 05112018
Paikkatietomarkkinat 05112018Paikkatietomarkkinat 05112018
Paikkatietomarkkinat 05112018Päivi Korpisaari
 
Journalistin rikosoikeudelinen vastuu -- Korpisaari
Journalistin rikosoikeudelinen vastuu -- KorpisaariJournalistin rikosoikeudelinen vastuu -- Korpisaari
Journalistin rikosoikeudelinen vastuu -- KorpisaariPäivi Korpisaari
 
Reconciling protection of personal data and journalistic freedom
Reconciling protection of personal data and journalistic freedomReconciling protection of personal data and journalistic freedom
Reconciling protection of personal data and journalistic freedomPäivi Korpisaari
 
Access to information korpisaari
Access to information korpisaariAccess to information korpisaari
Access to information korpisaariPäivi Korpisaari
 
Balancing the freedom of expression and right to private life korpisaari
Balancing the freedom of expression and right to private life korpisaariBalancing the freedom of expression and right to private life korpisaari
Balancing the freedom of expression and right to private life korpisaariPäivi Korpisaari
 
Yksityisyydensuojan tulevaisuus
Yksityisyydensuojan tulevaisuusYksityisyydensuojan tulevaisuus
Yksityisyydensuojan tulevaisuusPäivi Korpisaari
 

More from Päivi Korpisaari (10)

Korpisaari_Päätoimittajan_vastuuu.pdf
Korpisaari_Päätoimittajan_vastuuu.pdfKorpisaari_Päätoimittajan_vastuuu.pdf
Korpisaari_Päätoimittajan_vastuuu.pdf
 
Smart_cities_and_sustainability_Korpisaari.pdf
Smart_cities_and_sustainability_Korpisaari.pdfSmart_cities_and_sustainability_Korpisaari.pdf
Smart_cities_and_sustainability_Korpisaari.pdf
 
Korpisaari how to combat hate speech without sacrificing freedom of speech?
Korpisaari how to combat hate speech without sacrificing freedom of speech?Korpisaari how to combat hate speech without sacrificing freedom of speech?
Korpisaari how to combat hate speech without sacrificing freedom of speech?
 
Mita tsa muutti suomessa
Mita   tsa muutti suomessaMita   tsa muutti suomessa
Mita tsa muutti suomessa
 
Paikkatietomarkkinat 05112018
Paikkatietomarkkinat 05112018Paikkatietomarkkinat 05112018
Paikkatietomarkkinat 05112018
 
Journalistin rikosoikeudelinen vastuu -- Korpisaari
Journalistin rikosoikeudelinen vastuu -- KorpisaariJournalistin rikosoikeudelinen vastuu -- Korpisaari
Journalistin rikosoikeudelinen vastuu -- Korpisaari
 
Reconciling protection of personal data and journalistic freedom
Reconciling protection of personal data and journalistic freedomReconciling protection of personal data and journalistic freedom
Reconciling protection of personal data and journalistic freedom
 
Access to information korpisaari
Access to information korpisaariAccess to information korpisaari
Access to information korpisaari
 
Balancing the freedom of expression and right to private life korpisaari
Balancing the freedom of expression and right to private life korpisaariBalancing the freedom of expression and right to private life korpisaari
Balancing the freedom of expression and right to private life korpisaari
 
Yksityisyydensuojan tulevaisuus
Yksityisyydensuojan tulevaisuusYksityisyydensuojan tulevaisuus
Yksityisyydensuojan tulevaisuus
 

Recently uploaded

Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesFinlaw Associates
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 

Recently uploaded (20)

Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 

Sls2018 5 gd-pshare-final[1]

  • 1. 7.9.2018 1 5GANDLOCATIONDATAPRIVACY -THENEXTGENERATIONOFCHALLENGES FORDATAPROTECTION? Prof. Päivi Korpisaari & postdoc researcher Anette Alén-Savikko University of Helsinki SLS / 7 Sept 2018 • L. Chen, S. Thombre, K. Järvinen, E S. Lohan, A. Alén-Savikko, H. Leppäkoski, M. Z. H. Bhuiyan, S. Bu-Pasha, G. N. Ferrara, S. Honkala, J. Lindqvist, L. Ruotsalainen, P. Korpisaari & H. Kuusniemi: Robustness, Security and Privacy in Location-Based Services in Future IoT: A Survay. IEEE Access 2017. • E. S. Lohan, A. Alén-Savikko, L. Chen, K. Järvinen, H. Leppäkoski, H. Kuusniemi & P. Korpisaari, 5G positioning: security and privacy aspects, in M. Liyanage et al (eds) A Comprehensive Guide to 5G Security (Wiley Publishers 2018) 281-320. • Two forthcoming articles by A. Alén-Savikko / P. Korpisaari (co-author) respectively OUR RESEARCH SLS London 2018 Alén-Savikko & Korpisaari
  • 2. 7.9.2018 2 Our society relies increasingly on - wireless communication - IoT, smart localization tech, (location) data - location-based services (LSB) - (5G)  data protection / security & privacy concerns • sharing personal location data unintentionally or unknowingly • sensitive data (eg via tracking habits and movements) • EU law, GDPR, ePD(R) BACKGROUND SLS London 2018 Alén-Savikko & Korpisaari • art 4(1) personal data is defined as ‘any information relating to an identified or identifiable natural person’, while ‘an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person’ • GDPR art 9(1) “sensitive data” GDPR
  • 3. 7.9.2018 3 • GDPR, recital 26: • ‘When determining whether a natural person is identifiable, account should be taken of all the means reasonably likely to be used (...) To ascertain whether means are reasonably likely to be used to identify the natural person, account should be taken of all objective factors, such as the costs of and the amount of time required for identification, taking into consideration the available technology at the time of the processing and technological developments.’  restricts the use of spatial/geographic/location data (even if public data) PERSONAL LOCATION DATA SLS London 2018 Alén-Savikko & Korpisaari • location data is ‘any data with an implicit or explicit geographic or geospatial reference, ranging from address data to radio signal-based triangulation or IP address location’ (Leda Bargiotti et al: Guidelines for public administrations on location privacy. European Commission. JRC Technical Reports, European Union 2016, 9) • personal location data  ‘any location data directly or indirectly linked to an individual or that can be directly or indirectly used to identify an individual’; ‘This becomes possible by making any combination of (different/several) location and personal data.’ (Bargiotti 2016, 9)  any information, relating to, identified/identifiable, natural person GDPR art 4, recital 26 CJEU C-582/14 Breyer WP 136 LOCATION DATA SLS London 2018 Alén-Savikko & Korpisaari
  • 4. 7.9.2018 4 • updated features catering for new types of applications • greater speed, lower latency  reliability, capacity for numerous devices, massive connectivity, M2M communication, automation, AI etc. • eg millimeter (mm) waves (more banwidth), small cells (dense base stations), massive multiple-input multiple-output (MIMO) (many antennas), beamforming (traffic control), full duplex (simultaneous transmission and reception of signals) • “network slicing”; virtualization, softwarization  multiple network functions with one hardware 5G INANUTSHELL SLS London 2018 Alén-Savikko & Korpisaari (Lohan et al. 2018, 282)
  • 5. 7.9.2018 5 • Problems and challenges - individuals position and data flows in IoT / M2M: consenting? - personal data as an asset / method of payment - big data / analytics: data minimization? purpose limitation? (D)PbD? - misuse or unauthorized use of location data (secondary uses; terms of use) - data security: eg ill-secured devices, leakage of location data due to hacking or accident, non-transparent privacy policies esp. with regard to third-party use (Lohan et al. 2018; S. Khajuria & K. E. Skouby: Privacy and Economics in a 5G Environment. Wireless Personal Communications 95(1) 2017, 145-154) LOCATION PRIVACYAND SECURITY IN 5G • Privacy assistants • Encryption (eg identity verification, purpose specification) • Biometrics (eg access control) (Lohan et al. 2018, 310) • Rights or ownership of data (Khajuria & Skouby 2017; N. Purtova: The Illusion of Personal Data as No One’s Property. Law, Innovation, and Technology 7(1) 2015, 83-111) SOLUTION: ENHANCED USER CONTROL?
  • 6. 7.9.2018 6 • “It seems clear, however, from the above analysis that transparency is not sufficient to constitute a user side with relevant power […]. This can only be established with clearly established users’ rights to data—also in secondary and following usages. This again is a condition for a functioning 5G ecosystem.” (Khajuria & Skouby 2017, 153) • “the core question of data protection should be not if there should be property rights in personal data, but how to structure those property rights in a way that is both economically sound and respectful of the individual’s rights” (Purtova 2015, 111) SOLUTIONS: ENHANCED USER CONTROL? THANK YOU FOR YOUR ATTENTION 12