Difference between revisions of "ITU Activities"

From IPEN Wiki
Jump to: navigation, search
Line 13: Line 13:
  
 
== Standards and project ==
 
== Standards and project ==
 +
 +
=== SG17 Security ===
  
 
=== <span style="font-size: larger;">X.iotsec-3:&nbsp;</span>Technical framework of PII (Personally Identifiable Information) handling system in IoT environment ===
 
=== <span style="font-size: larger;">X.iotsec-3:&nbsp;</span>Technical framework of PII (Personally Identifiable Information) handling system in IoT environment ===

Revision as of 14:24, 30 August 2017

ITU.png

Introduction

Two study groups could address privacy standards:

A study group is structured into working parties and questions. For instance, SG17 includes working party 1 (telecommunication/ICT security), which includes question 6/17 (Security aspects of telecommunication services, networks and Internet of Things) 

can also create a focus group the role of which is to provide contributions that will later be an input to real standardisation work. For instance SG20 launched in March 2017 a Focus Group on Data Processing and Management to support IoT and Smart Cities & Communities: http://www.itu.int/en/ITU-T/focusgroups/dpm/Pages/default.aspx.

Standards and project

SG17 Security

X.iotsec-3: Technical framework of PII (Personally Identifiable Information) handling system in IoT environment

Chair

Yutaka Miyake, Bo Yu

Overview

IoT devices can collect many kinds of data, and some kinds of data include PII (Personally Identifiable Information). Because the PII data is useful for several kinds of services, they can be shared with multiple service providers. It is better for users to handle own data including PII in IoT environment based on their intention. Because the situation of data usage in IoT environment with multiple service providers will be complicated, the user's intention on data usage should be reflected flexibly. For example, if the IoT platform has the following functions, the user can recognize that the collected data including PII can be controlled properly. The users can set up PII control preference. This preference includes the list of permitted data for shared by each service provider. The collected data is controlled access based on the PII control preference. Unauthorized data cannot be shared with other service providers. The users can check the history log of data sharing among the service providers. The users can understand the timing of data usage. This Recommendation will provide the technical framework of PII handling system for IoT environment to fulfil these functions.

Web pages
Documentation
Comments