Analysis of Cloud Privacy and Security in Singapore and Hong Kong
VerifiedAdded on 2020/03/02
|11
|3345
|54
Report
AI Summary
This report examines cloud privacy and security practices in Singapore and Hong Kong, focusing on the deployment of smart sensors and cameras, Wi-Fi hotspots, and mobile device usage within smart city frameworks. It analyzes the impact of these technologies on both visitors and residents, highlighting the benefits of smart traffic management, sensor networks, and Wi-Fi connectivity. The report delves into the importance of data protection techniques for sensitive information, including the use of RFID security mechanisms and proactive monitoring tools. It addresses the maintenance of privacy while using mobile phones, emphasizing the role of digital identities, secure communication protocols, and cyber security governance. The analysis covers potential security threats, such as tampering, interception, and denial-of-service attacks, along with mitigation methods to ensure data integrity and user privacy in the context of smart city initiatives. The report concludes by emphasizing the need for comprehensive security measures to protect data and maintain user trust in the evolving technological landscape.

Cloud Privacy and Security
2017
2017
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Cloud Privacy and Security
Contents
1. Introduction:..................................................................................................................................2
2. Deployment of smart sensors and cameras at traffic lights, bus stops, and rubbish bin.................2
As a Visitor of Singapore:.................................................................................................................2
As a Resident of Singapore:..............................................................................................................3
3. Deployment of Sensor boxes to act as a Wi Fi hotspots throughout the city:................................3
As a Visitor of Singapore:.................................................................................................................4
As a Resident of Singapore:..............................................................................................................4
Sensitive information in the mobile Device.......................................................................................5
4. Maintenance of the privacy while using mobile phones:...............................................................5
5. Steps which should be undertaken to maintain digital Identity:.....................................................7
6. Conclusion:....................................................................................................................................8
7. References:....................................................................................................................................9
1
Contents
1. Introduction:..................................................................................................................................2
2. Deployment of smart sensors and cameras at traffic lights, bus stops, and rubbish bin.................2
As a Visitor of Singapore:.................................................................................................................2
As a Resident of Singapore:..............................................................................................................3
3. Deployment of Sensor boxes to act as a Wi Fi hotspots throughout the city:................................3
As a Visitor of Singapore:.................................................................................................................4
As a Resident of Singapore:..............................................................................................................4
Sensitive information in the mobile Device.......................................................................................5
4. Maintenance of the privacy while using mobile phones:...............................................................5
5. Steps which should be undertaken to maintain digital Identity:.....................................................7
6. Conclusion:....................................................................................................................................8
7. References:....................................................................................................................................9
1

Cloud Privacy and Security
1. Introduction:
In this paper we are looking forward to look on the approaches undertaken by the government
of Singapore and Hong Kong to manage information security and privacy.
2. Deployment of smart sensors and cameras at traffic lights, bus stops, and
rubbish bin.
The deployment of smart sensors and cameras at the traffic lights, bus stops, and rubbish bin
brings new scenario in the traffic management system of Hong Kong and Singapore. “The
smart traffic management system helps in controlling the fluctuation and brings coordination
in the traffic” (Chia, 2015). It helps in optimizing the flow of traffic and reducing vehicle
stoppage at traffic junction. The advantage of using smart traffic signal system helps in
limiting use of fuel without wastage, controlling the pollution; minimize wastage of time at
traffic junction, and others. The controllers are used for setting standards for connector,
intervals, and operating limits. The smart sensors are efficient in handling traffic at the road
which results in increasing the capacity of the road. The chance of collision and waiting time
is reduced to high extent. The vehicle operators and Pedestrians both can travel safer at road
side. The vehicle operators have to keep constant speed to match up green signal at the traffic
light which helps in reducing the waiting time at traffic junction. The traffic management
involves elimination of unnecessary starting and stopping of the traffic. The smart traffic
management system is capable of reducing the consumption of the fuel, reduction in the noise
and air pollution of the city, and limiting the wear and tear of the vehicles. The travel time of
the vehicle operator can be reduced due to the elimination of waiting time at the traffic
junction. The use of sensor network helps in getting the display of information related to the
position of bus from the bus stop. It will help to provide the information related to the arrival
of the bus. The handling of the rubbish bin using the sensor network helps in making the city
clean because it focuses on dumbing the waste into the dustbin. “The cleanliness of the city
helps in increasing the tourism in the country” (Cerrudo, 2015). The cleanliness helps in
ensuring the minimizing the occurrence of death causing diseases and develops a healthy
environment for the nation.
As a Visitor of Singapore:
The traffic management system helps the visitor to guide the path with the help of navigation
system. The visitor can check the correctness of the path towards their destination. The GPS
2
1. Introduction:
In this paper we are looking forward to look on the approaches undertaken by the government
of Singapore and Hong Kong to manage information security and privacy.
2. Deployment of smart sensors and cameras at traffic lights, bus stops, and
rubbish bin.
The deployment of smart sensors and cameras at the traffic lights, bus stops, and rubbish bin
brings new scenario in the traffic management system of Hong Kong and Singapore. “The
smart traffic management system helps in controlling the fluctuation and brings coordination
in the traffic” (Chia, 2015). It helps in optimizing the flow of traffic and reducing vehicle
stoppage at traffic junction. The advantage of using smart traffic signal system helps in
limiting use of fuel without wastage, controlling the pollution; minimize wastage of time at
traffic junction, and others. The controllers are used for setting standards for connector,
intervals, and operating limits. The smart sensors are efficient in handling traffic at the road
which results in increasing the capacity of the road. The chance of collision and waiting time
is reduced to high extent. The vehicle operators and Pedestrians both can travel safer at road
side. The vehicle operators have to keep constant speed to match up green signal at the traffic
light which helps in reducing the waiting time at traffic junction. The traffic management
involves elimination of unnecessary starting and stopping of the traffic. The smart traffic
management system is capable of reducing the consumption of the fuel, reduction in the noise
and air pollution of the city, and limiting the wear and tear of the vehicles. The travel time of
the vehicle operator can be reduced due to the elimination of waiting time at the traffic
junction. The use of sensor network helps in getting the display of information related to the
position of bus from the bus stop. It will help to provide the information related to the arrival
of the bus. The handling of the rubbish bin using the sensor network helps in making the city
clean because it focuses on dumbing the waste into the dustbin. “The cleanliness of the city
helps in increasing the tourism in the country” (Cerrudo, 2015). The cleanliness helps in
ensuring the minimizing the occurrence of death causing diseases and develops a healthy
environment for the nation.
As a Visitor of Singapore:
The traffic management system helps the visitor to guide the path with the help of navigation
system. The visitor can check the correctness of the path towards their destination. The GPS
2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Cloud Privacy and Security
system helps in knowing the location of the visitor in the emergency situation. The safety
procedures at the traffic junction helps in attracting the tourists towards the city helps
increasing the profit of the tourist industry. The newer technology becomes the centre of
attraction to the tourist. Everyone love their life and always prefer those destination which are
safer and healthy. The traffic management system helps in reducing the air pollution which
resolves the issues of breathing problems which is generally seen in the visitor because they
are not familiar with the living condition of the city. The surveillance system makes use of
cameras to monitor the central location of the visitors to act efficiently at the time of
emergency. The video analytical tools are used for analysing the behaviour of participant’s
data objects.
As a Resident of Singapore:
The sensor traffic signalling system is the boon to the resident of the Singapore city because
they can move around in the city freely without the headache of accidents. They can breathe
in the pollution free air. The traveling cost of the people can be reduced by saving their fuel
oils. The travelling time can be reduced by reducing the time wasted on the traffic signals.
The cloud computing technology provides the data centre for managing machine to machine
communication. The internet of things opens a new door for making the availability of the
data to the new applications. The RFID technology is used by the Singapore to provide smart
services like mass transportation, building access, library access, car parking, and shopping.
“It helps in providing the smooth life style with the innovation in the traffic management”
(Martin, 2016). The e-services at the traffic signals helps in making the political
announcement, booking of the parking space, monitoring of the traffic, minimizing the paper
usage, and others. The GPS system improves the safety of the people because the GPS helps
in analysing the current location of the vehicle operator which results in reducing the illegal
activities to occur.
3. Deployment of Sensor boxes to act as a Wi Fi hotspots throughout the city:
The smart cities deployed the sensor boxes to act as a Wi Fi hotspots throughout the city. It
helps in gaining attraction of the population, development of the budgetary plans, and helps
in remaining ahead of the competitors. The sustainability of the ICT helps in evolving
economic growth of the residential city. “The use of Wi Fi brings an new scenario in driving
economic competitiveness, sustainability of the environment, and development of the
liveability conditions” (Bemile, 2011). The economic growth of the city can be increased
3
system helps in knowing the location of the visitor in the emergency situation. The safety
procedures at the traffic junction helps in attracting the tourists towards the city helps
increasing the profit of the tourist industry. The newer technology becomes the centre of
attraction to the tourist. Everyone love their life and always prefer those destination which are
safer and healthy. The traffic management system helps in reducing the air pollution which
resolves the issues of breathing problems which is generally seen in the visitor because they
are not familiar with the living condition of the city. The surveillance system makes use of
cameras to monitor the central location of the visitors to act efficiently at the time of
emergency. The video analytical tools are used for analysing the behaviour of participant’s
data objects.
As a Resident of Singapore:
The sensor traffic signalling system is the boon to the resident of the Singapore city because
they can move around in the city freely without the headache of accidents. They can breathe
in the pollution free air. The traveling cost of the people can be reduced by saving their fuel
oils. The travelling time can be reduced by reducing the time wasted on the traffic signals.
The cloud computing technology provides the data centre for managing machine to machine
communication. The internet of things opens a new door for making the availability of the
data to the new applications. The RFID technology is used by the Singapore to provide smart
services like mass transportation, building access, library access, car parking, and shopping.
“It helps in providing the smooth life style with the innovation in the traffic management”
(Martin, 2016). The e-services at the traffic signals helps in making the political
announcement, booking of the parking space, monitoring of the traffic, minimizing the paper
usage, and others. The GPS system improves the safety of the people because the GPS helps
in analysing the current location of the vehicle operator which results in reducing the illegal
activities to occur.
3. Deployment of Sensor boxes to act as a Wi Fi hotspots throughout the city:
The smart cities deployed the sensor boxes to act as a Wi Fi hotspots throughout the city. It
helps in gaining attraction of the population, development of the budgetary plans, and helps
in remaining ahead of the competitors. The sustainability of the ICT helps in evolving
economic growth of the residential city. “The use of Wi Fi brings an new scenario in driving
economic competitiveness, sustainability of the environment, and development of the
liveability conditions” (Bemile, 2011). The economic growth of the city can be increased
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Cloud Privacy and Security
with the enhancement in the lifestyle of the people, creating new opportunities for urban
development, initiatives taken for eco-sustainability, improving the condition of political
process, and helps in improving the financial services provided to the resident of the city. The
facility of Wi-Fi builds the high capacity communication infrastructure. The flawless sharing
of information can take place between heterogeneous network which helps in improving the
efficiency of government, citizen, businesses, and others.
As a Visitor of Singapore:
The connectivity of the city through Wi-Fi brings a new scenario in providing better public
services to the visitors. The facility of transportation has been improved to the high extent.
The communication platforms connect the visitor with their loved ones who are far from
them. It helps in resolving the issues of theft and carrying of the illegal activity. “The Wi Fi
connectivity helps the visitor to get transport service, first aid service, and etc. at their door
step” (Sarre, 2010). It provides the display of the availability of the taxis and bus with their
timings. The use of Wi Fi brings a new scenario in driving economic competitiveness,
sustainability of the environment, and development of the liveability conditions.
As a Resident of Singapore:
The WI Fi connectivity helps in developing the strong communication medium between the
heterogeneous networks used by the participating units such as government, businesses, and
citizen. The growth of the city will increase with the expansion of relationship between
government to government, government and business, government and citizens, business and
citizen, and others. “The flawless communication plan increases the capability and
performance of the government, businesses, and employees” (Wang, 2009). The cloud
computing technology provides the data centre for managing machine to machine
communication. The internet of things opens a new door for making the availability of the
data to the new applications. The sustainable environment is created for the resident of the
city by having control on the pollution, waste, and lighting. The accessing of the information
at mobile location increases the quality of services provided by the employees and high
officials of the business which result into the growth of nation economy. The quality of life
can be improved with the advancement in economic activity, increasing efficiency of the
infrastructure, accessing of data on mobile location, distribution of energy and its
consumption, safety measures for environment, digital inclusion, better practices of the
government, and works in the welfare of the citizen
4
with the enhancement in the lifestyle of the people, creating new opportunities for urban
development, initiatives taken for eco-sustainability, improving the condition of political
process, and helps in improving the financial services provided to the resident of the city. The
facility of Wi-Fi builds the high capacity communication infrastructure. The flawless sharing
of information can take place between heterogeneous network which helps in improving the
efficiency of government, citizen, businesses, and others.
As a Visitor of Singapore:
The connectivity of the city through Wi-Fi brings a new scenario in providing better public
services to the visitors. The facility of transportation has been improved to the high extent.
The communication platforms connect the visitor with their loved ones who are far from
them. It helps in resolving the issues of theft and carrying of the illegal activity. “The Wi Fi
connectivity helps the visitor to get transport service, first aid service, and etc. at their door
step” (Sarre, 2010). It provides the display of the availability of the taxis and bus with their
timings. The use of Wi Fi brings a new scenario in driving economic competitiveness,
sustainability of the environment, and development of the liveability conditions.
As a Resident of Singapore:
The WI Fi connectivity helps in developing the strong communication medium between the
heterogeneous networks used by the participating units such as government, businesses, and
citizen. The growth of the city will increase with the expansion of relationship between
government to government, government and business, government and citizens, business and
citizen, and others. “The flawless communication plan increases the capability and
performance of the government, businesses, and employees” (Wang, 2009). The cloud
computing technology provides the data centre for managing machine to machine
communication. The internet of things opens a new door for making the availability of the
data to the new applications. The sustainable environment is created for the resident of the
city by having control on the pollution, waste, and lighting. The accessing of the information
at mobile location increases the quality of services provided by the employees and high
officials of the business which result into the growth of nation economy. The quality of life
can be improved with the advancement in economic activity, increasing efficiency of the
infrastructure, accessing of data on mobile location, distribution of energy and its
consumption, safety measures for environment, digital inclusion, better practices of the
government, and works in the welfare of the citizen
4

Cloud Privacy and Security
Sensitive information in the mobile Device
The sensitive data of the mobile phones requires the data protection techniques for ensuring
the restriction to the unauthorised access of data. The integration of data protection strategies
helps in exploring the flow of data in the smart cities. The Smart sustainable cities require
protection measures to secure data from the potential cyber threats. The RFID security
mechanism should be used for protecting data from the occurrence of the privacy risks. “The
explosion of data can be protected by involving the real time information management
system which is used for storing and retrieving the data securely” (Cheung, 2015). The
security system should involves the development of the key management system, technical
management system, and identity management system. The cyber security governance
framework should be deployed for coordinating the efforts of the government and the citizen
to cope up with the problem of data leakage in the smart city. The multiple sensors are used
for collecting information at the central location so that only the authorised person will get
the access of the information. The proactive monitoring tools are used for triggering the
alarm to provide immediate response by the participating units. The integration of the data
helps in taking better decision at the time of emergency. The smooth flow of knowledge
transfer can efficiently carried out in the smart city.
4. Maintenance of the privacy while using mobile phones:
The communication between the mobile devices takes place through the unique digital
identity of the user. The digital identities help in making interaction participating units for
enhancing the sharing of information. The digital identities help in making secure
relationship between users. The set of credentials are provided to the user for secure transfer
of information. The security is the major concern in the development of smart cities. The
devices working on the heterogeneous network faces the problem of insufficient
authentication methods. Sometimes the devices are not able to encrypt data for transferring
over the network. “The vulnerabilities are associated with the management of poor session,
weak credentials used for encryptions, and other cross site vulnerabilities” (Lau, 2015). The
configuration of the default credential should be done for providing secure communication.
The management of the privacy can be done by performing the analysis of the base devices
which are used for the communication. The flow of information between the connected
devices through digital identity helps in restricting the flow of confidential information
between the participating units. The security properties of the base devices should be
5
Sensitive information in the mobile Device
The sensitive data of the mobile phones requires the data protection techniques for ensuring
the restriction to the unauthorised access of data. The integration of data protection strategies
helps in exploring the flow of data in the smart cities. The Smart sustainable cities require
protection measures to secure data from the potential cyber threats. The RFID security
mechanism should be used for protecting data from the occurrence of the privacy risks. “The
explosion of data can be protected by involving the real time information management
system which is used for storing and retrieving the data securely” (Cheung, 2015). The
security system should involves the development of the key management system, technical
management system, and identity management system. The cyber security governance
framework should be deployed for coordinating the efforts of the government and the citizen
to cope up with the problem of data leakage in the smart city. The multiple sensors are used
for collecting information at the central location so that only the authorised person will get
the access of the information. The proactive monitoring tools are used for triggering the
alarm to provide immediate response by the participating units. The integration of the data
helps in taking better decision at the time of emergency. The smooth flow of knowledge
transfer can efficiently carried out in the smart city.
4. Maintenance of the privacy while using mobile phones:
The communication between the mobile devices takes place through the unique digital
identity of the user. The digital identities help in making interaction participating units for
enhancing the sharing of information. The digital identities help in making secure
relationship between users. The set of credentials are provided to the user for secure transfer
of information. The security is the major concern in the development of smart cities. The
devices working on the heterogeneous network faces the problem of insufficient
authentication methods. Sometimes the devices are not able to encrypt data for transferring
over the network. “The vulnerabilities are associated with the management of poor session,
weak credentials used for encryptions, and other cross site vulnerabilities” (Lau, 2015). The
configuration of the default credential should be done for providing secure communication.
The management of the privacy can be done by performing the analysis of the base devices
which are used for the communication. The flow of information between the connected
devices through digital identity helps in restricting the flow of confidential information
between the participating units. The security properties of the base devices should be
5
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Cloud Privacy and Security
checked. The verification of the interfaces should be done periodically. The validation and
verification procedures should be checked for securing the high level requirement. The
authorization and authentication protocols should be used for deploying the software as a
service platform to check the identity of the participating units. The cyber security
governance framework should be deployed for coordinating the efforts of the government and
the citizen to cope up with the problem of data leakage in the smart city. The review of the
secure code helps in creating sensitivity and security of the booting process by making use of
encryption modules.
The digital identity can be managed from the attacks by making use of mitigation policies
and methods. The following tables helps in determining the attacks and what are the
countermeasures to overcome the current scenario:
Particulars Scenario of the Attacks Mitigation methods and
policies
Gateway The tampering and
interception activities can
occurred in performing the
communication between the
participating units
“The secure socket layer
should be used incorporation
with transport layer security
for overcoming the situation
of tampering and interception
in the communication
process” (Shacklett, 2013)
Service Denial of service attack is the
main concern area for the
spoofing of identifier
“The secure socket layer
should be used incorporation
with transport layer security”
(Gong, 2015)
Monitoring of the server for
keeping proper management
of the traffic control
Web Interface The data theft can occur in
the MySQL database by
making us of SQL query
The parameterised SQL
statement should be used for
creating the databases
6
checked. The verification of the interfaces should be done periodically. The validation and
verification procedures should be checked for securing the high level requirement. The
authorization and authentication protocols should be used for deploying the software as a
service platform to check the identity of the participating units. The cyber security
governance framework should be deployed for coordinating the efforts of the government and
the citizen to cope up with the problem of data leakage in the smart city. The review of the
secure code helps in creating sensitivity and security of the booting process by making use of
encryption modules.
The digital identity can be managed from the attacks by making use of mitigation policies
and methods. The following tables helps in determining the attacks and what are the
countermeasures to overcome the current scenario:
Particulars Scenario of the Attacks Mitigation methods and
policies
Gateway The tampering and
interception activities can
occurred in performing the
communication between the
participating units
“The secure socket layer
should be used incorporation
with transport layer security
for overcoming the situation
of tampering and interception
in the communication
process” (Shacklett, 2013)
Service Denial of service attack is the
main concern area for the
spoofing of identifier
“The secure socket layer
should be used incorporation
with transport layer security”
(Gong, 2015)
Monitoring of the server for
keeping proper management
of the traffic control
Web Interface The data theft can occur in
the MySQL database by
making us of SQL query
The parameterised SQL
statement should be used for
creating the databases
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Cloud Privacy and Security
Sanitizing should be done for
SQL injection
Communication with the
third party application
The tampering and
interception activities can
occurred in performing the
communication between the
participating units
The secure socket layer
should be used incorporation
with transport layer security
for overcoming the situation
of tampering and interception
in the communication
process
Data stores The use of weak credential
can be easily hacked by the
hackers to get the
authorization of the
information
Collection of required data
High level credentials
The flow of information between the connected devices through digital identity helps in
restricting the flow of confidential information between the participating units. The procedure
of authentication and authorization helps in managing the flow of confidential and sensitive
information between the units which have the authorization for it. The hackers are not able to
break the information of the remote command. The robust identity technology management
system should be used for managing the flawless communication between the users and
preserving the confidentiality of the information.
5. Steps which should be undertaken to maintain digital Identity:
The steps which should be undertaken to ensure the security and privacy of digital identity
while working on mobile devices in the smart cities are as follows:
“The transfer of data should be equipped with the end to end encryption of the data
stored in the mobile devices. This is the cost effective methods for carrying secure
transmission of data” (Kelvin, 2015).
The strong password should be created for restricting the data transfer to the
unauthorised person. It is not easy for the hackers to crack the strong password to get
the access of the information to perform illegal activities.
7
Sanitizing should be done for
SQL injection
Communication with the
third party application
The tampering and
interception activities can
occurred in performing the
communication between the
participating units
The secure socket layer
should be used incorporation
with transport layer security
for overcoming the situation
of tampering and interception
in the communication
process
Data stores The use of weak credential
can be easily hacked by the
hackers to get the
authorization of the
information
Collection of required data
High level credentials
The flow of information between the connected devices through digital identity helps in
restricting the flow of confidential information between the participating units. The procedure
of authentication and authorization helps in managing the flow of confidential and sensitive
information between the units which have the authorization for it. The hackers are not able to
break the information of the remote command. The robust identity technology management
system should be used for managing the flawless communication between the users and
preserving the confidentiality of the information.
5. Steps which should be undertaken to maintain digital Identity:
The steps which should be undertaken to ensure the security and privacy of digital identity
while working on mobile devices in the smart cities are as follows:
“The transfer of data should be equipped with the end to end encryption of the data
stored in the mobile devices. This is the cost effective methods for carrying secure
transmission of data” (Kelvin, 2015).
The strong password should be created for restricting the data transfer to the
unauthorised person. It is not easy for the hackers to crack the strong password to get
the access of the information to perform illegal activities.
7

Cloud Privacy and Security
Periodically, the firewalls and antivirus should be kept updated.
The steps should be taken to create audit logs
The trusted resources should be kept isolated from the public resources
The manuals should be incorporated with the use of every system
“The data protection strategy should be developed to restrict the profiling and
collection of process data” (Eriks, 2016)
The digital access control system should be used for ensuring the authorisation to the
people to access the sensitive data of the mobile devices. It is used for allocating the
information to the authorised party only.
Privacy enhancing technologies are used for protecting the information related to the
digital identity of the person. The coherent system for ICT technology is used for
eliminating the personal data. It helps in securing the digital identity of the person and
helps in retaining the confidentiality of the information. This technology is used for
handling the information of the data brokers and web browsers.
“The tools which are used by the PET technology are classified as ad blocker,
removers, cookie blocker, detection of the malware, blocking of the site, encryption
tools, and services used by the data brokers” (Brown, 2015).
The cyber security framework should be adopted
Cyber security checklist should be issued.
Encryption, authentication, and authorisation programmes should be implemented.
“The relationship can be developed between the users with the use of digital identities”
(Morris, 2015). The encrypted messages should be sent between the communicating units to
preserve the confidentiality of the information.
6. Conclusion:
The development of the sensor network in the city helps in bringing the vast changes in the
lifestyle of the resident citizen of the Hong Kong and Singapore. The deployment of
mitigation technologies helps in managing the security of the free flowing information
between the participating units. The confidential information should be kept private with the
public resources to reduce the chance of data leakage.
8
Periodically, the firewalls and antivirus should be kept updated.
The steps should be taken to create audit logs
The trusted resources should be kept isolated from the public resources
The manuals should be incorporated with the use of every system
“The data protection strategy should be developed to restrict the profiling and
collection of process data” (Eriks, 2016)
The digital access control system should be used for ensuring the authorisation to the
people to access the sensitive data of the mobile devices. It is used for allocating the
information to the authorised party only.
Privacy enhancing technologies are used for protecting the information related to the
digital identity of the person. The coherent system for ICT technology is used for
eliminating the personal data. It helps in securing the digital identity of the person and
helps in retaining the confidentiality of the information. This technology is used for
handling the information of the data brokers and web browsers.
“The tools which are used by the PET technology are classified as ad blocker,
removers, cookie blocker, detection of the malware, blocking of the site, encryption
tools, and services used by the data brokers” (Brown, 2015).
The cyber security framework should be adopted
Cyber security checklist should be issued.
Encryption, authentication, and authorisation programmes should be implemented.
“The relationship can be developed between the users with the use of digital identities”
(Morris, 2015). The encrypted messages should be sent between the communicating units to
preserve the confidentiality of the information.
6. Conclusion:
The development of the sensor network in the city helps in bringing the vast changes in the
lifestyle of the resident citizen of the Hong Kong and Singapore. The deployment of
mitigation technologies helps in managing the security of the free flowing information
between the participating units. The confidential information should be kept private with the
public resources to reduce the chance of data leakage.
8
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Cloud Privacy and Security
7. References:
Lau, Y. (2015). Cyber in cloud: Risks and Response in Hong Kong, Singapore. Retrieved
from https://books.google.co.in/books?
id=meycBAAAQBAJ&pg=PA17&lpg=PA17&dq=Cyber+crime+in+cloud:
+Risk+and+response+in+hong+kong,+Singapore+(Lau,
+2015)&source=bl&ots=E74oC22JIm&sig=F5YeKV3Qr8zqRcenWz9kgHFONaU&
hl=en&sa=X&ved=0ahUKEwi_vdmnquvVAhXBo48KHWB-
DUcQ6AEIOzAC#v=onepage&q=Cyber%20crime%20in%20cloud%3A%20Risk
%20and%20response%20in%20hong%20kong%2C%20Singapore%20(Lau%2C
%202015)&f=false
Cheung, C. (2015). Cyber crime risks and responses: Eastern and western perspectives.
Retrieved from http://www.palgrave.com/us/book/9781137474155
Sarre, R. (2010). Cybercrime and computer digital forensics. Retrieved from
http://onlinelibrary.wiley.com/store/10.1111/(ISSN)1365-2575/asset/homepages/
Ver05FinalverISJSpecial_Issue_ICCCf2017Aus.pdf;jsessionid=884F13F162E5FDC3
F1394EC75F571EED.f01t02?
v=1&s=72299830be90d546796cdd5b89e67424a69b4b67&isAguDoi=false
Martin, A. (2016). Security and privacy impact of a unique personal identifier. Retrieved
from
https://www.politics.ox.ac.uk/materials/publications/14987/workingpaperno4martinm
artinovic.pdf
Bemile, R. (2011). Digital identity management. Retrieved from
http://www.oecd.org/sti/ieconomy/49338380.pdf
Eriks, R. (2016). Consumer digital identity. Retrieved from
https://diacc.ca/wp-content/uploads/2017/02/Consumer-Digital-Identity-Companion-
Paper.pdf
Wang, W. (2009). The role of digital identity management in the internet economy. Retrieved
from http://www.umic.pt/images/stories/publicacoes5/eID%20Management.pdf
9
7. References:
Lau, Y. (2015). Cyber in cloud: Risks and Response in Hong Kong, Singapore. Retrieved
from https://books.google.co.in/books?
id=meycBAAAQBAJ&pg=PA17&lpg=PA17&dq=Cyber+crime+in+cloud:
+Risk+and+response+in+hong+kong,+Singapore+(Lau,
+2015)&source=bl&ots=E74oC22JIm&sig=F5YeKV3Qr8zqRcenWz9kgHFONaU&
hl=en&sa=X&ved=0ahUKEwi_vdmnquvVAhXBo48KHWB-
DUcQ6AEIOzAC#v=onepage&q=Cyber%20crime%20in%20cloud%3A%20Risk
%20and%20response%20in%20hong%20kong%2C%20Singapore%20(Lau%2C
%202015)&f=false
Cheung, C. (2015). Cyber crime risks and responses: Eastern and western perspectives.
Retrieved from http://www.palgrave.com/us/book/9781137474155
Sarre, R. (2010). Cybercrime and computer digital forensics. Retrieved from
http://onlinelibrary.wiley.com/store/10.1111/(ISSN)1365-2575/asset/homepages/
Ver05FinalverISJSpecial_Issue_ICCCf2017Aus.pdf;jsessionid=884F13F162E5FDC3
F1394EC75F571EED.f01t02?
v=1&s=72299830be90d546796cdd5b89e67424a69b4b67&isAguDoi=false
Martin, A. (2016). Security and privacy impact of a unique personal identifier. Retrieved
from
https://www.politics.ox.ac.uk/materials/publications/14987/workingpaperno4martinm
artinovic.pdf
Bemile, R. (2011). Digital identity management. Retrieved from
http://www.oecd.org/sti/ieconomy/49338380.pdf
Eriks, R. (2016). Consumer digital identity. Retrieved from
https://diacc.ca/wp-content/uploads/2017/02/Consumer-Digital-Identity-Companion-
Paper.pdf
Wang, W. (2009). The role of digital identity management in the internet economy. Retrieved
from http://www.umic.pt/images/stories/publicacoes5/eID%20Management.pdf
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Cloud Privacy and Security
Gong, L. (2015). Smart Traffic light. Retrieved from
https://www.cmu.edu/epp/people/faculty/course-reports/SURTRAC%20Final
%20Report.pdf
Morris, D. (2015). Smart cars meet smart signals. Retrieved from
http://fortune.com/2015/08/20/smart-traffic-signals/
Kelvin, M. (2015). Issues paper on smart cities and infrastructure. Retrieved from
http://unctad.org/meetings/en/SessionalDocuments/CSTD_2015_Issuespaper_Theme
1_SmartCitiesandInfra_en.pdf
Brown, R. (2015). Smart cities and the internet of things. Retrieved from
https://h20195.www2.hpe.com/v2/getpdf.aspx/4AA6-5129ENW.pdf?ver=2.1
Shacklett, S. (2013). Cyber security, data protection, and cyber resilience in smart sustainable
cities. Retrieved from http://www.google.co.in/url?sa=t&rct=j&q=Sensitive
%20information%20in%20the%20mobile%20Device%20can%20be%20affected
%20with%20the%20wifi%20connection%20to%20develop%20smart
%20cities&source=web&cd=3&cad=rja&uact=8&ved=0ahUKEwix-qrfm-
3VAhWLO48KHVNwBPoQFggwMAI&url=http://www.itu.int/en/ITU-T/
focusgroups/ssc/Documents/website/web-fg-ssc-0090-r7-
technical_report_on_ICT_infrastructure_for_resilience_security.doc&usg=AFQjCNE
ng1BIXOnPYOfO-TqMEMAH1wPy0Q
Chia, J. (2015). Cyber security a necessary pillar of smart cities. Retrieved from
http://www.ey.com/Publication/vwLUAssets/ey-cyber-security-a-necessary-pillar-of-
smart-cities/$FILE/ey-cyber-security-a-necessary-pillar-of-smart-cities.pdf
Cerrudo, C. (2015). Keeping smart cities smart: Preempting emerging cyber attacks in U.S.
cities. Retrieved from http://icitech.org/wp-content/uploads/2015/06/ICIT-Smart-
Cities-Brief1.pdf
10
Gong, L. (2015). Smart Traffic light. Retrieved from
https://www.cmu.edu/epp/people/faculty/course-reports/SURTRAC%20Final
%20Report.pdf
Morris, D. (2015). Smart cars meet smart signals. Retrieved from
http://fortune.com/2015/08/20/smart-traffic-signals/
Kelvin, M. (2015). Issues paper on smart cities and infrastructure. Retrieved from
http://unctad.org/meetings/en/SessionalDocuments/CSTD_2015_Issuespaper_Theme
1_SmartCitiesandInfra_en.pdf
Brown, R. (2015). Smart cities and the internet of things. Retrieved from
https://h20195.www2.hpe.com/v2/getpdf.aspx/4AA6-5129ENW.pdf?ver=2.1
Shacklett, S. (2013). Cyber security, data protection, and cyber resilience in smart sustainable
cities. Retrieved from http://www.google.co.in/url?sa=t&rct=j&q=Sensitive
%20information%20in%20the%20mobile%20Device%20can%20be%20affected
%20with%20the%20wifi%20connection%20to%20develop%20smart
%20cities&source=web&cd=3&cad=rja&uact=8&ved=0ahUKEwix-qrfm-
3VAhWLO48KHVNwBPoQFggwMAI&url=http://www.itu.int/en/ITU-T/
focusgroups/ssc/Documents/website/web-fg-ssc-0090-r7-
technical_report_on_ICT_infrastructure_for_resilience_security.doc&usg=AFQjCNE
ng1BIXOnPYOfO-TqMEMAH1wPy0Q
Chia, J. (2015). Cyber security a necessary pillar of smart cities. Retrieved from
http://www.ey.com/Publication/vwLUAssets/ey-cyber-security-a-necessary-pillar-of-
smart-cities/$FILE/ey-cyber-security-a-necessary-pillar-of-smart-cities.pdf
Cerrudo, C. (2015). Keeping smart cities smart: Preempting emerging cyber attacks in U.S.
cities. Retrieved from http://icitech.org/wp-content/uploads/2015/06/ICIT-Smart-
Cities-Brief1.pdf
10
1 out of 11
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.