Technical framework of personally identifiable information handling system in Internet of things environment |
|
Internet of things (IoT) devices can collect many kinds of data, including personally identifiable information (PII). Because PII data are useful for different types of services, they may be shared among multiple service providers. It is better for users to manage their own data, including PII, in IoT environment based on their own intentions. As data usage in IoT environment with multiple service providers is complicated, user intentions for data usage should be accommodated flexibly. For example, if an IoT service provider provides the following functions, the user can appreciate that the service provider properly collects and controls data collected (including PII): – Users can configure their own PII preferences. These preferences include a list of data allowed to be shared with other service providers. – Collection and sharing of data are subject to controlled access based on PII preferences. Unauthorized data cannot be stored in data storage, and cannot be shared with other service providers. – Users can check history log of data sharing among service providers. Users can also check the time at which their data has been shared. Recommendation ITU-T X.1363 specifies a technical framework for PII handling in an IoT environment with single or multiple service providers.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/14087 |
Series title: |
X series: Data networks, open system communications and security X.1300-X.1499: Secure applications and services (II) X.1350-X.1369: Internet of things (IoT) security |
Approval date: |
2020-05-29 |
Provisional name: | X.iotsec-3 |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1363 (05/2020)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|