Post on 04-Jul-2015
description
INSTITUTE OF APPLIED INFORMATICS AND FORMAL DESCRIPTION METHODS† AND ZENTRUM FUR ANGEWANDTE RECHTSWISSENSCHAFT‡
Web Technologies and Privacy Policiesfor the Smart Grid
Sebastian Speiser†, Andreas Wagner†, Oliver Raabe‡ and Andreas Harth† | Energieinformatik 2013
KIT – University of the State of Baden-Wuerttemberg and
National Laboratory of the Helmholtz Association
www.kit.edu
Agenda
1 Introduction
2 ICT Architecture and Data Model
3 Use-Case I
4 Policies for a Privacy-aware Smart Grid
5 Use-Case II
6 Evaluation
7 Conclusion
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 2/41
Introduction
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 3/41
(Some) Key ICT Requirements
Requirements, see [2, 3]R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic andsemantic data content.
R4 Users decide what data in whichgranularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
(Some) Key ICT Requirements
Requirements, see [2, 3]R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic andsemantic data content.
R4 Users decide what data in whichgranularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
(Some) Key ICT Requirements
Requirements, see [2, 3]R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic andsemantic data content.
R4 Users decide what data in whichgranularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
(Some) Key ICT Requirements
Requirements, see [2, 3]R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic andsemantic data content.
R4 Users decide what data in whichgranularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
(Some) Key ICT Requirements
Requirements, see [2, 3]R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic andsemantic data content.
R4 Users decide what data in whichgranularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
Contributions
R1-R3: Semantic Web communication architecture (Section 2).
R4: Policy model (Section 4).
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 5/41
Contributions
R1-R3: Semantic Web communication architecture (Section 2).
R4: Policy model (Section 4).
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 5/41
Communication Architecture
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 6/41
Overview: A Semantic Web-basedCommunication Architecture I
Data access layersURIs for identification of participants.
TCP/IP stack with HTTP as transfer protocol.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 7/41
Overview: A Semantic Web-basedCommunication Architecture I
Data access layersURIs for identification of participants.
TCP/IP stack with HTTP as transfer protocol.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 7/41
Overview of a Semantic Web-basedCommunication Architecture II
Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
Overview of a Semantic Web-basedCommunication Architecture II
Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
Overview of a Semantic Web-basedCommunication Architecture II
Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
Overview of a Semantic Web-basedCommunication Architecture II
Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
Overview of a Semantic Web-basedCommunication Architecture II
Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
Use-Case I
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 9/41
Use-Case I (iZEUS) – Smart Grid/TrafficService Platform – Data Management I
Service Platform
Smart Traffic
Navigator
Smart Meter
Analyzer
Service Requests
...
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 10/41
Use-Case I (iZEUS) – Smart Grid/TrafficService Platform – Data Management II
car:uamp760e3
Service Platform
car:uamp760e2car:uamp760e1
Service Requests
Linked DataEndpoint
Smart Traffic
Navigator
Smart Meter
Analyzer
...
RDFData
Data logging
car:uamp760e rdf:type sg:Vehicle ;
foaf:name "UltraAmp 760e" .
geo:location _:loc20130331 .
_:loc20100331 dc:date "2013-03-31T12:23:45";
geo:lat "49.0047222" ;
geo:lon "8.3858333" .
RDFData
RDFData
RDFData
Get additional data
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 11/41
Use-Case I (iZEUS) – Smart Grid/TrafficService Platform – Data Management III
sm:apt
sm:meter
car:uamp760e3
RDF
RDF
RDF
TCP/IP/HTTP
Service Platform
car:uamp760e2
car:uamp760e1
RDFdata logging
Service Requests
Linked DataEndpoint
Smart home at KIT
WWW
Smart Traffic
Navigator
Smart Meter
Analyzer
...
Data logging
Future work
RDFData
RDFData
RDFData
RDFData
RDFData
RDFData
RDFData
Get additional data
Get additional data
Get additional data
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 12/41
Use-Case I (iZEUS) – Smart Grid/TrafficService Platform – Data Management IV
sm:apt
sm:meter
car:uamp760e3
RDF
RDF
RDF
TCP/IP/HTTP
Service Platform
car:uamp760e2
car:uamp760e1
Data logging
Data logging
Service Requests
Linked DataEndpoint
Smart home at KIT
WWW
Gridpedia as data model
Smart Traffic
Navigator
Smart Meter
Analyzer
...
Future work
RDFData
RDFData
RDFData
RDFData
RDFData
RDFData
RDFData
Get additional data
Get additional data
Get additional data
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 13/41
Privacy Policies
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 14/41
Policy Model
IntuitionPolicies model user intent, thus, they help to preserve data privacy.
A Policy is bound to its associated data.
Policies are taken into account whenever data is accessed.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41
Policy Model
IntuitionPolicies model user intent, thus, they help to preserve data privacy.
A Policy is bound to its associated data.
Policies are taken into account whenever data is accessed.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41
Policy Model
IntuitionPolicies model user intent, thus, they help to preserve data privacy.
A Policy is bound to its associated data.
Policies are taken into account whenever data is accessed.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41
Policy Model II
Usage
Purpose
Policy
AgentDescriptionDate Perspective
validFrom validTo perspective
allows
recipientpurpose
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 16/41
Policy-aware Data Access
Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity andpurpose.
iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
Policy-aware Data Access
Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity andpurpose.
iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
Policy-aware Data Access
Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity andpurpose.
iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
Policy-aware Data Access
Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity andpurpose.
iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
Policy-aware Data Access
Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity andpurpose.
iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
Use-Case II
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 18/41
Use-Case II (iZEUS) – Smart Grid/TrafficService Platform – Data Privacy I
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 19/41
Use-Case II (iZEUS) – Smart Grid/TrafficService Platform – Data Privacy II
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 20/41
Evaluation
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 21/41
Scope of Evaluation
Our previous works aimed at evaluation of privacy policies viaGerman privacy laws [1, 4].
This works evaluates the practical feasibility of privacy policies stored(matched) on lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 22/41
Scope of Evaluation
Our previous works aimed at evaluation of privacy policies viaGerman privacy laws [1, 4].
This works evaluates the practical feasibility of privacy policies stored(matched) on lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 22/41
Evaluation Setting
We implemented a policy matcher based on Rasqal1.Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.
We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.
For each size, 10 policies with random allowed usages were matchedagainst every request.2
1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
Evaluation Setting
We implemented a policy matcher based on Rasqal1.Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.
We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.
For each size, 10 policies with random allowed usages were matchedagainst every request.2
1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
Evaluation Setting
We implemented a policy matcher based on Rasqal1.Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.
We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.
For each size, 10 policies with random allowed usages were matchedagainst every request.2
1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
Evaluation Setting
We implemented a policy matcher based on Rasqal1.Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.
We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.
For each size, 10 policies with random allowed usages were matchedagainst every request.2
1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
Evaluation Setting
We implemented a policy matcher based on Rasqal1.Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.
We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.
For each size, 10 policies with random allowed usages were matchedagainst every request.2
1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
Evaluation Setting
We implemented a policy matcher based on Rasqal1.Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.
We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.
For each size, 10 policies with random allowed usages were matchedagainst every request.2
1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
Evaluation Results
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7
0 10 20 30 40 50 60 70 80
mat
chin
g tim
e in
sec
onds
policy size
Allowed Core2DuoDenied Core2Duo
Allowed ARMDenied ARM
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 24/41
Conclusion
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 25/41
Conclusion
By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
Conclusion
By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
Conclusion
By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
Conclusion
By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
Conclusion
By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
Slides will be available at http://slideshare.net/Paper will be available at http://aifb.kit.edu/
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 27/41
Acknowledgements: iZEUS Project
This work was supported by the German Federal Ministry of Economics andTechnology (E-Energy iZEUS, Grant 01 ME12013). The authors are responsiblefor the content of the presentation.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 28/41
References
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 29/41
References I
Oliver Raabe.Datenschutz im SmartGrid.Datenschutz und Datensicherheit, 2010.
S. Rohjans, C. Danekas, and M. Uslar.Requirements for Smart Grid ICT-architectures.In ISGT, 2012.
Andreas Wagner, Sebastian Speiser, and Andreas Harth.Semantic Web Technologies for a Smart Energy Grid: Requirementsand Challenges.In ISWC, 2010.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 30/41
References II
Andreas Wagner, Sebastian Speiser, Oliver Raabe, and AndreasHarth.Linked Data for a Privacy-aware Smart Grid.In GI Jahrestagung, 2010.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 31/41
Backup Slides
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 32/41
Use-Case I (iZEUS) – CollaborativeSmart Grid Ontology – Gripedia I
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 33/41
Use-Case I (iZEUS) – CollaborativeSmart Grid Ontology – Gripedia II
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 34/41
Use-Case I (iZEUS) – CollaborativeSmart Grid Ontology – Gripedia III
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 35/41
Linked Data for the Smart Grid –Example
Customer
Electric Vehicleex:uamp760e
Smart Meterex:sm
Washing Machineex:coolWash
ex:Mary
Energy EfficiencyService Provider
Metering ProviderA
Cool Wash Inc.
Service ProviderMarkets
ChargingStation
(off-premise)
Metering Provider B(third party provider)
BillingClearing
Premiseex:apt
Legend
CommunicationFlow
Actor
Domain
Network
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 36/41
Linked Data for the Smart Grid –Example II
Mary’s Linked Data
/ / lookup on ex : coolWash ; data res ides a t washing machineex : coolWash
r d f : type sg : Appl iance ;sg : manufacturer <h t t p : / / coolWash . com/ company>;sg : owner ex : mary ;sg : washingData washer : program40 ;sg : consumption sm: data20100310 .
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 37/41
Linked RDF Data for the Smart Grid III
Mary’s Linked Data II
/ / lookup on sm: data20100310 ; data res ides a t smart metersm: data20100310
r d f : type sg : Consumption ;r d f : value ” 1 . 0 4 ” ˆ ˆ sg :kWh;i c a l : d t s t a r t ”2010−03−10T00 : 0 0 : 0 0 ” ;i c a l : dtend ”2010−03−10T01 : 0 0 : 0 0 ” .
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 38/41
Policy-aware Data Access II
Matching procedureThe matching procedure is implemented as a rule, checking whether . . .
i) requestor is subsumed by the recipient description and
ii) the requested purpose is subsumed by the allowed purpose (bothw.r.t. the applicable policy)
Assumption: the same purpose and recipient definition is employed→subclass-of or same-as check is sufficient for realising the subsumeoperation.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 39/41
Policy Model III
An example policy for Mary’s UltraAmp 760e I
washer : eCarPol r d f : type sg : Po l i cy ;i c a l : d t s t a r t ”2010−01−01T00 : 0 0 : 0 0 ” ˆ ˆ xs : dateTime ;i c a l : dtend ”2010−12−31T23 : 5 9 : 5 9 ” ˆ ˆ xs : dateTime ;sg : a l lows #ultraAmpUse .
#ultraAmpUse r d f : type sg : Usage ;sg : purpose gov : Purpose# serv i ce ;sg : r e c i p i e n t <h t t p : / / ultraAmp .com/ company>;sg : perspec t i ve #ul t raAmpPerspect ive .
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 40/41
Policy Model IV
An example policy for Mary’s Mary’s UltraAmp 760e II
#ul t raAmpPerspect ive r d f : type sg : Perspect ive ;sg : d e f i n i t i o n ”PREFIX . . . CONSTRUCT { ?s ?p ?o }
WHERE { ?s r d f : type sg : Appl iance .?s sg : manufacturer <h t t p : / / ultraAmp .com/ company>.?s ?p ?o .FILTER (?p != sg : consumption ) } ” .
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 41/41