web techologies and privacy policies for the smart grid

Post on 04-Jul-2015

246 Views

Category:

Education

34 Downloads

Preview:

Click to see full reader

DESCRIPTION

Talk at EnergieInformatik 2013.

TRANSCRIPT

INSTITUTE OF APPLIED INFORMATICS AND FORMAL DESCRIPTION METHODS† AND ZENTRUM FUR ANGEWANDTE RECHTSWISSENSCHAFT‡

Web Technologies and Privacy Policiesfor the Smart Grid

Sebastian Speiser†, Andreas Wagner†, Oliver Raabe‡ and Andreas Harth† | Energieinformatik 2013

KIT – University of the State of Baden-Wuerttemberg and

National Laboratory of the Helmholtz Association

www.kit.edu

Agenda

1 Introduction

2 ICT Architecture and Data Model

3 Use-Case I

4 Policies for a Privacy-aware Smart Grid

5 Use-Case II

6 Evaluation

7 Conclusion

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 2/41

Introduction

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 3/41

(Some) Key ICT Requirements

Requirements, see [2, 3]R1 Lightweight data access.

R2 Open and flexible data model.

R3 Distinction between syntactic andsemantic data content.

R4 Users decide what data in whichgranularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41

(Some) Key ICT Requirements

Requirements, see [2, 3]R1 Lightweight data access.

R2 Open and flexible data model.

R3 Distinction between syntactic andsemantic data content.

R4 Users decide what data in whichgranularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41

(Some) Key ICT Requirements

Requirements, see [2, 3]R1 Lightweight data access.

R2 Open and flexible data model.

R3 Distinction between syntactic andsemantic data content.

R4 Users decide what data in whichgranularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41

(Some) Key ICT Requirements

Requirements, see [2, 3]R1 Lightweight data access.

R2 Open and flexible data model.

R3 Distinction between syntactic andsemantic data content.

R4 Users decide what data in whichgranularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41

(Some) Key ICT Requirements

Requirements, see [2, 3]R1 Lightweight data access.

R2 Open and flexible data model.

R3 Distinction between syntactic andsemantic data content.

R4 Users decide what data in whichgranularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41

Contributions

R1-R3: Semantic Web communication architecture (Section 2).

R4: Policy model (Section 4).

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 5/41

Contributions

R1-R3: Semantic Web communication architecture (Section 2).

R4: Policy model (Section 4).

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 5/41

Communication Architecture

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 6/41

Overview: A Semantic Web-basedCommunication Architecture I

Data access layersURIs for identification of participants.

TCP/IP stack with HTTP as transfer protocol.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 7/41

Overview: A Semantic Web-basedCommunication Architecture I

Data access layersURIs for identification of participants.

TCP/IP stack with HTTP as transfer protocol.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 7/41

Overview of a Semantic Web-basedCommunication Architecture II

Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:

Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41

Overview of a Semantic Web-basedCommunication Architecture II

Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:

Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41

Overview of a Semantic Web-basedCommunication Architecture II

Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:

Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41

Overview of a Semantic Web-basedCommunication Architecture II

Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:

Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41

Overview of a Semantic Web-basedCommunication Architecture II

Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:

Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41

Use-Case I

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 9/41

Use-Case I (iZEUS) – Smart Grid/TrafficService Platform – Data Management I

Service Platform

Smart Traffic

Navigator

Smart Meter

Analyzer

Service Requests

...

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 10/41

Use-Case I (iZEUS) – Smart Grid/TrafficService Platform – Data Management II

car:uamp760e3

Service Platform

car:uamp760e2car:uamp760e1

Service Requests

Linked DataEndpoint

Smart Traffic

Navigator

Smart Meter

Analyzer

...

RDFData

Data logging

car:uamp760e rdf:type sg:Vehicle ;

foaf:name "UltraAmp 760e" .

geo:location _:loc20130331 .

_:loc20100331 dc:date "2013-03-31T12:23:45";

geo:lat "49.0047222" ;

geo:lon "8.3858333" .

RDFData

RDFData

RDFData

Get additional data

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 11/41

Use-Case I (iZEUS) – Smart Grid/TrafficService Platform – Data Management III

sm:apt

sm:meter

car:uamp760e3

RDF

RDF

RDF

TCP/IP/HTTP

Service Platform

car:uamp760e2

car:uamp760e1

RDFdata logging

Service Requests

Linked DataEndpoint

Smart home at KIT

WWW

Smart Traffic

Navigator

Smart Meter

Analyzer

...

Data logging

Future work

RDFData

RDFData

RDFData

RDFData

RDFData

RDFData

RDFData

Get additional data

Get additional data

Get additional data

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 12/41

Use-Case I (iZEUS) – Smart Grid/TrafficService Platform – Data Management IV

sm:apt

sm:meter

car:uamp760e3

RDF

RDF

RDF

TCP/IP/HTTP

Service Platform

car:uamp760e2

car:uamp760e1

Data logging

Data logging

Service Requests

Linked DataEndpoint

Smart home at KIT

WWW

Gridpedia as data model

Smart Traffic

Navigator

Smart Meter

Analyzer

...

Future work

RDFData

RDFData

RDFData

RDFData

RDFData

RDFData

RDFData

Get additional data

Get additional data

Get additional data

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 13/41

Privacy Policies

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 14/41

Policy Model

IntuitionPolicies model user intent, thus, they help to preserve data privacy.

A Policy is bound to its associated data.

Policies are taken into account whenever data is accessed.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41

Policy Model

IntuitionPolicies model user intent, thus, they help to preserve data privacy.

A Policy is bound to its associated data.

Policies are taken into account whenever data is accessed.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41

Policy Model

IntuitionPolicies model user intent, thus, they help to preserve data privacy.

A Policy is bound to its associated data.

Policies are taken into account whenever data is accessed.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41

Policy Model II

Usage

Purpose

Policy

AgentDescriptionDate Perspective

validFrom validTo perspective

allows

recipientpurpose

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 16/41

Policy-aware Data Access

Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).

ii) Web server returns an authorisation required response.

iii) Requestor sends a request, i.e., a specification of identity andpurpose.

iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41

Policy-aware Data Access

Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).

ii) Web server returns an authorisation required response.

iii) Requestor sends a request, i.e., a specification of identity andpurpose.

iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41

Policy-aware Data Access

Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).

ii) Web server returns an authorisation required response.

iii) Requestor sends a request, i.e., a specification of identity andpurpose.

iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41

Policy-aware Data Access

Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).

ii) Web server returns an authorisation required response.

iii) Requestor sends a request, i.e., a specification of identity andpurpose.

iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41

Policy-aware Data Access

Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).

ii) Web server returns an authorisation required response.

iii) Requestor sends a request, i.e., a specification of identity andpurpose.

iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41

Use-Case II

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 18/41

Use-Case II (iZEUS) – Smart Grid/TrafficService Platform – Data Privacy I

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 19/41

Use-Case II (iZEUS) – Smart Grid/TrafficService Platform – Data Privacy II

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 20/41

Evaluation

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 21/41

Scope of Evaluation

Our previous works aimed at evaluation of privacy policies viaGerman privacy laws [1, 4].

This works evaluates the practical feasibility of privacy policies stored(matched) on lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 22/41

Scope of Evaluation

Our previous works aimed at evaluation of privacy policies viaGerman privacy laws [1, 4].

This works evaluates the practical feasibility of privacy policies stored(matched) on lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 22/41

Evaluation Setting

We implemented a policy matcher based on Rasqal1.Two hardware platforms:

2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.

We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.

For each size, 10 policies with random allowed usages were matchedagainst every request.2

1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41

Evaluation Setting

We implemented a policy matcher based on Rasqal1.Two hardware platforms:

2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.

We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.

For each size, 10 policies with random allowed usages were matchedagainst every request.2

1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41

Evaluation Setting

We implemented a policy matcher based on Rasqal1.Two hardware platforms:

2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.

We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.

For each size, 10 policies with random allowed usages were matchedagainst every request.2

1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41

Evaluation Setting

We implemented a policy matcher based on Rasqal1.Two hardware platforms:

2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.

We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.

For each size, 10 policies with random allowed usages were matchedagainst every request.2

1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41

Evaluation Setting

We implemented a policy matcher based on Rasqal1.Two hardware platforms:

2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.

We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.

For each size, 10 policies with random allowed usages were matchedagainst every request.2

1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41

Evaluation Setting

We implemented a policy matcher based on Rasqal1.Two hardware platforms:

2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.

We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.

For each size, 10 policies with random allowed usages were matchedagainst every request.2

1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41

Evaluation Results

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7

0 10 20 30 40 50 60 70 80

mat

chin

g tim

e in

sec

onds

policy size

Allowed Core2DuoDenied Core2Duo

Allowed ARMDenied ARM

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 24/41

Conclusion

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 25/41

Conclusion

By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.

We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41

Conclusion

By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.

We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41

Conclusion

By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.

We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41

Conclusion

By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.

We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41

Conclusion

By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.

We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41

Slides will be available at http://slideshare.net/Paper will be available at http://aifb.kit.edu/

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 27/41

Acknowledgements: iZEUS Project

This work was supported by the German Federal Ministry of Economics andTechnology (E-Energy iZEUS, Grant 01 ME12013). The authors are responsiblefor the content of the presentation.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 28/41

References

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 29/41

References I

Oliver Raabe.Datenschutz im SmartGrid.Datenschutz und Datensicherheit, 2010.

S. Rohjans, C. Danekas, and M. Uslar.Requirements for Smart Grid ICT-architectures.In ISGT, 2012.

Andreas Wagner, Sebastian Speiser, and Andreas Harth.Semantic Web Technologies for a Smart Energy Grid: Requirementsand Challenges.In ISWC, 2010.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 30/41

References II

Andreas Wagner, Sebastian Speiser, Oliver Raabe, and AndreasHarth.Linked Data for a Privacy-aware Smart Grid.In GI Jahrestagung, 2010.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 31/41

Backup Slides

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 32/41

Use-Case I (iZEUS) – CollaborativeSmart Grid Ontology – Gripedia I

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 33/41

Use-Case I (iZEUS) – CollaborativeSmart Grid Ontology – Gripedia II

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 34/41

Use-Case I (iZEUS) – CollaborativeSmart Grid Ontology – Gripedia III

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 35/41

Linked Data for the Smart Grid –Example

Customer

Electric Vehicleex:uamp760e

Smart Meterex:sm

Washing Machineex:coolWash

ex:Mary

Energy EfficiencyService Provider

Metering ProviderA

Cool Wash Inc.

Service ProviderMarkets

ChargingStation

(off-premise)

Metering Provider B(third party provider)

BillingClearing

Premiseex:apt

Legend

CommunicationFlow

Actor

Domain

Network

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 36/41

Linked Data for the Smart Grid –Example II

Mary’s Linked Data

/ / lookup on ex : coolWash ; data res ides a t washing machineex : coolWash

r d f : type sg : Appl iance ;sg : manufacturer <h t t p : / / coolWash . com/ company>;sg : owner ex : mary ;sg : washingData washer : program40 ;sg : consumption sm: data20100310 .

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 37/41

Linked RDF Data for the Smart Grid III

Mary’s Linked Data II

/ / lookup on sm: data20100310 ; data res ides a t smart metersm: data20100310

r d f : type sg : Consumption ;r d f : value ” 1 . 0 4 ” ˆ ˆ sg :kWh;i c a l : d t s t a r t ”2010−03−10T00 : 0 0 : 0 0 ” ;i c a l : dtend ”2010−03−10T01 : 0 0 : 0 0 ” .

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 38/41

Policy-aware Data Access II

Matching procedureThe matching procedure is implemented as a rule, checking whether . . .

i) requestor is subsumed by the recipient description and

ii) the requested purpose is subsumed by the allowed purpose (bothw.r.t. the applicable policy)

Assumption: the same purpose and recipient definition is employed→subclass-of or same-as check is sufficient for realising the subsumeoperation.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 39/41

Policy Model III

An example policy for Mary’s UltraAmp 760e I

washer : eCarPol r d f : type sg : Po l i cy ;i c a l : d t s t a r t ”2010−01−01T00 : 0 0 : 0 0 ” ˆ ˆ xs : dateTime ;i c a l : dtend ”2010−12−31T23 : 5 9 : 5 9 ” ˆ ˆ xs : dateTime ;sg : a l lows #ultraAmpUse .

#ultraAmpUse r d f : type sg : Usage ;sg : purpose gov : Purpose# serv i ce ;sg : r e c i p i e n t <h t t p : / / ultraAmp .com/ company>;sg : perspec t i ve #ul t raAmpPerspect ive .

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 40/41

Policy Model IV

An example policy for Mary’s Mary’s UltraAmp 760e II

#ul t raAmpPerspect ive r d f : type sg : Perspect ive ;sg : d e f i n i t i o n ”PREFIX . . . CONSTRUCT { ?s ?p ?o }

WHERE { ?s r d f : type sg : Appl iance .?s sg : manufacturer <h t t p : / / ultraAmp .com/ company>.?s ?p ?o .FILTER (?p != sg : consumption ) } ” .

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 41/41

top related