Web Techologies and Privacy policies for the Smart Grid

523 views
414 views

Published on

Talk at EnergieInformatik 2013.

Published in: Education, Technology
1 Comment
1 Like
Statistics
Notes
No Downloads
Views
Total views
523
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
9
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

Web Techologies and Privacy policies for the Smart Grid

  1. 1. Web Technologies and Privacy Policies for the Smart Grid Sebastian Speiser† , Andreas Wagner† , Oliver Raabe‡ and Andreas Harth† | Energieinformatik 2013 I NSTITUTE OF A PPLIED I NFORMATICS AND KIT – University of the State of Baden-Wuerttemberg and National Laboratory of the Helmholtz Association F ORMAL D ESCRIPTION M ETHODS† AND ¨ Z ENTRUM F UR A NGEWANDTE R ECHTSWISSENSCHAFT‡ www.kit.edu
  2. 2. Agenda 1 Introduction 2 ICT Architecture and Data Model 3 Use-Case I 4 Policies for a Privacy-aware Smart Grid 5 Use-Case II 6 Evaluation 7 Conclusion Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 2/41
  3. 3. Introduction Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 3/41
  4. 4. (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
  5. 5. (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
  6. 6. (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
  7. 7. (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
  8. 8. (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
  9. 9. Contributions R1-R3: Semantic Web communication architecture (Section 2). R4: Policy model (Section 4). Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 5/41
  10. 10. Contributions R1-R3: Semantic Web communication architecture (Section 2). R4: Policy model (Section 4). Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 5/41
  11. 11. Communication Architecture Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 6/41
  12. 12. Overview: A Semantic Web-based Communication Architecture I Data access layers URIs for identification of participants. TCP/IP stack with HTTP as transfer protocol. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 7/41
  13. 13. Overview: A Semantic Web-based Communication Architecture I Data access layers URIs for identification of participants. TCP/IP stack with HTTP as transfer protocol. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 7/41
  14. 14. Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
  15. 15. Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
  16. 16. Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
  17. 17. Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
  18. 18. Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
  19. 19. Use-Case I Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 9/41
  20. 20. Use-Case I (iZEUS) – Smart Grid/Traffic Service Platform – Data Management I Service Requests Smart Traffic Navigator Service Platform Smart Meter Analyzer ... Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 10/41
  21. 21. Use-Case I (iZEUS) – Smart Grid/Traffic Service Platform – Data Management II car:uamp760e1 car:uamp760e2 RDF Data car:uamp760e3 RDF Data car:uamp760e rdf:type sg:Vehicle ; foaf:name "UltraAmp 760e" . geo:location _:loc20130331 . _:loc20100331 dc:date "2013-03-31T12:23:45"; geo:lat "49.0047222" ; geo:lon "8.3858333" . RDF Data Get additional data Data logging Linked Data Endpoint Service Requests Smart Traffic Navigator RDF Data Service Platform Smart Meter Analyzer ... Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 11/41
  22. 22. Use-Case I (iZEUS) – Smart Grid/Traffic Service Platform – Data Management III Smart home at KIT car:uamp760e2 car:uamp760e3 car:uamp760e1 RDF Data RDF Data RDF Data Get additional data Smart Traffic Navigator RDF Data sm:apt Get additional RDF data sm:meter Data Service Platform Smart Meter Analyzer Get additional data RDF Data Data logging Linked Data Endpoint Service Requests Future work RDF RDF RDF data logging ... TCP/IP/HTTP RDF RDF Data WWW Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 12/41
  23. 23. Use-Case I (iZEUS) – Smart Grid/Traffic Service Platform – Data Management IV Smart home at KIT car:uamp760e2 car:uamp760e3 car:uamp760e1 RDF Data RDF Data RDF Data Get additional data Smart Traffic Navigator RDF Data sm:apt Get additional RDF data sm:meter Data RDF RDF Service Platform TCP/IP/HTTP Data logging Smart Meter Analyzer Get additional data RDF Data Data logging Linked Data Endpoint Service Requests Future work ... Gridpedia as data model RDF RDF Data WWW Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 13/41
  24. 24. Privacy Policies Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 14/41
  25. 25. Policy Model Intuition Policies model user intent, thus, they help to preserve data privacy. A Policy is bound to its associated data. Policies are taken into account whenever data is accessed. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41
  26. 26. Policy Model Intuition Policies model user intent, thus, they help to preserve data privacy. A Policy is bound to its associated data. Policies are taken into account whenever data is accessed. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41
  27. 27. Policy Model Intuition Policies model user intent, thus, they help to preserve data privacy. A Policy is bound to its associated data. Policies are taken into account whenever data is accessed. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41
  28. 28. Policy Model II Policy validFrom Date validTo allows Usage purpose recipient perspective Purpose Perspective Agent Description Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 16/41
  29. 29. Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) → if request and policy match, requested data and (signed) policy is sent. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
  30. 30. Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) → if request and policy match, requested data and (signed) policy is sent. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
  31. 31. Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) → if request and policy match, requested data and (signed) policy is sent. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
  32. 32. Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) → if request and policy match, requested data and (signed) policy is sent. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
  33. 33. Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) → if request and policy match, requested data and (signed) policy is sent. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
  34. 34. Use-Case II Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 18/41
  35. 35. Use-Case II (iZEUS) – Smart Grid/Traffic Service Platform – Data Privacy I Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 19/41
  36. 36. Use-Case II (iZEUS) – Smart Grid/Traffic Service Platform – Data Privacy II Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 20/41
  37. 37. Evaluation Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 21/41
  38. 38. Scope of Evaluation Our previous works aimed at evaluation of privacy policies via German privacy laws [1, 4]. This works evaluates the practical feasibility of privacy policies stored (matched) on lower-power devices. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 22/41
  39. 39. Scope of Evaluation Our previous works aimed at evaluation of privacy policies via German privacy laws [1, 4]. This works evaluates the practical feasibility of privacy policies stored (matched) on lower-power devices. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 22/41
  40. 40. Evaluation Setting We implemented a policy matcher based on Rasqal1 . Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request.2 1 2 http://librdf.org/rasqal/ Test data and source code at http://code.google.com/p/polen/. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
  41. 41. Evaluation Setting We implemented a policy matcher based on Rasqal1 . Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request.2 1 2 http://librdf.org/rasqal/ Test data and source code at http://code.google.com/p/polen/. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
  42. 42. Evaluation Setting We implemented a policy matcher based on Rasqal1 . Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request.2 1 2 http://librdf.org/rasqal/ Test data and source code at http://code.google.com/p/polen/. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
  43. 43. Evaluation Setting We implemented a policy matcher based on Rasqal1 . Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request.2 1 2 http://librdf.org/rasqal/ Test data and source code at http://code.google.com/p/polen/. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
  44. 44. Evaluation Setting We implemented a policy matcher based on Rasqal1 . Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request.2 1 2 http://librdf.org/rasqal/ Test data and source code at http://code.google.com/p/polen/. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
  45. 45. Evaluation Setting We implemented a policy matcher based on Rasqal1 . Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request.2 1 2 http://librdf.org/rasqal/ Test data and source code at http://code.google.com/p/polen/. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
  46. 46. matching time in seconds Evaluation Results 0.7 Allowed Core2Duo Denied Core2Duo Allowed ARM Denied ARM 0.6 0.5 0.4 0.3 0.2 0.1 0 0 10 20 30 40 50 policy size 60 70 80 Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 24/41
  47. 47. Conclusion Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 25/41
  48. 48. Conclusion By means of real-world use-cases we showed that ... ... Semantic Web technologies are applicable and highly useful ... ... Linked Data allows for efficient data access ... ... policies give effective means for technical privacy enforcement ... ... in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
  49. 49. Conclusion By means of real-world use-cases we showed that ... ... Semantic Web technologies are applicable and highly useful ... ... Linked Data allows for efficient data access ... ... policies give effective means for technical privacy enforcement ... ... in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
  50. 50. Conclusion By means of real-world use-cases we showed that ... ... Semantic Web technologies are applicable and highly useful ... ... Linked Data allows for efficient data access ... ... policies give effective means for technical privacy enforcement ... ... in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
  51. 51. Conclusion By means of real-world use-cases we showed that ... ... Semantic Web technologies are applicable and highly useful ... ... Linked Data allows for efficient data access ... ... policies give effective means for technical privacy enforcement ... ... in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
  52. 52. Conclusion By means of real-world use-cases we showed that ... ... Semantic Web technologies are applicable and highly useful ... ... Linked Data allows for efficient data access ... ... policies give effective means for technical privacy enforcement ... ... in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
  53. 53. Slides will be available at http://slideshare.net/ Paper will be available at http://aifb.kit.edu/ Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 27/41
  54. 54. Acknowledgements: iZEUS Project This work was supported by the German Federal Ministry of Economics and Technology (E-Energy iZEUS, Grant 01 ME12013). The authors are responsible for the content of the presentation. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 28/41
  55. 55. References Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 29/41
  56. 56. References I Oliver Raabe. Datenschutz im SmartGrid. Datenschutz und Datensicherheit, 2010. S. Rohjans, C. Danekas, and M. Uslar. Requirements for Smart Grid ICT-architectures. In ISGT, 2012. Andreas Wagner, Sebastian Speiser, and Andreas Harth. Semantic Web Technologies for a Smart Energy Grid: Requirements and Challenges. In ISWC, 2010. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 30/41
  57. 57. References II Andreas Wagner, Sebastian Speiser, Oliver Raabe, and Andreas Harth. Linked Data for a Privacy-aware Smart Grid. In GI Jahrestagung, 2010. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 31/41
  58. 58. Backup Slides Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 32/41
  59. 59. Use-Case I (iZEUS) – Collaborative Smart Grid Ontology – Gripedia I Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 33/41
  60. 60. Use-Case I (iZEUS) – Collaborative Smart Grid Ontology – Gripedia II Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 34/41
  61. 61. Use-Case I (iZEUS) – Collaborative Smart Grid Ontology – Gripedia III Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 35/41
  62. 62. Linked Data for the Smart Grid – Example Customer Legend Communication Flow Charging Station (off-premise) Electric Vehicle ex:uamp760e Domain ex:Mary Metering Provider B (third party provider) Clearing Markets Cool Wash Inc. Energy Efficiency Service Provider Premise ex:apt Actor Network Washing Machine ex:coolWash Smart Meter ex:sm Metering Provider A Billing Service Provider Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 36/41
  63. 63. Linked Data for the Smart Grid – Example II Mary’s Linked Data / / lookup on ex : coolWash ; data r e s i d e s a t washing machine ex : coolWash r d f : t y p e sg : A p p l i a n c e ; sg : m a n u f a c t u r e r < h t t p : / / coolWash . com / company >; sg : owner ex : mary ; sg : washingData washer : program40 ; sg : consumption sm : data20100310 . Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 37/41
  64. 64. Linked RDF Data for the Smart Grid III Mary’s Linked Data II / / lookup on sm : data20100310 ; data r e s i d e s a t smart meter sm : data20100310 r d f : t y p e sg : Consumption ; r d f : v a l u e ” 1 . 0 4 ” ˆ ˆ sg : kWh ; i c a l : d t s t a r t ”2010−03−10T00 : 0 0 : 0 0 ” ; i c a l : dtend ”2010−03−10T01 : 0 0 : 0 0 ” . Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 38/41
  65. 65. Policy-aware Data Access II Matching procedure The matching procedure is implemented as a rule, checking whether . . . i) requestor is subsumed by the recipient description and ii) the requested purpose is subsumed by the allowed purpose (both w.r.t. the applicable policy) Assumption: the same purpose and recipient definition is employed → subclass-of or same-as check is sufficient for realising the subsume operation. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 39/41
  66. 66. Policy Model III An example policy for Mary’s UltraAmp 760e I washer : eCarPol r d f : t y p e sg : P o l i c y ; i c a l : d t s t a r t ”2010−01−01T00 : 0 0 : 0 0 ” ˆ ˆ xs : dateTime ; i c a l : dtend ”2010−12−31T23 : 5 9 : 5 9 ” ˆ ˆ xs : dateTime ; sg : a l l o w s #ultraAmpUse . #ultraAmpUse r d f : t y p e sg : Usage ; sg : purpose gov : Purpose# s e r v i c e ; sg : r e c i p i e n t < h t t p : / / ultraAmp . com / company >; sg : p e r s p e c t i v e # u l t r a A m p P e r s p e c t i v e . Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 40/41
  67. 67. Policy Model IV An example policy for Mary’s Mary’s UltraAmp 760e II # u l t r a A m p P e r s p e c t i v e r d f : t y p e sg : P e r s p e c t i v e ; sg : d e f i n i t i o n ” PREFIX . . . CONSTRUCT { ?s ?p ?o } WHERE { ?s r d f : t y p e sg : A p p l i a n c e . ?s sg : m a n u f a c t u r e r < h t t p : / / ultraAmp . com / company >. ?s ?p ?o . FILTER ( ? p ! = sg : consumption ) } ” . Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 41/41

×