SlideShare a Scribd company logo
1 of 31
P.Missier2017
SystemsResearchChallenges
Towards an authority-free marketplace for
personal IoT data (Personal Data from Things)
Paolo Missier
Jan 16th, 2017
Systems Research Challenges in the Internet of
Things Workshop
Ack: Dr. Michele Nati, DE Catapult
P.Missier2017
SystemsResearchChallenges
2
About a year ago,
in a fancy Northumberland country house, ...
P.Missier2017
SystemsResearchChallenges
3
IoT ∩ People  Personal Data from Things (PDT)
IoT vision: personal devices will make our lives better
They often also produce data that is also personal
As per the Data Protection Act 1998
• Are people aware of the trade-offs between privacy and benefits?
1. Ownership:
• What is “my” data? Who else has access to it? To what extent?
2. Awareness of third party use of personal data:
• Who has been doing what with my data?
3. Control.
• How much control can I have on the data that devices produce on my behalf?
Ownership + awareness + control  Trust
P.Missier2017
SystemsResearchChallenges
5
Activity detection pattern
Accelerometry data
Indoor location data
Activity
Detection
Accelerometry data
Indoor location data
Activity
Detection
Aggregate
Analytics
03 January 2016 10:16
P.Missier2017
SystemsResearchChallenges
6
Moving forward: brokered Personal Data exchanges
Working assumption: Personal data are assets with a value
fitness / health monitoring, energy metering, …
PDT: Control  trading
Primary
producers
(wearables…)
Value Added Services /
aggregators
Topics (minimal
data semantics)
What would an infrastructure for a PDT marketplace look like?
Sensor data streams,
batched into windows
P.Missier2017
SystemsResearchChallenges
7
Baseline (personal) data marketplace scenario
1-hop Contract model between Primary producers PP and Primary
Consumers PC:
Each topic has an associated unit value: T  val(T)
For each batch of N messages from PPi, to PCj about Tk:
(PPi, PCj, Tk, N)  PCj owes (N . val(Tk)) coins to PPi
P.Missier2017
SystemsResearchChallenges
8
Raw message logging, baseline
P.Missier2017
SystemsResearchChallenges
9
Count cubes from messages, 1-hop
P.Missier2017
SystemsResearchChallenges
10
Using count cubes to enforce contracts
P.Missier2017
SystemsResearchChallenges
11
Baseline scenario, realisation – broker-based tracking
P.Missier2017
SystemsResearchChallenges
12
Baseline scenario, realization - unilateral tracking
P.Missier2017
SystemsResearchChallenges
13
Moving forward
Two directions for a more interesting marketplace:
1. Fully decentralised / unilateral message tracking without trusted authority
2. Multi-hop contracts:
Primary Consumer PC-VAS  [resell]  Secondary Consumer SC-VAS  …
P.Missier2017
SystemsResearchChallenges
14
Decentralising and removing trust
P.Missier2017
SystemsResearchChallenges
15
What does the authority do?
1. Control the Tracker DB
1. Prevent fraud:
• Producers have an incentive to over-claim data production
• VAS have an incentive to deny receiving some of the data
• (Data ownership / data theft / Replay attack)
• A third party will have an interest in claiming ownership of messages sent by
others
• For instance, by copying data (possibly encrypted) and replaying it on the
channel, publishing it as its own
P.Missier2017
SystemsResearchChallenges
16
P.Missier2017
SystemsResearchChallenges
17
P.Missier2017
SystemsResearchChallenges
18
Approach
Blockchain + smart contracts technology, used to:
1. Associate identity to marketplace participants
2. Agree on contract specification
3. Settlement of contractual disputes given unilaterally generated
count cubes
Concrete prototyping [in progress]: the Ethereum platform
“A blockchain is a globally shared, transactional database”
P.Missier2017
SystemsResearchChallenges
19
Basic BitCoin protocol(*)
(*) Source:
A Next-Generation Smart Contract and Decentralized Application Platform
https://github.com/ethereum/wiki/wiki/White-Paper
State S: {<owner, balance>}
Transactions transfer ownership of (unspent) coins
APPLY(S,TX)  S' or ERROR
APPLY({ Alice: $50, Bob: $50 },"send $20 from Alice to Bob") =
{ Alice: $30, Bob: $70 }
P.Missier2017
SystemsResearchChallenges
20
Ethereum transactions and smart contracts
external
accounts are
asset owners
contract accounts
also contain:
• contract code
• storage
BitCoin Transactions:
{ <owner, balance> } —> { <owner’, balance’> }
TX-eth: Transactions become messages
Messages carry arbitrary data
APPLY(S,TX-eth):
run the code associated with the destination (contract) account
P.Missier2017
SystemsResearchChallenges
21
Smart contracts in the Ethereum Virtual Machine
http://solidity.readthedocs.io/en/develop/index.html
runtime environment
for smart contracts in
Ethereum
P.Missier2017
SystemsResearchChallenges
22
Contracts for device registration / identity management
P.Missier2017
SystemsResearchChallenges
23
Contracts for formalising agreements between parties
Note: this sets the list of topics st(PC) to which each PC subscribes
P.Missier2017
SystemsResearchChallenges
24
Contracts used for reputation management
P.Missier2017
SystemsResearchChallenges
25
Using smart contracts for unilateral reporting verification
Given N PP, M PC,
and R topics T1, T2, …, TR:
Each PPi and each PCj all report their unilateral count cubes for each window w
They all agree on the time interval that defines W (magic, to be dealt with later)
1) No trouble: 1. All PPi and / all PCj report independently and accurately
2. Some do not report, but reports are accurate
2) Trouble: 1. The reports from PPi and PCj do not “add up”
2. The reports do not sync on time / windows
Scenarios:
P.Missier2017
SystemsResearchChallenges
26
Publishers transactions
CCs(w,i,k) = ni,k count of messages sent by PPi during w about Tk
Fragment of counts cube viewed by PPi:
This is one row of sender matrix SMw for w:
SMw[i,k] = CCs(w,i,k)
P.Missier2017
SystemsResearchChallenges
27
Publishers transactions
Each of these fragments is sent to the Reconciliation Smart Contract as a
Ethereum blockchain transaction:
- The contract receives N messages associated with w
- For each PCj, the contract has access to the set of topics it subscribes to:
Credit PCj  PPi:
P.Missier2017
SystemsResearchChallenges
28
Subscribers transactions
Fragment of counts cube viewed by PCj:
-- note: include senders as an extra dimension
Credit PCj  PPi:
P.Missier2017
SystemsResearchChallenges
29
Reports propagation
Settlements are straightforward when reports are partial but accurate
Matrices SM, RM, are two views of the same data exchanges:
C1. For each PPi and topic Tk:
SMw(i,k) = RMw(j,i,k) for each j:1..M such that Tk ∈ st(PCj)
C2. for i:1..N:
RMw(j,i,k) = SMw(i,k)
Q. Which subsets of reports are sufficient to complete the matrices?
P.Missier2017
SystemsResearchChallenges
30
Fraud detection
Incentives to behave unfairly:
• Can fraudulent reporting be always detected?
• Can responsibility for the fraudulent reporting be ascribed to one or
more specific participants?
• Publishers: over-report
• Subscribers: under-report
1. Detection:
SMw(i,k) > RMw(j,i,k) for some j (1)
2. Ascribing responsibility:
Case 1: PC fraud
Case 2: PP fraud
P.Missier2017
SystemsResearchChallenges
31
Fraud detection – initial thoughts on responsibilities
Case 1: PC fraud
It follows from C1, C2 (above) that:
If Tk ∈ PCj ∩ PCj then RMw(j,i,k) = RMw(j’,i,k) for i:1..N
let j’ such that Tk ∈ PCj ∩ PCj:
Suppose SMw(i,k) = RMw(j’,i,k)
This suggests that (1) may be due to PCj under-reporting on Tk, and
PPi reporting correctly
- The more topics the PCs share, the stronger the evidence...
Case 2: PP fraud
Suppose RMw(j,i,k) = RMw(j’,i,k) for all Tk
This suggests that PPi has over-reported
(1) SMw(i,k) > RMw(j,i,k)
P.Missier2017
SystemsResearchChallenges
32
The last slide
Some novel uses for blockchain (amongst many others)
https://solarcoin.org
http://www.electricchain.org
http://www.mediachain.io/
https://www.coalaip.org
…
Personal data in the IoT space:
Mashhadi, Afra, Fahim Kawsar, and Utku Gunay Acer. “Human Data Interaction in IoT:
The Ownership Aspect.” In Internet of Things (WF-IoT), 2014 IEEE World Forum on,
159–162, 2014.
Vescovi, Michele, Corrado Moiso, Fabrizio Antonelli, Mattia Pasolli, and Christos
Perentis. “Building an Eco-System of Trusted Services through User Transparency,
Control and Awareness on Personal Data Privacy.” In Procs. W3C Workshop on
Privacy and User–Centric Controls. Berlin, Germany, 2014.
Multi-hop contracts and transitive credit management:
Missier, Paolo. “Data Trajectories: Tracking Reuse of Published Data for Transitive
Credit Attribution.” International Journal of Digital Curation 11, no. 1 (2016): 1–16.
doi:doi:10.2218/ijdc.v11i1.425.

More Related Content

Similar to Towards an authority-free marketplace for personal IoT data (Personal Data from Things)

7 javier big_data
7 javier big_data7 javier big_data
7 javier big_data
TYNY2013
 
Fighting financial fraud at Danske Bank with artificial intelligence
Fighting financial fraud at Danske Bank with artificial intelligenceFighting financial fraud at Danske Bank with artificial intelligence
Fighting financial fraud at Danske Bank with artificial intelligence
Ron Bodkin
 

Similar to Towards an authority-free marketplace for personal IoT data (Personal Data from Things) (20)

Een andere kijk op Microservices
Een andere kijk op MicroservicesEen andere kijk op Microservices
Een andere kijk op Microservices
 
Real-time Multimodal Feedback with the CPR Tutor
Real-time Multimodal Feedback with the CPR TutorReal-time Multimodal Feedback with the CPR Tutor
Real-time Multimodal Feedback with the CPR Tutor
 
In Processes We Trust: Privacy and Trust in Business Processes
In Processes We Trust: Privacy and Trust in Business ProcessesIn Processes We Trust: Privacy and Trust in Business Processes
In Processes We Trust: Privacy and Trust in Business Processes
 
Detection of fraud in financial blockchain-based transactions through big dat...
Detection of fraud in financial blockchain-based transactions through big dat...Detection of fraud in financial blockchain-based transactions through big dat...
Detection of fraud in financial blockchain-based transactions through big dat...
 
A Cloud-Based Lab Management and Analytics Software for Triangulated Human-Ce...
A Cloud-Based Lab Management and Analytics Software for Triangulated Human-Ce...A Cloud-Based Lab Management and Analytics Software for Triangulated Human-Ce...
A Cloud-Based Lab Management and Analytics Software for Triangulated Human-Ce...
 
Essay On Cryptography
Essay On CryptographyEssay On Cryptography
Essay On Cryptography
 
Quantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic ModulesQuantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic Modules
 
7 javier big_data
7 javier big_data7 javier big_data
7 javier big_data
 
Big Data
Big DataBig Data
Big Data
 
Mind My Value: A decentralised infrastructure for fair and trusted IoT data ...
Mind My Value:  A decentralised infrastructure for fair and trusted IoT data ...Mind My Value:  A decentralised infrastructure for fair and trusted IoT data ...
Mind My Value: A decentralised infrastructure for fair and trusted IoT data ...
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
 
Opportunities and methodological challenges of Big Data for official statist...
Opportunities and methodological challenges of  Big Data for official statist...Opportunities and methodological challenges of  Big Data for official statist...
Opportunities and methodological challenges of Big Data for official statist...
 
Fighting financial fraud at Danske Bank with artificial intelligence
Fighting financial fraud at Danske Bank with artificial intelligenceFighting financial fraud at Danske Bank with artificial intelligence
Fighting financial fraud at Danske Bank with artificial intelligence
 
Importance of Data Mining
Importance of Data MiningImportance of Data Mining
Importance of Data Mining
 
Introduction to new technologies
Introduction to new technologiesIntroduction to new technologies
Introduction to new technologies
 
Big data in Private Banking
Big data in Private BankingBig data in Private Banking
Big data in Private Banking
 
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
 
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by Design
 
IRJET- Bitcoin - The Future Currency
IRJET- Bitcoin - The Future CurrencyIRJET- Bitcoin - The Future Currency
IRJET- Bitcoin - The Future Currency
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 

More from Paolo Missier

Data-centric AI and the convergence of data and model engineering: opportunit...
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier
 
Tracking trajectories of multiple long-term conditions using dynamic patient...
Tracking trajectories of  multiple long-term conditions using dynamic patient...Tracking trajectories of  multiple long-term conditions using dynamic patient...
Tracking trajectories of multiple long-term conditions using dynamic patient...
Paolo Missier
 

More from Paolo Missier (20)

Towards explanations for Data-Centric AI using provenance records
Towards explanations for Data-Centric AI using provenance recordsTowards explanations for Data-Centric AI using provenance records
Towards explanations for Data-Centric AI using provenance records
 
Interpretable and robust hospital readmission predictions from Electronic Hea...
Interpretable and robust hospital readmission predictions from Electronic Hea...Interpretable and robust hospital readmission predictions from Electronic Hea...
Interpretable and robust hospital readmission predictions from Electronic Hea...
 
Data-centric AI and the convergence of data and model engineering: opportunit...
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
 
Realising the potential of Health Data Science: opportunities and challenges ...
Realising the potential of Health Data Science:opportunities and challenges ...Realising the potential of Health Data Science:opportunities and challenges ...
Realising the potential of Health Data Science: opportunities and challenges ...
 
Provenance Week 2023 talk on DP4DS (Data Provenance for Data Science)
Provenance Week 2023 talk on DP4DS (Data Provenance for Data Science)Provenance Week 2023 talk on DP4DS (Data Provenance for Data Science)
Provenance Week 2023 talk on DP4DS (Data Provenance for Data Science)
 
A Data-centric perspective on Data-driven healthcare: a short overview
A Data-centric perspective on Data-driven healthcare: a short overviewA Data-centric perspective on Data-driven healthcare: a short overview
A Data-centric perspective on Data-driven healthcare: a short overview
 
Capturing and querying fine-grained provenance of preprocessing pipelines in ...
Capturing and querying fine-grained provenance of preprocessing pipelines in ...Capturing and querying fine-grained provenance of preprocessing pipelines in ...
Capturing and querying fine-grained provenance of preprocessing pipelines in ...
 
Tracking trajectories of multiple long-term conditions using dynamic patient...
Tracking trajectories of  multiple long-term conditions using dynamic patient...Tracking trajectories of  multiple long-term conditions using dynamic patient...
Tracking trajectories of multiple long-term conditions using dynamic patient...
 
Delivering on the promise of data-driven healthcare: trade-offs, challenges, ...
Delivering on the promise of data-driven healthcare: trade-offs, challenges, ...Delivering on the promise of data-driven healthcare: trade-offs, challenges, ...
Delivering on the promise of data-driven healthcare: trade-offs, challenges, ...
 
Digital biomarkers for preventive personalised healthcare
Digital biomarkers for preventive personalised healthcareDigital biomarkers for preventive personalised healthcare
Digital biomarkers for preventive personalised healthcare
 
Digital biomarkers for preventive personalised healthcare
Digital biomarkers for preventive personalised healthcareDigital biomarkers for preventive personalised healthcare
Digital biomarkers for preventive personalised healthcare
 
Data Provenance for Data Science
Data Provenance for Data ScienceData Provenance for Data Science
Data Provenance for Data Science
 
Capturing and querying fine-grained provenance of preprocessing pipelines in ...
Capturing and querying fine-grained provenance of preprocessing pipelines in ...Capturing and querying fine-grained provenance of preprocessing pipelines in ...
Capturing and querying fine-grained provenance of preprocessing pipelines in ...
 
Quo vadis, provenancer?  Cui prodest?  our own trajectory: provenance of data...
Quo vadis, provenancer? Cui prodest? our own trajectory: provenance of data...Quo vadis, provenancer? Cui prodest? our own trajectory: provenance of data...
Quo vadis, provenancer?  Cui prodest?  our own trajectory: provenance of data...
 
Data Science for (Health) Science: tales from a challenging front line, and h...
Data Science for (Health) Science:tales from a challenging front line, and h...Data Science for (Health) Science:tales from a challenging front line, and h...
Data Science for (Health) Science: tales from a challenging front line, and h...
 
Analytics of analytics pipelines: from optimising re-execution to general Dat...
Analytics of analytics pipelines:from optimising re-execution to general Dat...Analytics of analytics pipelines:from optimising re-execution to general Dat...
Analytics of analytics pipelines: from optimising re-execution to general Dat...
 
ReComp: optimising the re-execution of analytics pipelines in response to cha...
ReComp: optimising the re-execution of analytics pipelines in response to cha...ReComp: optimising the re-execution of analytics pipelines in response to cha...
ReComp: optimising the re-execution of analytics pipelines in response to cha...
 
ReComp, the complete story: an invited talk at Cardiff University
ReComp, the complete story:  an invited talk at Cardiff UniversityReComp, the complete story:  an invited talk at Cardiff University
ReComp, the complete story: an invited talk at Cardiff University
 
Efficient Re-computation of Big Data Analytics Processes in the Presence of C...
Efficient Re-computation of Big Data Analytics Processes in the Presence of C...Efficient Re-computation of Big Data Analytics Processes in the Presence of C...
Efficient Re-computation of Big Data Analytics Processes in the Presence of C...
 
Decentralized, Trust-less Marketplace for Brokered IoT Data Trading using Blo...
Decentralized, Trust-less Marketplacefor Brokered IoT Data Tradingusing Blo...Decentralized, Trust-less Marketplacefor Brokered IoT Data Tradingusing Blo...
Decentralized, Trust-less Marketplace for Brokered IoT Data Trading using Blo...
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Towards an authority-free marketplace for personal IoT data (Personal Data from Things)

Editor's Notes

  1. (*) EPSRC funding, £25k staff + travel what happened previously: plasma state at last year's workshop has matured into a technical collaboration with the DE Catapult Centre in London my motivation there is to explore opportunities for early-impact system research in the IoT space this has generated a short-term research visiting position at the Catapult...
  2. How much of the data used in a certain computation is my data?? What has its contribution been to the analytics?
  3. Note: message semantics currently described only using broker topics (*) Work being developed in collaboration with the DE Catapult Researcher in Residence programme
  4. Therefore, the authority must be able to verify that the data observed on the channels is originated by their respective owners as claimed. Therefore, the authority must able to recognize when data is not genuine. However this cannot be determined directly, because as long as the data is verified on the channel, we cannot know how it is actually produced. One idea is to leverage the traces and past marketplace transactions for trust assessment on each of the parties, for instance based on past record of certified data handling. There is incentive to alter the content of otherwise genuine messages with a payload that is expected to have a higher value to consumers than the original one.
  5. Ethereum (*) extends the BitCoin protocol in several ways
  6. This scenario effectively amounts to collecting the senders matrix SMw, piecemeal, one row from each PCj, and then reconstruct the counts cubes for w from it.
  7. \sum_{T_k \in \mathit{st}(PC_j)} CC_r(w,j,i,k) \cdot \mathit{val}(T_k)