SlideShare a Scribd company logo
© Waher Data AB, 2018.
IoT-Day 2018
Privacy for IoT with XMPP
© Waher Data AB, 2018.
1. Privacy
© Waher Data AB, 2018.
What is privacy?
A fundamental human right:
 The right to have confidential conversations.
 The ability to select with whom we communicate.
 Protection against unwarranted monitoring or
searches.
 Protection against attacks on honor and reputation.
© Waher Data AB, 2018.
Universal Declaration of Human Rights
Article 12:
No one shall be subjected to arbitrary
interference with his privacy, family,
home or correspondence, nor to attacks
upon his honour and reputation. Everyone
has the right to the protection of the
law against such interference or
attacks.
https://www.un.org/en/universal-declaration-human-rights/
© Waher Data AB, 2018.
Does privacy extend to the IoT?
Who can communicate with devices around you,
and about what?
Do you want uninvited to know:
 When you’re home?
 If you’re in the shower?
 What places you visit?
 Your health status?
Or be able to:
 Control your vehicle?
 Turn off your pacemaker?
© Waher Data AB, 2018.
E.U. privacy legislation (GDPR)
EU Regulation:
 Comes into full effect May 2018
 Automatic law in all member states
 Applicable to
 Anyone, if system in E.U.
 Any European citizen, in any system in the
world
 Heavy sanctions
 Suddenly, corporations become interested
in privacy.
© Waher Data AB, 2018.
Proportionality
GDPR balances:
 Rights to privacy for individuals
 Interests of corporations
 Legal requirements
Maximum requirement:
 Proportional to the rights of all participants
Minimum requirement:
 State of the art
 People “skilled in the art” (professionals)
 Lack of knowledge not valid reason
© Waher Data AB, 2018.
Personal Data
Any information that relates directly or
indirectly to an identified or identifiable
natural person.
Notice:
 Indirect means, you have to think before you
say there is no relation.
 Identifiable means, the individual might not
have been identified by your system. But if
anyone, perhaps smarter than you, can identify
the person from your data, perhaps with the use
of other external data, it’s personal data.
Easier to just assume data is personal, if
there’s doubt.
© Waher Data AB, 2018.
Personality is contagious
Data relating to personal data,
automatically becomes personal data.
(Personality acts like a virus, or disease, at
least for the data hoarder, or Big Brother.)
© Waher Data AB, 2018.
Removing personality
Removing personality is difficult.
Methods:
 Data aggregation
 Data masking or obfuscation
 Anonymization
 Anonymization ≠ Pseudonymization
© Waher Data AB, 2018.
Processing
Any operation (or set of operations) which
is performed on personal data (or on sets
of personal data)
Notice:
 The word “automatic” is not present in definition
 Manual processing is included (if sorted).
© Waher Data AB, 2018.
Minimalistic definition
A minimalistic definition of GDPR is:
Minimalism
You’re allowed to:
 Do as little as possible
 For as short a time as possible
 Share it with as few as possible
 For as few purposes as possible
 As correctly as possible
 Always transparently informing subjects about it
 With proportional data protection mechanisms
© Waher Data AB, 2018.
Transparency
Information you provide must be:
 Short
 Concise
 Clear
 Easy to understand
 Explicit
Transparency is measured on how your information
is received and understood.
© Waher Data AB, 2018.
Openness
Openness ≠ Transparency
Providing too much information hides
relevant information.
Transparency means you provide the
subjects with the information that is
relevant to them, not to you.
© Waher Data AB, 2018.
Woods and aquariums
“Can’t see the wood for all the trees”
If you can’t find the fish in the aquarium:
 The water might be muddy
 Or the aquarium too big
Transparency is about the correct amount
of easily understood, relevant information.
© Waher Data AB, 2018.
No retroactive processing
If you invent a new process, you must:
 Inform subjects before you process
 Not process historical data
You are only allowed to process the data
collected for that purpose, from the time
you inform the data subjects.
© Waher Data AB, 2018.
Paradigm shift
No longer true:
“The more data you collect (or process),
the more potential future value you have.”
New true:
“The more data you collect (or process),
the more risk you have.”
New paradigm:
You should only collect and process data,
to which you can assign value.
© Waher Data AB, 2018.
Individual rights
GDPR gives subjects following rights:
 Get information
 Access to data
 Export data (provided by subject)
 Correct (erroneous) data
 Erase data (under certain conditions)
 Object to processing
 Restrict processing of data
 Consent & withdrawal of consent (if applicable)
 Avoid being subject of automatic profiling that can
lead to automatic decisions having negative
consequences in a legal sense.
© Waher Data AB, 2018.
Sharing of personal data
When sharing data with others:
 Subjects must be informed
 Responsibilities must be delegated
 Requests from subjects must be
forwarded
 Includes links, copies and reproductions
© Waher Data AB, 2018.
2. Ownership
© Waher Data AB, 2018.
Who owns the data?
Who is the owner of data?
 The person/entity generating (inventing) the data?
 The person/entity storing (controlling) the data?
 The person about whom the data relates to?
Is it important?
© Waher Data AB, 2018.
Legislation
Which law is applicable?
 Copyright?
 Trade secrets?
 Intellectual Property?
 Privacy?
Enforcing ownership through legal means
is difficult.
© Waher Data AB, 2018.
Ownership of things
How is normal ownership enforced?
 Protection behind lock & key.
 Access only to trusted parties.
 Monitoring.
 Demonstration of ownership.
© Waher Data AB, 2018.
Ownership of data
Why treat data differently?
Local storage (decentralization) allows:
 Protection behind lock & key.
 Limiting access to trusted parties.
 Monitoring access.
 Demonstrating ownership.
 Enforcing ownership of data.
Added benefits:
 Intrinsic value of data through access.
 Easier to maintain integrity.
© Waher Data AB, 2018.
3. Security
© Waher Data AB, 2018.
Security
GDPR references as benchmark:
 “State of the art”.
 “Data protection by design and by
default”.
© Waher Data AB, 2018.
Data Protection by design
 Cannot be superficial:
 Not sufficient with log-in
 Or apparent security
 Must permeate architecture:
 APIs
 Databases
 Communication (Protocols)
 Code
 Hosting
 Runtime
© Waher Data AB, 2018.
Examples
Examples of Data Protection by design:
 Decentralization
 Ubiquitous encryption
 Authentication
 Authorization
 Hashing
 Signatures
 Anonymization
 Pseudonymization
 Obfuscation
 Data masking
 Data aggregation
 Security logging
 Monitoring
 …
© Waher Data AB, 2018.
Data Protection by default
You don’t add protection
 It’s all on by default
You remove protection
 Permissions are granted
Compare difference between:
 White-list (by default)
 Black-list (not by default)
© Waher Data AB, 2018.
Decentralization & security
Decentralization has security implications:
 More attack surfaces.
 But value of each node is small.
 Value/Effort ratio small.
 Easier to protect.
 Massive data breaches difficult.
 You don’t put all your eggs into the same basket.
 More resilient.
 End-to-end encryption.
Bonuses:
 Permits enforcing ownership of data
 Owner can authorize access, restrict processing or delete data
© Waher Data AB, 2018.
Anonymization vs. Strong Identities
Anonymization:
 Protects whistle blower or dissident
(or criminal or terrorist)
 Makes security decisions difficult.
Strong identities (pseudonyms):
 Protect information owners.
 Allows selective responses.
Both protect privacy, in different ways.
© Waher Data AB, 2018.
4. XMPP
© Waher Data AB, 2018.
XMPP
 eXtensible Messaging and Presence
Protocol
 Standardized (IETF)
 RFC 6120-6122
 Originally developed in the late 1990-ies.
 “Jabber”
 Based on XML
 Open
 Free
 Free interfaces, libraries & software
© Waher Data AB, 2018.
Basic features
Some basic features of XMPP include:
 Global scalability (federation)
 Global federated identities
 Extensibility (namespaces)
 Robustness (close to 20 years of operation)
 Open (public & free)
 Standardized
 Secure
 Interoperable
© Waher Data AB, 2018.
Extensibility
 XML Namespaces
 Avoid collisions
 Owner of domain can extend it freely
 Extensions standardized by XSF
 XMPP Standards Foundation
 XMPP Extension Protocol (XEP)
 Types
 Client-side extensions
 Component-extensions
 Server-side extensions
© Waher Data AB, 2018.
Communication Patterns
Async.
Msg.
Req/Resp Pub/Sub Federation Broker P2P7
MQTT ✓ ✓
HTTP ✓ ✓
CoAP ✓ ✓ ✓
XMPP ✓ ✓ ✓✓ ✓ ✓* ✓
* Note: XMPP supports server-less communication as well.
© Waher Data AB, 2018.
Stanzas
Three types of stanzas:
 message
 Asynchronous messages
 iq
 Information Query
 Request/Response
 Requires resource part
 presence
 Publish/subscribe
 Transmitted to contacts with approved subscription
 Forwards resource part
Note: A 2nd publish/subscribe mechanism exists, defined in XEP-0060. It’s
node-based.
© Waher Data AB, 2018.
Federated Brokers
 Authenticate clients
 SASL
 Cooperate (federation)
 Forward identities
 Authorization
 Roster
 Presence
 Subscription
 Solve
 Topology problem.
 Latency problem.
 Scalability problem.
© Waher Data AB, 2018.
Security
 Encryption
 TLS
 End-to-end encryption optional
 Authentication
 SASL
 Distributed authentication model
 Identities always forwarded in stanzas
 Authorization
 Presence subscription
 Trust-based
 Provisioning (IoT)
 Decision support for things
 Control details
 Blocking
 Spam reporting
© Waher Data AB, 2018.
Data Protection by Design
XMPP supports data protection by design:
 Decentralization
 Ubiquitous encryption
 Even end-to-end encryption
 Global identities
 Authenticated
 Forwarded
© Waher Data AB, 2018.
Data Protection by Default
XMPP supports data protection by default:
 Presence negotiation
 Consent-based
 Required to be able to communicate
using iq and presence.
 Consent can be withdrawn.
© Waher Data AB, 2018.
IEEE IoT Harmonization
Interoperability interfaces for IoT
 Sensor Data (former XEP-0323)
 Provisioning (former XEP-0324)
 Control (former XEP-0325)
 Concentrator/Bridge (former XEP-0326)
 Thing Registries & Discovery (XEP-0347)
 Secure Account Creation (XEP-0348)
https://gitlab.com/IEEE-SA/XMPPI/IoT
https://prezi.com/esosntqhewhs/iot-xmpp/
https://www.slideshare.net/peterwaher/iot-harmonization-using-xmpp
© Waher Data AB, 2018.
 Raspberry Pi & Arduino
 Sensors, Actuators, Controllers,
Concentrators, Bridges
 Protocols:
MQTT, HTTP, CoAP, LWM2M,
XMPP
 Interoperability
 Social Interaction
 Decision Support
 Product Lifecycle
 IoT Service Platforms
 IoT Harmonization
 Security
 Privacy
Amazon
Packt
Bokus
Bokus (e-book version)
Contact: https://waher.se/
Mastering Internet of Things

More Related Content

What's hot

Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...
Peter Waher
 
Cross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationCross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperation
Peter Waher
 
Dsdt meetup july2018
Dsdt meetup july2018Dsdt meetup july2018
Dsdt meetup july2018
JDA Labs MTL
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
Ulf Mattsson
 
Get Rich with Blockchain & Cryptocurrency
Get Rich with Blockchain & CryptocurrencyGet Rich with Blockchain & Cryptocurrency
Get Rich with Blockchain & Cryptocurrency
keerthi678722
 
Global Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupGlobal Cybersecurity Blockchain Group
Global Cybersecurity Blockchain Group
Maeva Ghonda
 
Blockchain security a different perspective
Blockchain security a different perspectiveBlockchain security a different perspective
Blockchain security a different perspective
Secunoid Systems Inc
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain Ecosystems
Dr. Nikolaus Lipusch
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab Slides
Pistoia Alliance
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
Ulf Mattsson
 
What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015
What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015
What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015
Robert Schwentker
 
Software Architecture and Model-driven Engineering for Blockchain Applications
Software Architecture and Model-driven Engineering for Blockchain ApplicationsSoftware Architecture and Model-driven Engineering for Blockchain Applications
Software Architecture and Model-driven Engineering for Blockchain Applications
Ingo Weber
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
Eryk Budi Pratama
 
Blockchain FinTech PoC
Blockchain FinTech PoCBlockchain FinTech PoC
Blockchain FinTech PoC
Sanjeev Raman
 
Azure blockchain service
Azure blockchain serviceAzure blockchain service
Azure blockchain service
Ravi Okade
 
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Digipolis Antwerpen
 
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
eraser Juan José Calderón
 
Security Model of Blockchain
Security Model of BlockchainSecurity Model of Blockchain
Security Model of Blockchain
saficus
 
Blockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsBlockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and Applications
Sanjeev Verma, PhD
 
Wp blockchain ilnas_e-version
Wp blockchain ilnas_e-versionWp blockchain ilnas_e-version
Wp blockchain ilnas_e-version
Jonas Mercier
 

What's hot (20)

Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...
 
Cross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationCross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperation
 
Dsdt meetup july2018
Dsdt meetup july2018Dsdt meetup july2018
Dsdt meetup july2018
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
 
Get Rich with Blockchain & Cryptocurrency
Get Rich with Blockchain & CryptocurrencyGet Rich with Blockchain & Cryptocurrency
Get Rich with Blockchain & Cryptocurrency
 
Global Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupGlobal Cybersecurity Blockchain Group
Global Cybersecurity Blockchain Group
 
Blockchain security a different perspective
Blockchain security a different perspectiveBlockchain security a different perspective
Blockchain security a different perspective
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain Ecosystems
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab Slides
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
 
What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015
What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015
What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015
 
Software Architecture and Model-driven Engineering for Blockchain Applications
Software Architecture and Model-driven Engineering for Blockchain ApplicationsSoftware Architecture and Model-driven Engineering for Blockchain Applications
Software Architecture and Model-driven Engineering for Blockchain Applications
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Blockchain FinTech PoC
Blockchain FinTech PoCBlockchain FinTech PoC
Blockchain FinTech PoC
 
Azure blockchain service
Azure blockchain serviceAzure blockchain service
Azure blockchain service
 
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
 
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
 
Security Model of Blockchain
Security Model of BlockchainSecurity Model of Blockchain
Security Model of Blockchain
 
Blockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsBlockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and Applications
 
Wp blockchain ilnas_e-version
Wp blockchain ilnas_e-versionWp blockchain ilnas_e-version
Wp blockchain ilnas_e-version
 

Similar to Privacy for IoT with XMPP

Smart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CitySmart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart City
Peter Waher
 
IoT Security
IoT SecurityIoT Security
IoT Security
Peter Waher
 
Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart City
Peter Waher
 
Smart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CitySmart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart City
Peter Waher
 
Smart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of ThingsSmart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of Things
Peter Waher
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs
 
Le soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRLe soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPR
Jürgen Ambrosi
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
IBM Sverige
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18
Cloudera, Inc.
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
Niklas Hjorthen
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
Annelore van der Lint
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
Cloudera, Inc.
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
Interaktiv
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
Sridhar Karnam
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
Forcepoint LLC
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
Ulf Mattsson
 
How businesses can benefit from privacy preserving synthetic data
How businesses can benefit from privacy preserving synthetic dataHow businesses can benefit from privacy preserving synthetic data
How businesses can benefit from privacy preserving synthetic data
Benjamin Nolan
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
Neo4j
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
David J Rosenthal
 

Similar to Privacy for IoT with XMPP (20)

Smart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CitySmart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart City
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart City
 
Smart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CitySmart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart City
 
Smart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of ThingsSmart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of Things
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Le soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRLe soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPR
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
How businesses can benefit from privacy preserving synthetic data
How businesses can benefit from privacy preserving synthetic dataHow businesses can benefit from privacy preserving synthetic data
How businesses can benefit from privacy preserving synthetic data
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 

More from Peter Waher

Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Peter Waher
 
Interoperabilidad e Internet
Interoperabilidad e InternetInteroperabilidad e Internet
Interoperabilidad e Internet
Peter Waher
 
IoT Security
IoT SecurityIoT Security
IoT Security
Peter Waher
 
Smart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesSmart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your Devices
Peter Waher
 
Smart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart CitySmart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart City
Peter Waher
 
Smart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling ActuatorsSmart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling Actuators
Peter Waher
 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to Encryption
Peter Waher
 
Smart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering DevicesSmart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering Devices
Peter Waher
 
Smart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your SensorSmart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your Sensor
Peter Waher
 
Smart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your DeviceSmart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your Device
Peter Waher
 
Smart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and ActuatorsSmart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and Actuators
Peter Waher
 
XMPP and IoT - an overview
XMPP and IoT - an overviewXMPP and IoT - an overview
XMPP and IoT - an overview
Peter Waher
 
XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)
Peter Waher
 
Web 3.0 & IoT (English)
Web 3.0 & IoT (English)Web 3.0 & IoT (English)
Web 3.0 & IoT (English)
Peter Waher
 
XSF - XMPP Standards Foundation
XSF - XMPP Standards FoundationXSF - XMPP Standards Foundation
XSF - XMPP Standards Foundation
Peter Waher
 

More from Peter Waher (15)

Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
 
Interoperabilidad e Internet
Interoperabilidad e InternetInteroperabilidad e Internet
Interoperabilidad e Internet
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Smart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesSmart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your Devices
 
Smart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart CitySmart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart City
 
Smart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling ActuatorsSmart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling Actuators
 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to Encryption
 
Smart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering DevicesSmart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering Devices
 
Smart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your SensorSmart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your Sensor
 
Smart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your DeviceSmart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your Device
 
Smart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and ActuatorsSmart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and Actuators
 
XMPP and IoT - an overview
XMPP and IoT - an overviewXMPP and IoT - an overview
XMPP and IoT - an overview
 
XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)
 
Web 3.0 & IoT (English)
Web 3.0 & IoT (English)Web 3.0 & IoT (English)
Web 3.0 & IoT (English)
 
XSF - XMPP Standards Foundation
XSF - XMPP Standards FoundationXSF - XMPP Standards Foundation
XSF - XMPP Standards Foundation
 

Recently uploaded

一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 

Recently uploaded (16)

一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 

Privacy for IoT with XMPP

  • 1. © Waher Data AB, 2018. IoT-Day 2018 Privacy for IoT with XMPP
  • 2. © Waher Data AB, 2018. 1. Privacy
  • 3. © Waher Data AB, 2018. What is privacy? A fundamental human right:  The right to have confidential conversations.  The ability to select with whom we communicate.  Protection against unwarranted monitoring or searches.  Protection against attacks on honor and reputation.
  • 4. © Waher Data AB, 2018. Universal Declaration of Human Rights Article 12: No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks. https://www.un.org/en/universal-declaration-human-rights/
  • 5. © Waher Data AB, 2018. Does privacy extend to the IoT? Who can communicate with devices around you, and about what? Do you want uninvited to know:  When you’re home?  If you’re in the shower?  What places you visit?  Your health status? Or be able to:  Control your vehicle?  Turn off your pacemaker?
  • 6. © Waher Data AB, 2018. E.U. privacy legislation (GDPR) EU Regulation:  Comes into full effect May 2018  Automatic law in all member states  Applicable to  Anyone, if system in E.U.  Any European citizen, in any system in the world  Heavy sanctions  Suddenly, corporations become interested in privacy.
  • 7. © Waher Data AB, 2018. Proportionality GDPR balances:  Rights to privacy for individuals  Interests of corporations  Legal requirements Maximum requirement:  Proportional to the rights of all participants Minimum requirement:  State of the art  People “skilled in the art” (professionals)  Lack of knowledge not valid reason
  • 8. © Waher Data AB, 2018. Personal Data Any information that relates directly or indirectly to an identified or identifiable natural person. Notice:  Indirect means, you have to think before you say there is no relation.  Identifiable means, the individual might not have been identified by your system. But if anyone, perhaps smarter than you, can identify the person from your data, perhaps with the use of other external data, it’s personal data. Easier to just assume data is personal, if there’s doubt.
  • 9. © Waher Data AB, 2018. Personality is contagious Data relating to personal data, automatically becomes personal data. (Personality acts like a virus, or disease, at least for the data hoarder, or Big Brother.)
  • 10. © Waher Data AB, 2018. Removing personality Removing personality is difficult. Methods:  Data aggregation  Data masking or obfuscation  Anonymization  Anonymization ≠ Pseudonymization
  • 11. © Waher Data AB, 2018. Processing Any operation (or set of operations) which is performed on personal data (or on sets of personal data) Notice:  The word “automatic” is not present in definition  Manual processing is included (if sorted).
  • 12. © Waher Data AB, 2018. Minimalistic definition A minimalistic definition of GDPR is: Minimalism You’re allowed to:  Do as little as possible  For as short a time as possible  Share it with as few as possible  For as few purposes as possible  As correctly as possible  Always transparently informing subjects about it  With proportional data protection mechanisms
  • 13. © Waher Data AB, 2018. Transparency Information you provide must be:  Short  Concise  Clear  Easy to understand  Explicit Transparency is measured on how your information is received and understood.
  • 14. © Waher Data AB, 2018. Openness Openness ≠ Transparency Providing too much information hides relevant information. Transparency means you provide the subjects with the information that is relevant to them, not to you.
  • 15. © Waher Data AB, 2018. Woods and aquariums “Can’t see the wood for all the trees” If you can’t find the fish in the aquarium:  The water might be muddy  Or the aquarium too big Transparency is about the correct amount of easily understood, relevant information.
  • 16. © Waher Data AB, 2018. No retroactive processing If you invent a new process, you must:  Inform subjects before you process  Not process historical data You are only allowed to process the data collected for that purpose, from the time you inform the data subjects.
  • 17. © Waher Data AB, 2018. Paradigm shift No longer true: “The more data you collect (or process), the more potential future value you have.” New true: “The more data you collect (or process), the more risk you have.” New paradigm: You should only collect and process data, to which you can assign value.
  • 18. © Waher Data AB, 2018. Individual rights GDPR gives subjects following rights:  Get information  Access to data  Export data (provided by subject)  Correct (erroneous) data  Erase data (under certain conditions)  Object to processing  Restrict processing of data  Consent & withdrawal of consent (if applicable)  Avoid being subject of automatic profiling that can lead to automatic decisions having negative consequences in a legal sense.
  • 19. © Waher Data AB, 2018. Sharing of personal data When sharing data with others:  Subjects must be informed  Responsibilities must be delegated  Requests from subjects must be forwarded  Includes links, copies and reproductions
  • 20. © Waher Data AB, 2018. 2. Ownership
  • 21. © Waher Data AB, 2018. Who owns the data? Who is the owner of data?  The person/entity generating (inventing) the data?  The person/entity storing (controlling) the data?  The person about whom the data relates to? Is it important?
  • 22. © Waher Data AB, 2018. Legislation Which law is applicable?  Copyright?  Trade secrets?  Intellectual Property?  Privacy? Enforcing ownership through legal means is difficult.
  • 23. © Waher Data AB, 2018. Ownership of things How is normal ownership enforced?  Protection behind lock & key.  Access only to trusted parties.  Monitoring.  Demonstration of ownership.
  • 24. © Waher Data AB, 2018. Ownership of data Why treat data differently? Local storage (decentralization) allows:  Protection behind lock & key.  Limiting access to trusted parties.  Monitoring access.  Demonstrating ownership.  Enforcing ownership of data. Added benefits:  Intrinsic value of data through access.  Easier to maintain integrity.
  • 25. © Waher Data AB, 2018. 3. Security
  • 26. © Waher Data AB, 2018. Security GDPR references as benchmark:  “State of the art”.  “Data protection by design and by default”.
  • 27. © Waher Data AB, 2018. Data Protection by design  Cannot be superficial:  Not sufficient with log-in  Or apparent security  Must permeate architecture:  APIs  Databases  Communication (Protocols)  Code  Hosting  Runtime
  • 28. © Waher Data AB, 2018. Examples Examples of Data Protection by design:  Decentralization  Ubiquitous encryption  Authentication  Authorization  Hashing  Signatures  Anonymization  Pseudonymization  Obfuscation  Data masking  Data aggregation  Security logging  Monitoring  …
  • 29. © Waher Data AB, 2018. Data Protection by default You don’t add protection  It’s all on by default You remove protection  Permissions are granted Compare difference between:  White-list (by default)  Black-list (not by default)
  • 30. © Waher Data AB, 2018. Decentralization & security Decentralization has security implications:  More attack surfaces.  But value of each node is small.  Value/Effort ratio small.  Easier to protect.  Massive data breaches difficult.  You don’t put all your eggs into the same basket.  More resilient.  End-to-end encryption. Bonuses:  Permits enforcing ownership of data  Owner can authorize access, restrict processing or delete data
  • 31. © Waher Data AB, 2018. Anonymization vs. Strong Identities Anonymization:  Protects whistle blower or dissident (or criminal or terrorist)  Makes security decisions difficult. Strong identities (pseudonyms):  Protect information owners.  Allows selective responses. Both protect privacy, in different ways.
  • 32. © Waher Data AB, 2018. 4. XMPP
  • 33. © Waher Data AB, 2018. XMPP  eXtensible Messaging and Presence Protocol  Standardized (IETF)  RFC 6120-6122  Originally developed in the late 1990-ies.  “Jabber”  Based on XML  Open  Free  Free interfaces, libraries & software
  • 34. © Waher Data AB, 2018. Basic features Some basic features of XMPP include:  Global scalability (federation)  Global federated identities  Extensibility (namespaces)  Robustness (close to 20 years of operation)  Open (public & free)  Standardized  Secure  Interoperable
  • 35. © Waher Data AB, 2018. Extensibility  XML Namespaces  Avoid collisions  Owner of domain can extend it freely  Extensions standardized by XSF  XMPP Standards Foundation  XMPP Extension Protocol (XEP)  Types  Client-side extensions  Component-extensions  Server-side extensions
  • 36. © Waher Data AB, 2018. Communication Patterns Async. Msg. Req/Resp Pub/Sub Federation Broker P2P7 MQTT ✓ ✓ HTTP ✓ ✓ CoAP ✓ ✓ ✓ XMPP ✓ ✓ ✓✓ ✓ ✓* ✓ * Note: XMPP supports server-less communication as well.
  • 37. © Waher Data AB, 2018. Stanzas Three types of stanzas:  message  Asynchronous messages  iq  Information Query  Request/Response  Requires resource part  presence  Publish/subscribe  Transmitted to contacts with approved subscription  Forwards resource part Note: A 2nd publish/subscribe mechanism exists, defined in XEP-0060. It’s node-based.
  • 38. © Waher Data AB, 2018. Federated Brokers  Authenticate clients  SASL  Cooperate (federation)  Forward identities  Authorization  Roster  Presence  Subscription  Solve  Topology problem.  Latency problem.  Scalability problem.
  • 39. © Waher Data AB, 2018. Security  Encryption  TLS  End-to-end encryption optional  Authentication  SASL  Distributed authentication model  Identities always forwarded in stanzas  Authorization  Presence subscription  Trust-based  Provisioning (IoT)  Decision support for things  Control details  Blocking  Spam reporting
  • 40. © Waher Data AB, 2018. Data Protection by Design XMPP supports data protection by design:  Decentralization  Ubiquitous encryption  Even end-to-end encryption  Global identities  Authenticated  Forwarded
  • 41. © Waher Data AB, 2018. Data Protection by Default XMPP supports data protection by default:  Presence negotiation  Consent-based  Required to be able to communicate using iq and presence.  Consent can be withdrawn.
  • 42. © Waher Data AB, 2018. IEEE IoT Harmonization Interoperability interfaces for IoT  Sensor Data (former XEP-0323)  Provisioning (former XEP-0324)  Control (former XEP-0325)  Concentrator/Bridge (former XEP-0326)  Thing Registries & Discovery (XEP-0347)  Secure Account Creation (XEP-0348) https://gitlab.com/IEEE-SA/XMPPI/IoT https://prezi.com/esosntqhewhs/iot-xmpp/ https://www.slideshare.net/peterwaher/iot-harmonization-using-xmpp
  • 43. © Waher Data AB, 2018.  Raspberry Pi & Arduino  Sensors, Actuators, Controllers, Concentrators, Bridges  Protocols: MQTT, HTTP, CoAP, LWM2M, XMPP  Interoperability  Social Interaction  Decision Support  Product Lifecycle  IoT Service Platforms  IoT Harmonization  Security  Privacy Amazon Packt Bokus Bokus (e-book version) Contact: https://waher.se/ Mastering Internet of Things