The document presents a communication architecture and policy model for privacy in smart grids. It proposes using semantic web technologies like RDF, HTTP URIs, and linked data principles to enable lightweight and flexible data access and exchange (R1-R3). It also proposes a policy model that allows users to specify what data at what granularity can be accessed by others (R4). These approaches are evaluated through two use cases - a smart grid/traffic service platform and a smart home energy management scenario. The goals are to meet key requirements for smart grid ICT systems while enabling user control over privacy and data sharing.
Linked Data for a privacy-aware Smart GridWagner Andreas
This document proposes a privacy-aware communication architecture and data model for the smart grid using semantic web technologies. It presents a policy model for expressing privacy restrictions on smart grid data through policies that are coupled to the published data. The policy model allows various actors to specify policies defining who can access what data for which purposes. A policy-aware data access procedure matches data requests to applicable policies. The approach is evaluated based on privacy principles such as data economy, purpose limitation and transparency. Future work is outlined to further develop technical enforcement of privacy in the smart grid.
This document contains slides from multiple presentations on cyber-physical systems (CPS) given by Bob Marcus of NIST. The slides cover topics such as interfacing CPS, big data and cloud computing; CPS use cases; CPS data processing and control; CPS engineering challenges; CPS security considerations; and CPS management. Many of the slides reference frameworks and documents published by NIST and other organizations on CPS architectures, applications, and research areas.
Project Topics for Masters in Information TechnologyPhdtopiccom
This document lists potential project topics for a Masters in Information Technology. It includes 5 relevant IT project titles focused on areas like localization using deep learning, reducing nonadherence risk with artificial intelligence, and machine learning for histologic grading. It also outlines 4 key points about artificial intelligence including dealing with complexity, understanding and predicting with unsupervised learning, autonomous actions using event driven contexts, and the scope of research purposes in data science evolution. Finally, it mentions some examples of intelligent applications in IT like virtual assistance, smart appliances, enterprise apps, medical devices, and autonomous vehicles.
The document summarizes the work done by the Measurement Ontology for IP traffic (MOI) Industry Specification Group (ISG) to develop ontologies for network traffic measurements. The MOI ISG has completed three work items: 1) a report on existing information models, 2) requirements for ontology development, and 3) an initial ontology architecture with sub-ontologies for general concepts, units, metadata, data, and anonymization. The goal is to standardize how network measurement data is structured and defined to enable semantic processing and integration of information from different sources. The MOI ontologies provide a framework for characterizing networks, monitoring quality of service, and other use cases.
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Amélie Gyrard
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web of Things Applications
The 8th IEEE International Conference on Internet of Things (iThings 2015), 11-13 December 2015, Sydney, Australia
Amelie Gyrard, Christian Bonnet, Karima Boudaoud, Martin Serrano
Linked Data for a privacy-aware Smart GridWagner Andreas
This document proposes a privacy-aware communication architecture and data model for the smart grid using semantic web technologies. It presents a policy model for expressing privacy restrictions on smart grid data through policies that are coupled to the published data. The policy model allows various actors to specify policies defining who can access what data for which purposes. A policy-aware data access procedure matches data requests to applicable policies. The approach is evaluated based on privacy principles such as data economy, purpose limitation and transparency. Future work is outlined to further develop technical enforcement of privacy in the smart grid.
This document contains slides from multiple presentations on cyber-physical systems (CPS) given by Bob Marcus of NIST. The slides cover topics such as interfacing CPS, big data and cloud computing; CPS use cases; CPS data processing and control; CPS engineering challenges; CPS security considerations; and CPS management. Many of the slides reference frameworks and documents published by NIST and other organizations on CPS architectures, applications, and research areas.
Project Topics for Masters in Information TechnologyPhdtopiccom
This document lists potential project topics for a Masters in Information Technology. It includes 5 relevant IT project titles focused on areas like localization using deep learning, reducing nonadherence risk with artificial intelligence, and machine learning for histologic grading. It also outlines 4 key points about artificial intelligence including dealing with complexity, understanding and predicting with unsupervised learning, autonomous actions using event driven contexts, and the scope of research purposes in data science evolution. Finally, it mentions some examples of intelligent applications in IT like virtual assistance, smart appliances, enterprise apps, medical devices, and autonomous vehicles.
The document summarizes the work done by the Measurement Ontology for IP traffic (MOI) Industry Specification Group (ISG) to develop ontologies for network traffic measurements. The MOI ISG has completed three work items: 1) a report on existing information models, 2) requirements for ontology development, and 3) an initial ontology architecture with sub-ontologies for general concepts, units, metadata, data, and anonymization. The goal is to standardize how network measurement data is structured and defined to enable semantic processing and integration of information from different sources. The MOI ontologies provide a framework for characterizing networks, monitoring quality of service, and other use cases.
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Amélie Gyrard
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web of Things Applications
The 8th IEEE International Conference on Internet of Things (iThings 2015), 11-13 December 2015, Sydney, Australia
Amelie Gyrard, Christian Bonnet, Karima Boudaoud, Martin Serrano
30th IEEE International Conference onAdvanced Information Networking and Applications (AINA-2016) March 23-25, 2016, Crans-Montana, Switzerland
Connected Smart Cities: Interoperability with SEG 3.0 for the Internet of Things
Semantic Interoperability
Methodology
Linked Open Data
Linked Open Vocabularies
Linked Open Reasoning
Linked Open Services
Internet of Things
Web of Things
Semantic Web of Things
Smart cities
Fi cloudpresentationgyrardaugust2015 v2Amélie Gyrard
Cross-Domain Internet of Things Application Development: M3 Framework and Evaluation
FiCloud 24-26 August 2015, Rome, Italy
Semantic Web technologies, Semantic Interoperability,
Semantic Web Of Things (SWoT), Internet of Things (IoT), Web of Things (WoT), Machine to Machine (M2M), Ubiquitous Computing, Pervasive Computing, Context Awareness
Linked Open Vocabularies for Internet of Things (LOV4IoT),
Sensor-based Linked Open Rules (S-LOR),
Machine-to-Machine Measurement (M3) framework,
sharing and reusing domain knowledge
IoT-Lite: A Lightweight Semantic Model for the Internet of ThingsPayamBarnaghi
This document presents IoT-Lite, a lightweight semantic model for annotating data in the Internet of Things. IoT-Lite aims to address issues of heterogeneity and interoperability in IoT systems by providing a simple way to semantically describe sensors, actuators, and other devices. It reuses existing models like SSN and defines best practices for annotation. Evaluations show IoT-Lite imposes minimal overhead on data size and query time compared to other semantic models. The goal of IoT-Lite is to make semantic descriptions transparent and easy to implement for both end users and data producers.
Tennis stroke detection using inertial data of a smartwatchtionMaynooth University
To assist individuals in sports activities is one of the emerging areas of wearable applications. Among various kinds of sports, detecting tennis strokes faces unique challenges. In this sport the speed of strokes is high, enforcing wearable sensors to have high sampling rates, high-speed bus (to transfer the data to the processor), and the most importantly adequate size of high-speed memory. The constraints encourage researchers to design a custom made hardware to cope with the challenges. The research question that we are trying to address is to show how accurate a commercial smartwatch can detect tennis strokes by using various techniques in machine learning. In this paper, we propose an approach to detect three tennis strokes by utilizing a smartwatch. In our method, the smartwatch is part of a wireless network in which inertial data file is transferred to a laptop where data prepossessing and classification is performed. The data file contains acceleration and angular velocity data of the 3D accelerometer and gyroscope. We also enhanced our method with data prepossessing techniques to elevate data quality. The evaluation of our devised method shows promising results compared to a similar method.
Semantic Technolgies for the Internet of ThingsPayamBarnaghi
This document discusses semantic technologies for representing and integrating data in the Internet of Things (IoT). It describes how XML, RDF, and ontologies can provide interoperable and machine-interpretable representations of IoT data. Specifically, it explains how these technologies allow defining structured models and vocabularies to annotate sensor data and integrate information from multiple heterogeneous sources. The document also discusses challenges in IoT data such as heterogeneity, multi-modality, and volume, and how semantic technologies can help address issues of data interoperability, discovery, and reasoning.
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
Cloud computing is becoming prominent trend which offers the number of significant advantages. One of the ground laying
advantage of the cloud computing is the pay-as-per-use, where according to the use of the services, the customer has to pay. At present,
user’s storage availability improves the data generation. There is requiring farming out such large amount of data. There is indefinite
large number of Cloud Service Providers (CSP). The Cloud Service Providers is increasing trend for many number of organizations and
as well as for the customers that decreases the burden of the maintenance and local data storage. In cloud computing transferring data to
the third party administrator control will give rise to security concerns. Within the cloud, compromisation of data may occur due to
attacks by the unauthorized users and nodes. So, in order to protect the data in cloud the higher security measures are required and also
to provide security for the optimization of the data retrieval time. The proposed system will approach the issues of security and
performance. Initially in the DROPS methodology, the division of the files into fragments is done and replication of those fragmented
data over the cloud node is performed. Single fragment of particular file can be stored on each of the nodes which ensure that no
meaningful information is shown to an attacker on a successful attack. The separation of the nodes is done by T-Coloring in order to
prohibit an attacker to guess the fragment’s location. The complete data security is ensured by DROPS methodology
2B-Schutz Presentation Wireless and IoTRobert Schutz
The document discusses the growth of wireless devices and the Internet of Things (IoT). It notes that wireless communication is the foundation for machine-to-machine communication and IoT. It raises questions about challenges like spectrum sharing, regulatory compliance, security, and data analytics at the massive scale of IoT deployment. It then describes Artisan Wireless Solutions' focus on developing a policy-driven architecture and protocol stack for personal sensor networks. Finally, it questions who will control the vast amounts of personal data and metadata collected by IoT devices and applications.
This document provides an overview of the Internet of Things (IoT) and introduces DeviceHive as an open-source M2M communication framework for IoT projects. DeviceHive addresses common IoT project problems such as implementing device logic and communication infrastructure by providing libraries, server deployment options, and APIs. It also includes features for device, data, and user management. Examples of using DeviceHive include controlling Philips Hue lights with Google Glass and analyzing energy consumption data for a utility company. The document provides more information on DeviceHive's website and upcoming training events.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
Designing Cross-Domain Semantic Web of Things ApplicationsAmélie Gyrard
The document discusses designing cross-domain semantic web of things applications. It introduces challenges including how to interpret IoT data, combine data from different domains, and reuse domain knowledge. The proposed M3 framework addresses these challenges through components like a SWoT generator template, M3 language and ontology, sensor-based linked open rules, and linked open vocabularies for IoT. Evaluations show the framework helps developers build semantic applications and interprets data efficiently while reusing interoperable domain knowledge. The framework has potential applications in domains like health, tourism and transportation.
Towards a Resource Slice Interoperability Hub for IoTHong-Linh Truong
Interoperability for IoT is a challenging problem
because it requires us to tackle (i) cross-system interoperability
issues at the IoT platform sides as well as relevant network
functions and clouds in the edge systems and data centers
and (ii) cross-layer interoperability, e.g., w.r.t. data formats,
communication protocols, data delivery mechanisms, and perfor-
mance. However, existing solutions are quite static w.r.t software
deployment and provisioning for interoperability. Many middle-
ware, services and platforms have been built and deployed as
interoperability bridges but they are not dynamically provisioned
and reconfigured for interoperability at runtime. Furthermore,
they are often not considered together with other services as a
whole in application-specific contexts. In this paper, we focus
on dynamic aspects by introducing the concept of Resource
Slice Interoperability Hub (rsiHub). Our approach leverages
existing software artifacts and services for interoperability to
create and provision dynamic resource slices, including IoT,
network functions and clouds, for addressing application-specific
interoperability requirements. We will present our key concepts,
architectures and examples toward the realization of rsiHub.
The document summarizes the ENGAGE project, which aims to create an open service platform to integrate large amounts of public sector data and resources to support research communities and citizens. The platform will gather data from government organizations, process it, and provide access in a personalized manner. It will deliver public sector data and citizen needs to researchers and governments. The project will connect to data sources, build directories, develop usage scenarios, and set up the initial infrastructure version to deploy first services.
International Journal on AdHoc Networking Systems (IJANS)pijans
Scope & Topics
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on ongoing research and new contributions. The journal addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh networks and vehicular networks. Its main focus is on all issues from link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
International Journal on AdHoc Networking Systems (IJANS)pijans
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on ongoing research and new contributions. The journal addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh networks and vehicular networks. Its main focus is on all issues from link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
Current Notions in Probabilistic Approach Networks Projects
Topical Networks in Probabilistic Approach Projects
Key Notes on Probabilistic Approaches Networks Projects
The platform architecture developed by the CPaaS.io project - both the overall system architecture as well as the two implementation architectures, one based on FIWARE and the other on u2 - as presented at the first year review meeting in Tokyo on October 5, 2017.
Disclaimer:
This document has been produced in the context of the CPaaS.io project which is jointly funded by the European Commission (grant agreement n° 723076) and NICT from Japan (management number 18302). All information provided in this document is provided "as is" and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. For the avoidance of all doubts, the European Commission and NICT have no liability in respect of this document, which is merely representing the view of the project consortium. This document is subject to change without notice.
Study and analysis of mobility, security, and caching issues in CCN IJECEIAES
This document summarizes a study that analyzed mobility, security, and caching issues in Content-Centric Networking (CCN). It discussed the basics of CCN including its key components like the Forwarding Information Base, Pending Interest Table, and Content Store. It then analyzed mobility management in CCN, comparing different schemes for handling consumer and producer mobility. It also discussed security schemes in CCN and reviewed different caching studies. The document aimed to identify open research challenges in these three important areas of CCN and discuss future trends for its large-scale deployment.
The document is a tutorial on Linked Data that discusses motivations for using Linked Data and provides an overview of key concepts. It summarizes that Linked Data allows publishing structured data on the web using semantic web technologies and standards, creating a single global data space. It outlines the four principles of Linked Data and shows how data from different sources can be interlinked and discovered through resolving URIs. Examples are given of large-scale deployment of Linked Data on the web and in government domains. Applications of Linked Data like browsers, search engines and mashups are also briefly described.
Ontologies in architecture, engineering and construction (AEC)Pieter Pauwels
This document discusses a workshop on ontologies in architecture, engineering and construction (AEC). It outlines the workshop agenda which includes discussions on the state of ontologies in the AEC sector, a case study on using ontologies for architectural design information, and a case study on using ontologies for energy related data. The document provides background information on existing uses of ontologies in AEC related tools and standards such as IFC and how semantic web technologies can be applied to link AEC data using ontologies.
30th IEEE International Conference onAdvanced Information Networking and Applications (AINA-2016) March 23-25, 2016, Crans-Montana, Switzerland
Connected Smart Cities: Interoperability with SEG 3.0 for the Internet of Things
Semantic Interoperability
Methodology
Linked Open Data
Linked Open Vocabularies
Linked Open Reasoning
Linked Open Services
Internet of Things
Web of Things
Semantic Web of Things
Smart cities
Fi cloudpresentationgyrardaugust2015 v2Amélie Gyrard
Cross-Domain Internet of Things Application Development: M3 Framework and Evaluation
FiCloud 24-26 August 2015, Rome, Italy
Semantic Web technologies, Semantic Interoperability,
Semantic Web Of Things (SWoT), Internet of Things (IoT), Web of Things (WoT), Machine to Machine (M2M), Ubiquitous Computing, Pervasive Computing, Context Awareness
Linked Open Vocabularies for Internet of Things (LOV4IoT),
Sensor-based Linked Open Rules (S-LOR),
Machine-to-Machine Measurement (M3) framework,
sharing and reusing domain knowledge
IoT-Lite: A Lightweight Semantic Model for the Internet of ThingsPayamBarnaghi
This document presents IoT-Lite, a lightweight semantic model for annotating data in the Internet of Things. IoT-Lite aims to address issues of heterogeneity and interoperability in IoT systems by providing a simple way to semantically describe sensors, actuators, and other devices. It reuses existing models like SSN and defines best practices for annotation. Evaluations show IoT-Lite imposes minimal overhead on data size and query time compared to other semantic models. The goal of IoT-Lite is to make semantic descriptions transparent and easy to implement for both end users and data producers.
Tennis stroke detection using inertial data of a smartwatchtionMaynooth University
To assist individuals in sports activities is one of the emerging areas of wearable applications. Among various kinds of sports, detecting tennis strokes faces unique challenges. In this sport the speed of strokes is high, enforcing wearable sensors to have high sampling rates, high-speed bus (to transfer the data to the processor), and the most importantly adequate size of high-speed memory. The constraints encourage researchers to design a custom made hardware to cope with the challenges. The research question that we are trying to address is to show how accurate a commercial smartwatch can detect tennis strokes by using various techniques in machine learning. In this paper, we propose an approach to detect three tennis strokes by utilizing a smartwatch. In our method, the smartwatch is part of a wireless network in which inertial data file is transferred to a laptop where data prepossessing and classification is performed. The data file contains acceleration and angular velocity data of the 3D accelerometer and gyroscope. We also enhanced our method with data prepossessing techniques to elevate data quality. The evaluation of our devised method shows promising results compared to a similar method.
Semantic Technolgies for the Internet of ThingsPayamBarnaghi
This document discusses semantic technologies for representing and integrating data in the Internet of Things (IoT). It describes how XML, RDF, and ontologies can provide interoperable and machine-interpretable representations of IoT data. Specifically, it explains how these technologies allow defining structured models and vocabularies to annotate sensor data and integrate information from multiple heterogeneous sources. The document also discusses challenges in IoT data such as heterogeneity, multi-modality, and volume, and how semantic technologies can help address issues of data interoperability, discovery, and reasoning.
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
Cloud computing is becoming prominent trend which offers the number of significant advantages. One of the ground laying
advantage of the cloud computing is the pay-as-per-use, where according to the use of the services, the customer has to pay. At present,
user’s storage availability improves the data generation. There is requiring farming out such large amount of data. There is indefinite
large number of Cloud Service Providers (CSP). The Cloud Service Providers is increasing trend for many number of organizations and
as well as for the customers that decreases the burden of the maintenance and local data storage. In cloud computing transferring data to
the third party administrator control will give rise to security concerns. Within the cloud, compromisation of data may occur due to
attacks by the unauthorized users and nodes. So, in order to protect the data in cloud the higher security measures are required and also
to provide security for the optimization of the data retrieval time. The proposed system will approach the issues of security and
performance. Initially in the DROPS methodology, the division of the files into fragments is done and replication of those fragmented
data over the cloud node is performed. Single fragment of particular file can be stored on each of the nodes which ensure that no
meaningful information is shown to an attacker on a successful attack. The separation of the nodes is done by T-Coloring in order to
prohibit an attacker to guess the fragment’s location. The complete data security is ensured by DROPS methodology
2B-Schutz Presentation Wireless and IoTRobert Schutz
The document discusses the growth of wireless devices and the Internet of Things (IoT). It notes that wireless communication is the foundation for machine-to-machine communication and IoT. It raises questions about challenges like spectrum sharing, regulatory compliance, security, and data analytics at the massive scale of IoT deployment. It then describes Artisan Wireless Solutions' focus on developing a policy-driven architecture and protocol stack for personal sensor networks. Finally, it questions who will control the vast amounts of personal data and metadata collected by IoT devices and applications.
This document provides an overview of the Internet of Things (IoT) and introduces DeviceHive as an open-source M2M communication framework for IoT projects. DeviceHive addresses common IoT project problems such as implementing device logic and communication infrastructure by providing libraries, server deployment options, and APIs. It also includes features for device, data, and user management. Examples of using DeviceHive include controlling Philips Hue lights with Google Glass and analyzing energy consumption data for a utility company. The document provides more information on DeviceHive's website and upcoming training events.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
Designing Cross-Domain Semantic Web of Things ApplicationsAmélie Gyrard
The document discusses designing cross-domain semantic web of things applications. It introduces challenges including how to interpret IoT data, combine data from different domains, and reuse domain knowledge. The proposed M3 framework addresses these challenges through components like a SWoT generator template, M3 language and ontology, sensor-based linked open rules, and linked open vocabularies for IoT. Evaluations show the framework helps developers build semantic applications and interprets data efficiently while reusing interoperable domain knowledge. The framework has potential applications in domains like health, tourism and transportation.
Towards a Resource Slice Interoperability Hub for IoTHong-Linh Truong
Interoperability for IoT is a challenging problem
because it requires us to tackle (i) cross-system interoperability
issues at the IoT platform sides as well as relevant network
functions and clouds in the edge systems and data centers
and (ii) cross-layer interoperability, e.g., w.r.t. data formats,
communication protocols, data delivery mechanisms, and perfor-
mance. However, existing solutions are quite static w.r.t software
deployment and provisioning for interoperability. Many middle-
ware, services and platforms have been built and deployed as
interoperability bridges but they are not dynamically provisioned
and reconfigured for interoperability at runtime. Furthermore,
they are often not considered together with other services as a
whole in application-specific contexts. In this paper, we focus
on dynamic aspects by introducing the concept of Resource
Slice Interoperability Hub (rsiHub). Our approach leverages
existing software artifacts and services for interoperability to
create and provision dynamic resource slices, including IoT,
network functions and clouds, for addressing application-specific
interoperability requirements. We will present our key concepts,
architectures and examples toward the realization of rsiHub.
The document summarizes the ENGAGE project, which aims to create an open service platform to integrate large amounts of public sector data and resources to support research communities and citizens. The platform will gather data from government organizations, process it, and provide access in a personalized manner. It will deliver public sector data and citizen needs to researchers and governments. The project will connect to data sources, build directories, develop usage scenarios, and set up the initial infrastructure version to deploy first services.
International Journal on AdHoc Networking Systems (IJANS)pijans
Scope & Topics
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on ongoing research and new contributions. The journal addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh networks and vehicular networks. Its main focus is on all issues from link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
International Journal on AdHoc Networking Systems (IJANS)pijans
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on ongoing research and new contributions. The journal addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh networks and vehicular networks. Its main focus is on all issues from link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
Current Notions in Probabilistic Approach Networks Projects
Topical Networks in Probabilistic Approach Projects
Key Notes on Probabilistic Approaches Networks Projects
The platform architecture developed by the CPaaS.io project - both the overall system architecture as well as the two implementation architectures, one based on FIWARE and the other on u2 - as presented at the first year review meeting in Tokyo on October 5, 2017.
Disclaimer:
This document has been produced in the context of the CPaaS.io project which is jointly funded by the European Commission (grant agreement n° 723076) and NICT from Japan (management number 18302). All information provided in this document is provided "as is" and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. For the avoidance of all doubts, the European Commission and NICT have no liability in respect of this document, which is merely representing the view of the project consortium. This document is subject to change without notice.
Study and analysis of mobility, security, and caching issues in CCN IJECEIAES
This document summarizes a study that analyzed mobility, security, and caching issues in Content-Centric Networking (CCN). It discussed the basics of CCN including its key components like the Forwarding Information Base, Pending Interest Table, and Content Store. It then analyzed mobility management in CCN, comparing different schemes for handling consumer and producer mobility. It also discussed security schemes in CCN and reviewed different caching studies. The document aimed to identify open research challenges in these three important areas of CCN and discuss future trends for its large-scale deployment.
The document is a tutorial on Linked Data that discusses motivations for using Linked Data and provides an overview of key concepts. It summarizes that Linked Data allows publishing structured data on the web using semantic web technologies and standards, creating a single global data space. It outlines the four principles of Linked Data and shows how data from different sources can be interlinked and discovered through resolving URIs. Examples are given of large-scale deployment of Linked Data on the web and in government domains. Applications of Linked Data like browsers, search engines and mashups are also briefly described.
Ontologies in architecture, engineering and construction (AEC)Pieter Pauwels
This document discusses a workshop on ontologies in architecture, engineering and construction (AEC). It outlines the workshop agenda which includes discussions on the state of ontologies in the AEC sector, a case study on using ontologies for architectural design information, and a case study on using ontologies for energy related data. The document provides background information on existing uses of ontologies in AEC related tools and standards such as IFC and how semantic web technologies can be applied to link AEC data using ontologies.
Interlinking Online Communities and Enriching Social Software with the Semant...John Breslin
This document summarizes a presentation about interlinking online communities using Semantic Web technologies. It discusses:
1. The SIOC (Semantically-Interlinked Online Communities) project which aims to semantically connect online discussion sites through a common data model.
2. How SIOC represents the structure and content of communities using RDF properties and classes. Communities can then exchange and query data using common semantics.
3. Tools that export community data into RDF using SIOC, including for WordPress, vBulletin, and phpBB. This allows interlinking users, content, and activities across sites.
This document provides an adaptation of a webinar on querying linked data for Android devices using a modified triple store implementation. It outlines instructions for installing OntoQuad, deploying a preloaded MusicBrainz dataset, and includes sample SPARQL queries adapted from the original webinar to query the data within the limitations of mobile devices. The sample queries are demonstrated to retrieve album and track information for the band Queen from the loaded dataset.
This presentation gives details on technologies and approaches towards exploiting Linked Data by building LD applications. In particular, it gives an overview of popular existing applications and introduces the main technologies that support implementation and development. Furthermore, it illustrates how data exposed through common Web APIs can be integrated with Linked Data in order to create mashups.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
SEMANCO - Integrating multiple data sources, domains and tools in urban ener...Álvaro Sicilia
Semantic-based interoperability based on ontologies provide an alternative to centralized stand-ard data models. They help to integrate heterogeneous data produced by loose coupled information systems and to interlink these data with different tools in ad hoc situations. In the SEMANCO project (www.semanco-project.eu) we have used semantic technologies to create energy models of urban areas encompassing a variety of data sources and do-mains (building, geospatial, energy, climate, socioeconomic). The semantically modelled data has been made accessible to a set of simulation and analysis tools. The interoperability among the data sources and between these and the tools that interact with them is assured by a Semantic Energy Information Framework (SEIF) developed in the project. The access to the data and tools takes place in the SEMANCO integrated platform. In this paper we describe the work carried out to integrate an existing simulation software –URSOS– with the semantic data model. The functionalities of the tool and the integrated platform have been demonstrated in an application case carried out in the city of Manresa, in Spain
A Study of Protocols for Grid Computing EnvironmentCSCJournals
This document summarizes a study of communication protocols for grid computing environments. It discusses the limitations of TCP for high bandwidth-delay networks and the need for new protocols to efficiently transfer bulk data across long distances. It categorizes various protocols that have been proposed into TCP-based, UDP-based, and application-layer protocols and evaluates them based on their operation, congestion control, throughput, fairness and other factors. The document also outlines issues in designing high performance protocols for grid computing and reviews several TCP variants and reliable transport protocols developed to improve performance over high-speed networks.
Presentation of the paper by M. Söllner, C. Görg, K. Pentikousis, J. Mª Cabero Lopez, M. Ponce de Leon, P. Bertin, "Mobility Scenarios for the Future Internet: the 4WARD approach", WPMC 2008, Sept 2008
PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...IJDKP
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
July 29 ~ 30, 2023, London, United Kingdom
Webpage URL:
https://itcse2023.org/cbiot/index
Submission Deadline: July 01, 2023
Contact us:
Here's where you can reach us: cbiot@itcse2023.org (or) cbiot.conf@yahoo.com
Submission URL:
https://itcse2023.org/submission/index.php
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their
implementation has posed several challenges insofar that they generate and process vast amounts of
security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and
constrained devices communicating with each other and being accessed ubiquitously through lossy
networks. In this scenario, the routing of data is a specific area of concern especially with the inherent
constraints and limiting properties of such devices like processing resources, memory capacity and battery
life. To suit these constraints and to provide the required connectivity, the IETF has developed several
standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be
compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing
Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management
mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In
addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared
with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be
better
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
The document summarizes the 4WARD project's approach to mobility challenges in a future internet. The 4WARD project takes a clean-slate approach to designing a global communications infrastructure that focuses on an "information-centric" network and integrates mobility as a core capability. It aims to overcome today's complex mobile scenarios through architectural concepts like virtualization of networks and a "network of information" that manages distributed information objects independently of location. The project is developing prototypes and design principles to realize virtual mobile networks and mobile virtual networks with guaranteed interoperability of functions like mobility, security and quality of service.
Call for Research Articles - 4th International Conference on Cloud, Big Data ...ijistjournal
The 4th International Conference on Cloud, Big Data and IoT (CBIoT 2023) will be held on July 29-30, 2023 in London, United Kingdom. The conference will provide a forum for researchers and industry professionals to present innovative ideas and advancements in cloud computing, big data, and IoT. Authors are encouraged to submit papers by July 08, 2023 describing original research, projects, case studies, and experiences in these areas. Accepted papers will be published in the conference proceedings and selected papers will be published in related journals.
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)IJMIT JOURNAL
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cloud, Big Data and IoT.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Cloud, Big Data and IoT.
Submit Your Research Articles - 4th International Conference on Cloud, Big Da...IJNSA Journal
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cloud, Big Data and IoT.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Cloud, Big Data and IoT.
This document discusses IoT networking and quality of service (QoS) for IoT networks. It begins by describing the characteristics of IoT devices such as low processing power, small size, and energy constraints. It then discusses enabling the classical Internet for IoT devices through standards developed by the IETF, including 6LoWPAN, ROLL, and CoRE. CoRE provides a framework for IoT applications and services discovery. The document concludes by examining policies for QoS in IoT networks to guarantee intended service, covering resource utilization, data timeliness, availability, and delivery.
Analytical Review On The Stakeholders Perceptions About IPv6 Readiness And Th...Tracy Drey
This document analyzes the readiness of Higher Education Institutions (HEIs) in Oman to adopt IPv6. It finds that while the Telecommunications Regulatory Authority established an IPv6 project 10 years ago and issued guidelines for migrating to IPv6 by 2020, data on HEIs' responses is limited. The next stage of research will investigate stakeholders' perceptions of HEIs' actual readiness to implement IPv6 through surveys of ICT personnel, administrators, and senior staff. Globally, many countries and institutions have adopted IPv6 transition plans and policies, but implementation varies and often lacks services, funding, coordination or technical knowledge.
This document discusses Internet of Things (IoT) concepts including reference models, connection levels, applications, and a practical scenario. It describes the IoT World Forum reference model which consists of 7 layers covering physical devices, connectivity, edge computing, data storage, access, applications, and collaboration. It also outlines the 4 main connection levels in IoT - device-to-device, device-to-cloud, device-to-gateway-to-cloud, and device-to-gateway-to-cloud-to-application. Finally, it provides a case study of an IoT system for early plant disease detection on smart farms.
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVEIJNSA Journal
A technology platform that is gradually bridging the gap between object visibility and remote accessibility is the Internet of Things (IoT). Rapid deployment of this application can significantly transform the health, housing, and power (distribution and generation) sectors, etc. It has considerably changed the power sector regarding operations, services optimization, power distribution, asset management and aided in engaging customers to reduce energy consumption. Despite its societal opportunities and the benefits it presents, the power generation sector is bedeviled with many security challenges on the critical infrastructure. This review discusses the security challenges posed by IoT in power generation and critical infrastructure. To achieve this, the authors present the various IoT applications, particularly on the grid infrastructure, from an empirical literature perspective. The authors concluded by discussing how the various entities in the sector can overcome these security challenges to ensure an exemplary future IoT implementation on the power critical infrastructure value chain.
11th International Conference on Parallel, Distributed Computing Technologies...IJCSEA Journal
11th International Conference on Parallel, Distributed Computing Technologies and Applications (PDCTA 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Parallel, Distributed Computing. Original papers are invited on Algorithms and Applications, computer Networks, Cyber trust and security, Wireless networks and mobile computing and Bioinformatics. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...IIRindia
With cloud computing, users can remotely store their data into the cloud and use on-demand high-quality applications. Data outsourcing: users are relieved from the burden of data storage and maintenance When users put their data (of large size) on the cloud, the data integrity protection is challenging enabling public audit for cloud data storage security is important Users can ask an external audit party to check the integrity of their outsourced data. Purpose of developing data security for data possession at un-trusted cloud storage servers we are often limited by the resources at the cloud server as well as at the client. Given that the data sizes are large and are stored at remote servers, accessing the entire file can be expensive in input output costs to the storage server. Also transmitting the file across the network to the client can consume heavy bandwidths. Since growth in storage capacity has far outpaced the growth in data access as well as network bandwidth, accessing and transmitting the entire archive even occasionally greatly limits the scalability of the network resources. Furthermore, the input output to establish the data proof interferes with the on-demand bandwidth of the server used for normal storage and retrieving purpose. The Third Party Auditor is a respective person to manage the remote data in a global manner.
This document reviews the Security and QoS Aware Dynamic Clustering (SQADC) Routing protocol for cognitive radio networks (CRNs). It first discusses existing routing protocols for CRNs and identifies gaps, including that most focus on improving quality of service but few address security issues. It then outlines the objectives of designing a new routing protocol to achieve a tradeoff between QoS performance and security performance for CRNs. The proposed SQADC protocol will use dynamic clustering based on ant colony optimization for cluster head selection and re-clustering to optimize spectrum allocation and quality of service while introducing a lightweight trust-based mechanism for detecting malicious nodes.
Multipath Dynamic Source Routing Protocol using Portfolio SelectionIRJET Journal
This document discusses a multipath dynamic source routing protocol that uses portfolio selection to allocate traffic across multiple paths in a jamming-aware manner. It proposes using portfolio selection theory, originally developed for financial investments, to make routing decisions robust to jamming. The source node considers jamming statistics and portfolio selection to efficiently allocate traffic across paths, improving throughput and reducing congestion or jamming possibilities. A simulation showed the proposed mechanism was effective at improving network performance. It also reviews related work on jamming-aware routing and distributed data storage systems.
Similar to Web Techologies and Privacy policies for the Smart Grid (20)
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Web Techologies and Privacy policies for the Smart Grid
1. Web Technologies and Privacy Policies
for the Smart Grid
Sebastian Speiser† , Andreas Wagner† , Oliver Raabe‡ and Andreas Harth† | Energieinformatik 2013
I NSTITUTE
OF
A PPLIED I NFORMATICS
AND
KIT – University of the State of Baden-Wuerttemberg and
National Laboratory of the Helmholtz Association
F ORMAL D ESCRIPTION M ETHODS†
AND
¨
Z ENTRUM F UR A NGEWANDTE R ECHTSWISSENSCHAFT‡
www.kit.edu
2. Agenda
1
Introduction
2
ICT Architecture and Data Model
3
Use-Case I
4
Policies for a Privacy-aware Smart Grid
5
Use-Case II
6
Evaluation
7
Conclusion
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
2/41
3. Introduction
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
3/41
4. (Some) Key ICT Requirements
Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
4/41
5. (Some) Key ICT Requirements
Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
4/41
6. (Some) Key ICT Requirements
Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
4/41
7. (Some) Key ICT Requirements
Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
4/41
8. (Some) Key ICT Requirements
Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
4/41
9. Contributions
R1-R3: Semantic Web communication architecture (Section 2).
R4: Policy model (Section 4).
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
5/41
10. Contributions
R1-R3: Semantic Web communication architecture (Section 2).
R4: Policy model (Section 4).
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
5/41
11. Communication Architecture
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
6/41
12. Overview: A Semantic Web-based
Communication Architecture I
Data access layers
URIs for identification of participants.
TCP/IP stack with HTTP as transfer protocol.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
7/41
13. Overview: A Semantic Web-based
Communication Architecture I
Data access layers
URIs for identification of participants.
TCP/IP stack with HTTP as transfer protocol.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
7/41
14. Overview of a Semantic Web-based
Communication Architecture II
Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
8/41
15. Overview of a Semantic Web-based
Communication Architecture II
Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
8/41
16. Overview of a Semantic Web-based
Communication Architecture II
Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
8/41
17. Overview of a Semantic Web-based
Communication Architecture II
Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
8/41
18. Overview of a Semantic Web-based
Communication Architecture II
Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
8/41
19. Use-Case I
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
9/41
20. Use-Case I (iZEUS) – Smart Grid/Traffic
Service Platform – Data Management I
Service
Requests
Smart
Traffic
Navigator
Service
Platform
Smart
Meter
Analyzer
...
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
10/41
21. Use-Case I (iZEUS) – Smart Grid/Traffic
Service Platform – Data Management II
car:uamp760e1
car:uamp760e2
RDF
Data
car:uamp760e3
RDF
Data
car:uamp760e rdf:type sg:Vehicle ;
foaf:name "UltraAmp 760e" .
geo:location _:loc20130331 .
_:loc20100331 dc:date "2013-03-31T12:23:45";
geo:lat "49.0047222" ;
geo:lon "8.3858333" .
RDF
Data
Get additional
data
Data logging
Linked Data
Endpoint
Service
Requests
Smart
Traffic
Navigator
RDF
Data
Service
Platform
Smart
Meter
Analyzer
...
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
11/41
22. Use-Case I (iZEUS) – Smart Grid/Traffic
Service Platform – Data Management III
Smart home at KIT
car:uamp760e2
car:uamp760e3
car:uamp760e1
RDF
Data
RDF
Data
RDF
Data
Get additional
data
Smart
Traffic
Navigator
RDF
Data
sm:apt
Get additional
RDF
data sm:meter
Data
Service
Platform
Smart
Meter
Analyzer
Get additional
data
RDF
Data
Data logging
Linked Data
Endpoint
Service
Requests
Future work
RDF
RDF
RDF
data logging
...
TCP/IP/HTTP
RDF
RDF
Data
WWW
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
12/41
23. Use-Case I (iZEUS) – Smart Grid/Traffic
Service Platform – Data Management IV
Smart home at KIT
car:uamp760e2
car:uamp760e3
car:uamp760e1
RDF
Data
RDF
Data
RDF
Data
Get additional
data
Smart
Traffic
Navigator
RDF
Data
sm:apt
Get additional
RDF
data sm:meter
Data
RDF
RDF
Service
Platform
TCP/IP/HTTP
Data logging
Smart
Meter
Analyzer
Get additional
data
RDF
Data
Data logging
Linked Data
Endpoint
Service
Requests
Future work
...
Gridpedia as
data model
RDF
RDF
Data
WWW
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
13/41
24. Privacy Policies
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
14/41
25. Policy Model
Intuition
Policies model user intent, thus, they help to preserve data privacy.
A Policy is bound to its associated data.
Policies are taken into account whenever data is accessed.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
15/41
26. Policy Model
Intuition
Policies model user intent, thus, they help to preserve data privacy.
A Policy is bound to its associated data.
Policies are taken into account whenever data is accessed.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
15/41
27. Policy Model
Intuition
Policies model user intent, thus, they help to preserve data privacy.
A Policy is bound to its associated data.
Policies are taken into account whenever data is accessed.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
15/41
29. Policy-aware Data Access
Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
17/41
30. Policy-aware Data Access
Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
17/41
31. Policy-aware Data Access
Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
17/41
32. Policy-aware Data Access
Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
17/41
33. Policy-aware Data Access
Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
17/41
34. Use-Case II
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
18/41
35. Use-Case II (iZEUS) – Smart Grid/Traffic
Service Platform – Data Privacy I
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
19/41
36. Use-Case II (iZEUS) – Smart Grid/Traffic
Service Platform – Data Privacy II
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
20/41
37. Evaluation
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
21/41
38. Scope of Evaluation
Our previous works aimed at evaluation of privacy policies via
German privacy laws [1, 4].
This works evaluates the practical feasibility of privacy policies stored
(matched) on lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
22/41
39. Scope of Evaluation
Our previous works aimed at evaluation of privacy policies via
German privacy laws [1, 4].
This works evaluates the practical feasibility of privacy policies stored
(matched) on lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
22/41
40. Evaluation Setting
We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.
We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2
1
2
http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
23/41
41. Evaluation Setting
We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.
We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2
1
2
http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
23/41
42. Evaluation Setting
We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.
We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2
1
2
http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
23/41
43. Evaluation Setting
We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.
We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2
1
2
http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
23/41
44. Evaluation Setting
We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.
We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2
1
2
http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
23/41
45. Evaluation Setting
We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.
We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2
1
2
http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
23/41
46. matching time in seconds
Evaluation Results
0.7
Allowed Core2Duo
Denied Core2Duo
Allowed ARM
Denied ARM
0.6
0.5
0.4
0.3
0.2
0.1
0
0
10
20
30
40
50
policy size
60
70
80
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
24/41
47. Conclusion
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
25/41
48. Conclusion
By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
26/41
49. Conclusion
By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
26/41
50. Conclusion
By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
26/41
51. Conclusion
By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
26/41
52. Conclusion
By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
26/41
53. Slides will be available at http://slideshare.net/
Paper will be available at http://aifb.kit.edu/
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
27/41
54. Acknowledgements: iZEUS Project
This work was supported by the German Federal Ministry of Economics and
Technology (E-Energy iZEUS, Grant 01 ME12013). The authors are responsible
for the content of the presentation.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
28/41
55. References
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
29/41
56. References I
Oliver Raabe.
Datenschutz im SmartGrid.
Datenschutz und Datensicherheit, 2010.
S. Rohjans, C. Danekas, and M. Uslar.
Requirements for Smart Grid ICT-architectures.
In ISGT, 2012.
Andreas Wagner, Sebastian Speiser, and Andreas Harth.
Semantic Web Technologies for a Smart Energy Grid: Requirements
and Challenges.
In ISWC, 2010.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
30/41
57. References II
Andreas Wagner, Sebastian Speiser, Oliver Raabe, and Andreas
Harth.
Linked Data for a Privacy-aware Smart Grid.
In GI Jahrestagung, 2010.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
31/41
58. Backup Slides
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
32/41
59. Use-Case I (iZEUS) – Collaborative
Smart Grid Ontology – Gripedia I
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
33/41
60. Use-Case I (iZEUS) – Collaborative
Smart Grid Ontology – Gripedia II
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
34/41
61. Use-Case I (iZEUS) – Collaborative
Smart Grid Ontology – Gripedia III
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
35/41
62. Linked Data for the Smart Grid –
Example
Customer
Legend
Communication
Flow
Charging
Station
(off-premise)
Electric Vehicle
ex:uamp760e
Domain
ex:Mary
Metering Provider B
(third party provider)
Clearing
Markets
Cool Wash Inc.
Energy Efficiency
Service Provider
Premise
ex:apt
Actor
Network
Washing Machine
ex:coolWash
Smart Meter
ex:sm
Metering Provider
A
Billing
Service Provider
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
36/41
63. Linked Data for the Smart Grid –
Example II
Mary’s Linked Data
/ / lookup on ex : coolWash ; data r e s i d e s a t washing machine
ex : coolWash
r d f : t y p e sg : A p p l i a n c e ;
sg : m a n u f a c t u r e r < h t t p : / / coolWash . com / company >;
sg : owner ex : mary ;
sg : washingData washer : program40 ;
sg : consumption sm : data20100310 .
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
37/41
64. Linked RDF Data for the Smart Grid III
Mary’s Linked Data II
/ / lookup on sm : data20100310 ; data r e s i d e s a t smart meter
sm : data20100310
r d f : t y p e sg : Consumption ;
r d f : v a l u e ” 1 . 0 4 ” ˆ ˆ sg : kWh ;
i c a l : d t s t a r t ”2010−03−10T00 : 0 0 : 0 0 ” ;
i c a l : dtend
”2010−03−10T01 : 0 0 : 0 0 ” .
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
38/41
65. Policy-aware Data Access II
Matching procedure
The matching procedure is implemented as a rule, checking whether . . .
i) requestor is subsumed by the recipient description and
ii) the requested purpose is subsumed by the allowed purpose (both
w.r.t. the applicable policy)
Assumption: the same purpose and recipient definition is employed →
subclass-of or same-as check is sufficient for realising the subsume
operation.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
39/41
66. Policy Model III
An example policy for Mary’s UltraAmp 760e I
washer : eCarPol r d f : t y p e sg : P o l i c y ;
i c a l : d t s t a r t ”2010−01−01T00 : 0 0 : 0 0 ” ˆ ˆ xs : dateTime ;
i c a l : dtend
”2010−12−31T23 : 5 9 : 5 9 ” ˆ ˆ xs : dateTime ;
sg : a l l o w s #ultraAmpUse .
#ultraAmpUse r d f : t y p e sg : Usage ;
sg : purpose gov : Purpose# s e r v i c e ;
sg : r e c i p i e n t < h t t p : / / ultraAmp . com / company >;
sg : p e r s p e c t i v e # u l t r a A m p P e r s p e c t i v e .
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
40/41
67. Policy Model IV
An example policy for Mary’s Mary’s UltraAmp 760e II
# u l t r a A m p P e r s p e c t i v e r d f : t y p e sg : P e r s p e c t i v e ;
sg : d e f i n i t i o n ” PREFIX . . . CONSTRUCT { ?s ?p ?o }
WHERE { ?s r d f : t y p e sg : A p p l i a n c e .
?s sg : m a n u f a c t u r e r < h t t p : / / ultraAmp . com / company >.
?s ?p ?o .
FILTER ( ? p ! = sg : consumption ) } ” .
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
41/41