Web Techologies and Privacy policies for the Smart Grid
1. Web Technologies and Privacy Policies
for the Smart Grid
Sebastian Speiser† , Andreas Wagner† , Oliver Raabe‡ and Andreas Harth† | Energieinformatik 2013
I NSTITUTE
OF
A PPLIED I NFORMATICS
AND
KIT – University of the State of Baden-Wuerttemberg and
National Laboratory of the Helmholtz Association
F ORMAL D ESCRIPTION M ETHODS†
AND
¨
Z ENTRUM F UR A NGEWANDTE R ECHTSWISSENSCHAFT‡
www.kit.edu
2. Agenda
1
Introduction
2
ICT Architecture and Data Model
3
Use-Case I
4
Policies for a Privacy-aware Smart Grid
5
Use-Case II
6
Evaluation
7
Conclusion
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
2/41
3. Introduction
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
3/41
4. (Some) Key ICT Requirements
Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
4/41
5. (Some) Key ICT Requirements
Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
4/41
6. (Some) Key ICT Requirements
Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
4/41
7. (Some) Key ICT Requirements
Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
4/41
8. (Some) Key ICT Requirements
Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
4/41
9. Contributions
R1-R3: Semantic Web communication architecture (Section 2).
R4: Policy model (Section 4).
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
5/41
10. Contributions
R1-R3: Semantic Web communication architecture (Section 2).
R4: Policy model (Section 4).
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
5/41
11. Communication Architecture
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
6/41
12. Overview: A Semantic Web-based
Communication Architecture I
Data access layers
URIs for identification of participants.
TCP/IP stack with HTTP as transfer protocol.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
7/41
13. Overview: A Semantic Web-based
Communication Architecture I
Data access layers
URIs for identification of participants.
TCP/IP stack with HTTP as transfer protocol.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
7/41
14. Overview of a Semantic Web-based
Communication Architecture II
Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
8/41
15. Overview of a Semantic Web-based
Communication Architecture II
Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
8/41
16. Overview of a Semantic Web-based
Communication Architecture II
Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
8/41
17. Overview of a Semantic Web-based
Communication Architecture II
Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
8/41
18. Overview of a Semantic Web-based
Communication Architecture II
Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
8/41
19. Use-Case I
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
9/41
20. Use-Case I (iZEUS) – Smart Grid/Traffic
Service Platform – Data Management I
Service
Requests
Smart
Traffic
Navigator
Service
Platform
Smart
Meter
Analyzer
...
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
10/41
21. Use-Case I (iZEUS) – Smart Grid/Traffic
Service Platform – Data Management II
car:uamp760e1
car:uamp760e2
RDF
Data
car:uamp760e3
RDF
Data
car:uamp760e rdf:type sg:Vehicle ;
foaf:name "UltraAmp 760e" .
geo:location _:loc20130331 .
_:loc20100331 dc:date "2013-03-31T12:23:45";
geo:lat "49.0047222" ;
geo:lon "8.3858333" .
RDF
Data
Get additional
data
Data logging
Linked Data
Endpoint
Service
Requests
Smart
Traffic
Navigator
RDF
Data
Service
Platform
Smart
Meter
Analyzer
...
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
11/41
22. Use-Case I (iZEUS) – Smart Grid/Traffic
Service Platform – Data Management III
Smart home at KIT
car:uamp760e2
car:uamp760e3
car:uamp760e1
RDF
Data
RDF
Data
RDF
Data
Get additional
data
Smart
Traffic
Navigator
RDF
Data
sm:apt
Get additional
RDF
data sm:meter
Data
Service
Platform
Smart
Meter
Analyzer
Get additional
data
RDF
Data
Data logging
Linked Data
Endpoint
Service
Requests
Future work
RDF
RDF
RDF
data logging
...
TCP/IP/HTTP
RDF
RDF
Data
WWW
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
12/41
23. Use-Case I (iZEUS) – Smart Grid/Traffic
Service Platform – Data Management IV
Smart home at KIT
car:uamp760e2
car:uamp760e3
car:uamp760e1
RDF
Data
RDF
Data
RDF
Data
Get additional
data
Smart
Traffic
Navigator
RDF
Data
sm:apt
Get additional
RDF
data sm:meter
Data
RDF
RDF
Service
Platform
TCP/IP/HTTP
Data logging
Smart
Meter
Analyzer
Get additional
data
RDF
Data
Data logging
Linked Data
Endpoint
Service
Requests
Future work
...
Gridpedia as
data model
RDF
RDF
Data
WWW
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
13/41
24. Privacy Policies
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
14/41
25. Policy Model
Intuition
Policies model user intent, thus, they help to preserve data privacy.
A Policy is bound to its associated data.
Policies are taken into account whenever data is accessed.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
15/41
26. Policy Model
Intuition
Policies model user intent, thus, they help to preserve data privacy.
A Policy is bound to its associated data.
Policies are taken into account whenever data is accessed.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
15/41
27. Policy Model
Intuition
Policies model user intent, thus, they help to preserve data privacy.
A Policy is bound to its associated data.
Policies are taken into account whenever data is accessed.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
15/41
29. Policy-aware Data Access
Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
17/41
30. Policy-aware Data Access
Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
17/41
31. Policy-aware Data Access
Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
17/41
32. Policy-aware Data Access
Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
17/41
33. Policy-aware Data Access
Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
17/41
34. Use-Case II
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
18/41
35. Use-Case II (iZEUS) – Smart Grid/Traffic
Service Platform – Data Privacy I
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
19/41
36. Use-Case II (iZEUS) – Smart Grid/Traffic
Service Platform – Data Privacy II
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
20/41
37. Evaluation
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
21/41
38. Scope of Evaluation
Our previous works aimed at evaluation of privacy policies via
German privacy laws [1, 4].
This works evaluates the practical feasibility of privacy policies stored
(matched) on lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
22/41
39. Scope of Evaluation
Our previous works aimed at evaluation of privacy policies via
German privacy laws [1, 4].
This works evaluates the practical feasibility of privacy policies stored
(matched) on lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
22/41
40. Evaluation Setting
We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.
We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2
1
2
http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
23/41
41. Evaluation Setting
We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.
We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2
1
2
http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
23/41
42. Evaluation Setting
We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.
We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2
1
2
http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
23/41
43. Evaluation Setting
We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.
We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2
1
2
http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
23/41
44. Evaluation Setting
We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.
We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2
1
2
http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
23/41
45. Evaluation Setting
We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.
We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2
1
2
http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
23/41
46. matching time in seconds
Evaluation Results
0.7
Allowed Core2Duo
Denied Core2Duo
Allowed ARM
Denied ARM
0.6
0.5
0.4
0.3
0.2
0.1
0
0
10
20
30
40
50
policy size
60
70
80
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
24/41
47. Conclusion
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
25/41
48. Conclusion
By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
26/41
49. Conclusion
By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
26/41
50. Conclusion
By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
26/41
51. Conclusion
By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
26/41
52. Conclusion
By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...
... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
26/41
53. Slides will be available at http://slideshare.net/
Paper will be available at http://aifb.kit.edu/
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
27/41
54. Acknowledgements: iZEUS Project
This work was supported by the German Federal Ministry of Economics and
Technology (E-Energy iZEUS, Grant 01 ME12013). The authors are responsible
for the content of the presentation.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
28/41
55. References
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
29/41
56. References I
Oliver Raabe.
Datenschutz im SmartGrid.
Datenschutz und Datensicherheit, 2010.
S. Rohjans, C. Danekas, and M. Uslar.
Requirements for Smart Grid ICT-architectures.
In ISGT, 2012.
Andreas Wagner, Sebastian Speiser, and Andreas Harth.
Semantic Web Technologies for a Smart Energy Grid: Requirements
and Challenges.
In ISWC, 2010.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
30/41
57. References II
Andreas Wagner, Sebastian Speiser, Oliver Raabe, and Andreas
Harth.
Linked Data for a Privacy-aware Smart Grid.
In GI Jahrestagung, 2010.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
31/41
58. Backup Slides
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
32/41
59. Use-Case I (iZEUS) – Collaborative
Smart Grid Ontology – Gripedia I
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
33/41
60. Use-Case I (iZEUS) – Collaborative
Smart Grid Ontology – Gripedia II
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
34/41
61. Use-Case I (iZEUS) – Collaborative
Smart Grid Ontology – Gripedia III
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
35/41
62. Linked Data for the Smart Grid –
Example
Customer
Legend
Communication
Flow
Charging
Station
(off-premise)
Electric Vehicle
ex:uamp760e
Domain
ex:Mary
Metering Provider B
(third party provider)
Clearing
Markets
Cool Wash Inc.
Energy Efficiency
Service Provider
Premise
ex:apt
Actor
Network
Washing Machine
ex:coolWash
Smart Meter
ex:sm
Metering Provider
A
Billing
Service Provider
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
36/41
63. Linked Data for the Smart Grid –
Example II
Mary’s Linked Data
/ / lookup on ex : coolWash ; data r e s i d e s a t washing machine
ex : coolWash
r d f : t y p e sg : A p p l i a n c e ;
sg : m a n u f a c t u r e r < h t t p : / / coolWash . com / company >;
sg : owner ex : mary ;
sg : washingData washer : program40 ;
sg : consumption sm : data20100310 .
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
37/41
64. Linked RDF Data for the Smart Grid III
Mary’s Linked Data II
/ / lookup on sm : data20100310 ; data r e s i d e s a t smart meter
sm : data20100310
r d f : t y p e sg : Consumption ;
r d f : v a l u e ” 1 . 0 4 ” ˆ ˆ sg : kWh ;
i c a l : d t s t a r t ”2010−03−10T00 : 0 0 : 0 0 ” ;
i c a l : dtend
”2010−03−10T01 : 0 0 : 0 0 ” .
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
38/41
65. Policy-aware Data Access II
Matching procedure
The matching procedure is implemented as a rule, checking whether . . .
i) requestor is subsumed by the recipient description and
ii) the requested purpose is subsumed by the allowed purpose (both
w.r.t. the applicable policy)
Assumption: the same purpose and recipient definition is employed →
subclass-of or same-as check is sufficient for realising the subsume
operation.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
39/41
66. Policy Model III
An example policy for Mary’s UltraAmp 760e I
washer : eCarPol r d f : t y p e sg : P o l i c y ;
i c a l : d t s t a r t ”2010−01−01T00 : 0 0 : 0 0 ” ˆ ˆ xs : dateTime ;
i c a l : dtend
”2010−12−31T23 : 5 9 : 5 9 ” ˆ ˆ xs : dateTime ;
sg : a l l o w s #ultraAmpUse .
#ultraAmpUse r d f : t y p e sg : Usage ;
sg : purpose gov : Purpose# s e r v i c e ;
sg : r e c i p i e n t < h t t p : / / ultraAmp . com / company >;
sg : p e r s p e c t i v e # u l t r a A m p P e r s p e c t i v e .
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
40/41
67. Policy Model IV
An example policy for Mary’s Mary’s UltraAmp 760e II
# u l t r a A m p P e r s p e c t i v e r d f : t y p e sg : P e r s p e c t i v e ;
sg : d e f i n i t i o n ” PREFIX . . . CONSTRUCT { ?s ?p ?o }
WHERE { ?s r d f : t y p e sg : A p p l i a n c e .
?s sg : m a n u f a c t u r e r < h t t p : / / ultraAmp . com / company >.
?s ?p ?o .
FILTER ( ? p ! = sg : consumption ) } ” .
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid
Energieinformatik 2013
41/41