Web Techologies and Privacy policies for the Smart Grid

67
INSTITUTE OF APPLIED INFORMATICS AND FORMAL DESCRIPTION METHODS AND ZENTRUM F ¨ UR ANGEWANDTE RECHTSWISSENSCHAFT Web Technologies and Privacy Policies for the Smart Grid Sebastian Speiser , Andreas Wagner , Oliver Raabe and Andreas Harth | Energieinformatik 2013 KIT – University of the State of Baden-Wuerttemberg and National Laboratory of the Helmholtz Association www.kit.edu

description

Talk at EnergieInformatik 2013.

Transcript of Web Techologies and Privacy policies for the Smart Grid

Page 1: Web Techologies and Privacy policies for the Smart Grid

INSTITUTE OF APPLIED INFORMATICS AND FORMAL DESCRIPTION METHODS† AND ZENTRUM FUR ANGEWANDTE RECHTSWISSENSCHAFT‡

Web Technologies and Privacy Policiesfor the Smart Grid

Sebastian Speiser†, Andreas Wagner†, Oliver Raabe‡ and Andreas Harth† | Energieinformatik 2013

KIT – University of the State of Baden-Wuerttemberg and

National Laboratory of the Helmholtz Association

www.kit.edu

Page 2: Web Techologies and Privacy policies for the Smart Grid

Agenda

1 Introduction

2 ICT Architecture and Data Model

3 Use-Case I

4 Policies for a Privacy-aware Smart Grid

5 Use-Case II

6 Evaluation

7 Conclusion

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 2/41

Page 3: Web Techologies and Privacy policies for the Smart Grid

Introduction

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 3/41

Page 4: Web Techologies and Privacy policies for the Smart Grid

(Some) Key ICT Requirements

Requirements, see [2, 3]R1 Lightweight data access.

R2 Open and flexible data model.

R3 Distinction between syntactic andsemantic data content.

R4 Users decide what data in whichgranularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41

Page 5: Web Techologies and Privacy policies for the Smart Grid

(Some) Key ICT Requirements

Requirements, see [2, 3]R1 Lightweight data access.

R2 Open and flexible data model.

R3 Distinction between syntactic andsemantic data content.

R4 Users decide what data in whichgranularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41

Page 6: Web Techologies and Privacy policies for the Smart Grid

(Some) Key ICT Requirements

Requirements, see [2, 3]R1 Lightweight data access.

R2 Open and flexible data model.

R3 Distinction between syntactic andsemantic data content.

R4 Users decide what data in whichgranularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41

Page 7: Web Techologies and Privacy policies for the Smart Grid

(Some) Key ICT Requirements

Requirements, see [2, 3]R1 Lightweight data access.

R2 Open and flexible data model.

R3 Distinction between syntactic andsemantic data content.

R4 Users decide what data in whichgranularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41

Page 8: Web Techologies and Privacy policies for the Smart Grid

(Some) Key ICT Requirements

Requirements, see [2, 3]R1 Lightweight data access.

R2 Open and flexible data model.

R3 Distinction between syntactic andsemantic data content.

R4 Users decide what data in whichgranularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41

Page 9: Web Techologies and Privacy policies for the Smart Grid

Contributions

R1-R3: Semantic Web communication architecture (Section 2).

R4: Policy model (Section 4).

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 5/41

Page 10: Web Techologies and Privacy policies for the Smart Grid

Contributions

R1-R3: Semantic Web communication architecture (Section 2).

R4: Policy model (Section 4).

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 5/41

Page 11: Web Techologies and Privacy policies for the Smart Grid

Communication Architecture

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 6/41

Page 12: Web Techologies and Privacy policies for the Smart Grid

Overview: A Semantic Web-basedCommunication Architecture I

Data access layersURIs for identification of participants.

TCP/IP stack with HTTP as transfer protocol.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 7/41

Page 13: Web Techologies and Privacy policies for the Smart Grid

Overview: A Semantic Web-basedCommunication Architecture I

Data access layersURIs for identification of participants.

TCP/IP stack with HTTP as transfer protocol.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 7/41

Page 14: Web Techologies and Privacy policies for the Smart Grid

Overview of a Semantic Web-basedCommunication Architecture II

Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:

Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41

Page 15: Web Techologies and Privacy policies for the Smart Grid

Overview of a Semantic Web-basedCommunication Architecture II

Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:

Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41

Page 16: Web Techologies and Privacy policies for the Smart Grid

Overview of a Semantic Web-basedCommunication Architecture II

Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:

Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41

Page 17: Web Techologies and Privacy policies for the Smart Grid

Overview of a Semantic Web-basedCommunication Architecture II

Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:

Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41

Page 18: Web Techologies and Privacy policies for the Smart Grid

Overview of a Semantic Web-basedCommunication Architecture II

Data representation layersRDF(S) (if necessary extended with OWL features) formachine-interpretable data encoding.Linked Data principles for data access:

Use (HTTP) URIs for identification of entities.When someone looks up a URI, provide useful (RDF) data.Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41

Page 19: Web Techologies and Privacy policies for the Smart Grid

Use-Case I

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 9/41

Page 20: Web Techologies and Privacy policies for the Smart Grid

Use-Case I (iZEUS) – Smart Grid/TrafficService Platform – Data Management I

Service Platform

Smart Traffic

Navigator

Smart Meter

Analyzer

Service Requests

...

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 10/41

Page 21: Web Techologies and Privacy policies for the Smart Grid

Use-Case I (iZEUS) – Smart Grid/TrafficService Platform – Data Management II

car:uamp760e3

Service Platform

car:uamp760e2car:uamp760e1

Service Requests

Linked DataEndpoint

Smart Traffic

Navigator

Smart Meter

Analyzer

...

RDFData

Data logging

car:uamp760e rdf:type sg:Vehicle ;

foaf:name "UltraAmp 760e" .

geo:location _:loc20130331 .

_:loc20100331 dc:date "2013-03-31T12:23:45";

geo:lat "49.0047222" ;

geo:lon "8.3858333" .

RDFData

RDFData

RDFData

Get additional data

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 11/41

Page 22: Web Techologies and Privacy policies for the Smart Grid

Use-Case I (iZEUS) – Smart Grid/TrafficService Platform – Data Management III

sm:apt

sm:meter

car:uamp760e3

RDF

RDF

RDF

TCP/IP/HTTP

Service Platform

car:uamp760e2

car:uamp760e1

RDFdata logging

Service Requests

Linked DataEndpoint

Smart home at KIT

WWW

Smart Traffic

Navigator

Smart Meter

Analyzer

...

Data logging

Future work

RDFData

RDFData

RDFData

RDFData

RDFData

RDFData

RDFData

Get additional data

Get additional data

Get additional data

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 12/41

Page 23: Web Techologies and Privacy policies for the Smart Grid

Use-Case I (iZEUS) – Smart Grid/TrafficService Platform – Data Management IV

sm:apt

sm:meter

car:uamp760e3

RDF

RDF

RDF

TCP/IP/HTTP

Service Platform

car:uamp760e2

car:uamp760e1

Data logging

Data logging

Service Requests

Linked DataEndpoint

Smart home at KIT

WWW

Gridpedia as data model

Smart Traffic

Navigator

Smart Meter

Analyzer

...

Future work

RDFData

RDFData

RDFData

RDFData

RDFData

RDFData

RDFData

Get additional data

Get additional data

Get additional data

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 13/41

Page 24: Web Techologies and Privacy policies for the Smart Grid

Privacy Policies

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 14/41

Page 25: Web Techologies and Privacy policies for the Smart Grid

Policy Model

IntuitionPolicies model user intent, thus, they help to preserve data privacy.

A Policy is bound to its associated data.

Policies are taken into account whenever data is accessed.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41

Page 26: Web Techologies and Privacy policies for the Smart Grid

Policy Model

IntuitionPolicies model user intent, thus, they help to preserve data privacy.

A Policy is bound to its associated data.

Policies are taken into account whenever data is accessed.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41

Page 27: Web Techologies and Privacy policies for the Smart Grid

Policy Model

IntuitionPolicies model user intent, thus, they help to preserve data privacy.

A Policy is bound to its associated data.

Policies are taken into account whenever data is accessed.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41

Page 28: Web Techologies and Privacy policies for the Smart Grid

Policy Model II

Usage

Purpose

Policy

AgentDescriptionDate Perspective

validFrom validTo perspective

allows

recipientpurpose

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 16/41

Page 29: Web Techologies and Privacy policies for the Smart Grid

Policy-aware Data Access

Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).

ii) Web server returns an authorisation required response.

iii) Requestor sends a request, i.e., a specification of identity andpurpose.

iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41

Page 30: Web Techologies and Privacy policies for the Smart Grid

Policy-aware Data Access

Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).

ii) Web server returns an authorisation required response.

iii) Requestor sends a request, i.e., a specification of identity andpurpose.

iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41

Page 31: Web Techologies and Privacy policies for the Smart Grid

Policy-aware Data Access

Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).

ii) Web server returns an authorisation required response.

iii) Requestor sends a request, i.e., a specification of identity andpurpose.

iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41

Page 32: Web Techologies and Privacy policies for the Smart Grid

Policy-aware Data Access

Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).

ii) Web server returns an authorisation required response.

iii) Requestor sends a request, i.e., a specification of identity andpurpose.

iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41

Page 33: Web Techologies and Privacy policies for the Smart Grid

Policy-aware Data Access

Access procedurei) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).

ii) Web server returns an authorisation required response.

iii) Requestor sends a request, i.e., a specification of identity andpurpose.

iv) Device matches the request with an applicable policy (either alaw-based or a user policy)→ if request and policy match, requesteddata and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41

Page 34: Web Techologies and Privacy policies for the Smart Grid

Use-Case II

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 18/41

Page 35: Web Techologies and Privacy policies for the Smart Grid

Use-Case II (iZEUS) – Smart Grid/TrafficService Platform – Data Privacy I

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 19/41

Page 36: Web Techologies and Privacy policies for the Smart Grid

Use-Case II (iZEUS) – Smart Grid/TrafficService Platform – Data Privacy II

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 20/41

Page 37: Web Techologies and Privacy policies for the Smart Grid

Evaluation

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 21/41

Page 38: Web Techologies and Privacy policies for the Smart Grid

Scope of Evaluation

Our previous works aimed at evaluation of privacy policies viaGerman privacy laws [1, 4].

This works evaluates the practical feasibility of privacy policies stored(matched) on lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 22/41

Page 39: Web Techologies and Privacy policies for the Smart Grid

Scope of Evaluation

Our previous works aimed at evaluation of privacy policies viaGerman privacy laws [1, 4].

This works evaluates the practical feasibility of privacy policies stored(matched) on lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 22/41

Page 40: Web Techologies and Privacy policies for the Smart Grid

Evaluation Setting

We implemented a policy matcher based on Rasqal1.Two hardware platforms:

2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.

We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.

For each size, 10 policies with random allowed usages were matchedagainst every request.2

1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41

Page 41: Web Techologies and Privacy policies for the Smart Grid

Evaluation Setting

We implemented a policy matcher based on Rasqal1.Two hardware platforms:

2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.

We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.

For each size, 10 policies with random allowed usages were matchedagainst every request.2

1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41

Page 42: Web Techologies and Privacy policies for the Smart Grid

Evaluation Setting

We implemented a policy matcher based on Rasqal1.Two hardware platforms:

2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.

We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.

For each size, 10 policies with random allowed usages were matchedagainst every request.2

1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41

Page 43: Web Techologies and Privacy policies for the Smart Grid

Evaluation Setting

We implemented a policy matcher based on Rasqal1.Two hardware platforms:

2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.

We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.

For each size, 10 policies with random allowed usages were matchedagainst every request.2

1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41

Page 44: Web Techologies and Privacy policies for the Smart Grid

Evaluation Setting

We implemented a policy matcher based on Rasqal1.Two hardware platforms:

2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.

We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.

For each size, 10 policies with random allowed usages were matchedagainst every request.2

1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41

Page 45: Web Techologies and Privacy policies for the Smart Grid

Evaluation Setting

We implemented a policy matcher based on Rasqal1.Two hardware platforms:

2.4 GHz Core2Duo laptop with 4 GB RAM.SheevaPlug device with an 1.2 GHz ARM processor and 512 MBRAM.

We created of varying sizes policies, i.e., we varied # allowed usagesbetween 1 and 75.

For each size, 10 policies with random allowed usages were matchedagainst every request.2

1http://librdf.org/rasqal/2Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41

Page 46: Web Techologies and Privacy policies for the Smart Grid

Evaluation Results

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7

0 10 20 30 40 50 60 70 80

mat

chin

g tim

e in

sec

onds

policy size

Allowed Core2DuoDenied Core2Duo

Allowed ARMDenied ARM

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 24/41

Page 47: Web Techologies and Privacy policies for the Smart Grid

Conclusion

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 25/41

Page 48: Web Techologies and Privacy policies for the Smart Grid

Conclusion

By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.

We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41

Page 49: Web Techologies and Privacy policies for the Smart Grid

Conclusion

By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.

We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41

Page 50: Web Techologies and Privacy policies for the Smart Grid

Conclusion

By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.

We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41

Page 51: Web Techologies and Privacy policies for the Smart Grid

Conclusion

By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.

We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41

Page 52: Web Techologies and Privacy policies for the Smart Grid

Conclusion

By means of real-world use-cases we showed that ...... Semantic Web technologies are applicable and highly useful ...... Linked Data allows for efficient data access ...... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.

We evaluated our policy approach in terms of technical feasibilityw.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41

Page 53: Web Techologies and Privacy policies for the Smart Grid

Slides will be available at http://slideshare.net/Paper will be available at http://aifb.kit.edu/

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 27/41

Page 54: Web Techologies and Privacy policies for the Smart Grid

Acknowledgements: iZEUS Project

This work was supported by the German Federal Ministry of Economics andTechnology (E-Energy iZEUS, Grant 01 ME12013). The authors are responsiblefor the content of the presentation.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 28/41

Page 55: Web Techologies and Privacy policies for the Smart Grid

References

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 29/41

Page 56: Web Techologies and Privacy policies for the Smart Grid

References I

Oliver Raabe.Datenschutz im SmartGrid.Datenschutz und Datensicherheit, 2010.

S. Rohjans, C. Danekas, and M. Uslar.Requirements for Smart Grid ICT-architectures.In ISGT, 2012.

Andreas Wagner, Sebastian Speiser, and Andreas Harth.Semantic Web Technologies for a Smart Energy Grid: Requirementsand Challenges.In ISWC, 2010.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 30/41

Page 57: Web Techologies and Privacy policies for the Smart Grid

References II

Andreas Wagner, Sebastian Speiser, Oliver Raabe, and AndreasHarth.Linked Data for a Privacy-aware Smart Grid.In GI Jahrestagung, 2010.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 31/41

Page 58: Web Techologies and Privacy policies for the Smart Grid

Backup Slides

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 32/41

Page 59: Web Techologies and Privacy policies for the Smart Grid

Use-Case I (iZEUS) – CollaborativeSmart Grid Ontology – Gripedia I

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 33/41

Page 60: Web Techologies and Privacy policies for the Smart Grid

Use-Case I (iZEUS) – CollaborativeSmart Grid Ontology – Gripedia II

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 34/41

Page 61: Web Techologies and Privacy policies for the Smart Grid

Use-Case I (iZEUS) – CollaborativeSmart Grid Ontology – Gripedia III

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 35/41

Page 62: Web Techologies and Privacy policies for the Smart Grid

Linked Data for the Smart Grid –Example

Customer

Electric Vehicleex:uamp760e

Smart Meterex:sm

Washing Machineex:coolWash

ex:Mary

Energy EfficiencyService Provider

Metering ProviderA

Cool Wash Inc.

Service ProviderMarkets

ChargingStation

(off-premise)

Metering Provider B(third party provider)

BillingClearing

Premiseex:apt

Legend

CommunicationFlow

Actor

Domain

Network

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 36/41

Page 63: Web Techologies and Privacy policies for the Smart Grid

Linked Data for the Smart Grid –Example II

Mary’s Linked Data

/ / lookup on ex : coolWash ; data res ides a t washing machineex : coolWash

r d f : type sg : Appl iance ;sg : manufacturer <h t t p : / / coolWash . com/ company>;sg : owner ex : mary ;sg : washingData washer : program40 ;sg : consumption sm: data20100310 .

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 37/41

Page 64: Web Techologies and Privacy policies for the Smart Grid

Linked RDF Data for the Smart Grid III

Mary’s Linked Data II

/ / lookup on sm: data20100310 ; data res ides a t smart metersm: data20100310

r d f : type sg : Consumption ;r d f : value ” 1 . 0 4 ” ˆ ˆ sg :kWh;i c a l : d t s t a r t ”2010−03−10T00 : 0 0 : 0 0 ” ;i c a l : dtend ”2010−03−10T01 : 0 0 : 0 0 ” .

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 38/41

Page 65: Web Techologies and Privacy policies for the Smart Grid

Policy-aware Data Access II

Matching procedureThe matching procedure is implemented as a rule, checking whether . . .

i) requestor is subsumed by the recipient description and

ii) the requested purpose is subsumed by the allowed purpose (bothw.r.t. the applicable policy)

Assumption: the same purpose and recipient definition is employed→subclass-of or same-as check is sufficient for realising the subsumeoperation.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 39/41

Page 66: Web Techologies and Privacy policies for the Smart Grid

Policy Model III

An example policy for Mary’s UltraAmp 760e I

washer : eCarPol r d f : type sg : Po l i cy ;i c a l : d t s t a r t ”2010−01−01T00 : 0 0 : 0 0 ” ˆ ˆ xs : dateTime ;i c a l : dtend ”2010−12−31T23 : 5 9 : 5 9 ” ˆ ˆ xs : dateTime ;sg : a l lows #ultraAmpUse .

#ultraAmpUse r d f : type sg : Usage ;sg : purpose gov : Purpose# serv i ce ;sg : r e c i p i e n t <h t t p : / / ultraAmp .com/ company>;sg : perspec t i ve #ul t raAmpPerspect ive .

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 40/41

Page 67: Web Techologies and Privacy policies for the Smart Grid

Policy Model IV

An example policy for Mary’s Mary’s UltraAmp 760e II

#ul t raAmpPerspect ive r d f : type sg : Perspect ive ;sg : d e f i n i t i o n ”PREFIX . . . CONSTRUCT { ?s ?p ?o }

WHERE { ?s r d f : type sg : Appl iance .?s sg : manufacturer <h t t p : / / ultraAmp .com/ company>.?s ?p ?o .FILTER (?p != sg : consumption ) } ” .

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides

Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 41/41