skip to main content
10.1145/3277893.3277894acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

Providing Occupancy as a Service with Databox

Published:04 November 2018Publication History

ABSTRACT

Occupancy modelling for efficient energy management of indoor spaces has gained significant recent attention. Unfortunately, many such models rely on copying sensor data to the cloud for third-party services to process, creating risks of privacy breach. Such matters have become particularly pertinent for companies handling data of EU citizens due to provisions of the General Data Protection Regulation (GDPR). In this paper we present an implementation of "Occupancy-as-a-Service" (OaaS) at the edge, inverting the usual model: rather than ship data to the cloud to be processed, we retain data where it is generated and compute on it locally. This effectively avoids many risks associated with moving personal data to the cloud, and increases the agency of data subjects in managing their personal data. We describe the Databox architecture, its core components, and the OaaS functionality. As well as improving the privacy of the occupants, our approach allows us to offer occupancy data to other applications running on Databox, at a granularity that is not constrained by network usage, storage or processing restrictions imposed by third-party services, but is under data subject control.

References

  1. K. Akkaya, I. Guvenc, R. Aygun, N. Pala, and A. Kadri. 2015. IoT-based occupancy monitoring techniques for energy-efficient smart buildings. (2015), 58--63.Google ScholarGoogle Scholar
  2. Irvan Bastian Arief Ang, Flora Dilys Salim, and Margaret Hamilton. 2016. Human Occupancy Recognition with Multivariate Ambient Sensors. In CoSDEO: Contact-free Ambient Sensing. 6.Google ScholarGoogle Scholar
  3. Arnar Birgisson, Joe Gibbs Politz, òlfar Erlingsson, Ankur Taly, Michael Vrable, and Mark Lentczner. 2014. Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud. In Network and Distributed System Security Symposium.Google ScholarGoogle Scholar
  4. C. Bormann, A. P. Castellani, and Z. Shelby. 2012. CoAP: An Application Protocol for Billions of Tiny Internet Nodes. IEEE Internet Computing 16, 2 (March 2012), 62--67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Andy Crabtree, Tom Lodge, James Colley, Chris Greenhalgh, Kevin Glover, Hamed Haddadi, Yousef Amar, Richard Mortier, Qi Li, John Moore, Liang Wang, Poonam Yadav, Jianxin Zhao, Anthony Brown, Lachlan Urquhart, and Derek McAuley. 2018. Building accountability into the Internet of Things: the IoT Databox model. Journal of Reliable Intelligent Environments 4, 1 (01 Apr 2018), 39--55.Google ScholarGoogle ScholarCross RefCross Ref
  6. A. Ebadat, G. Bottegal, D. Varagnolo, B. Wahlberg, and K. H. Johansson. 2015. Regularized Deconvolution-Based Approaches for Estimating Room Occupancies. IEEE Transactions on Automation Science and Engineering 12, 4 (Oct 2015), 1157--1168.Google ScholarGoogle ScholarCross RefCross Ref
  7. T. Ekwevugbe, N. Brown, V. Pakka, and D. Fan. 2013. Real-time building occupancy sensing using neural-network based sensor network. In 2013 7th IEEE International Conference on Digital Ecosystems and Technologies (DEST). 114--119.Google ScholarGoogle Scholar
  8. T. Gazagnaire, A. Chaudhry, A. Madhavapeddy, R. Mortier, D. Scott adn D. Sheets, G. Tsipenyuk, and J. Crowcroft. 2014. Irmin: a branch-consistent distributed library database. In OCaml User and Developer Workshop.Google ScholarGoogle Scholar
  9. Sarthak Grover and Roya Ensafi. 2016. https://freedom-to-tinker.com/2016/01/19/who-will-secure-the-internet-of-things/s. (2016).Google ScholarGoogle Scholar
  10. Ruoxi Jia, Roy Dong, Sastry S. Shankar, and Costas J. Spanos. 2017. Privacy-Enhanced Architecture for Occupancy-based HVAC Control. In In Proceedings of e 8th ACM/IEEE International Conference on Cyber-Physical Systems, Pittsburgh, PA USA. 10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Khee Poh Lam, Michael Höynck, Bing Dong, Burton Andrews, Yun shang Chiou, Diego Benitez, and Joonho Choi. 2009. Occupancy detection through an extensive environmental sensor network in an open-plan office building. In Proc. of Building Simulation 09, an IBPSA Conference.Google ScholarGoogle Scholar
  12. Yi Liang, Zhipeng Cai, Qilong Han, and Yingshu Li. 2017. Location Privacy Leakage through Sensory Data. Security and Communication Networks (2017), 12.Google ScholarGoogle Scholar
  13. Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 10S3--1067. https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/michalevsky Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Philipp Morgner, Christian Müller, Matthias Ring, Björn Eskofier, Christian Riess, Frederik Armknecht, and Zinaida Benenson. 2017. Privacy Implications of Room Climate Data. In ESORICS 2017. 324--343.Google ScholarGoogle Scholar
  15. Richard Mortier, Jianxin Zhao, Jon Crowcroft, Liang Wang, Qi Li, Hamed Haddadi, Yousef Amar, Andy Crabtree, James Colley, Tom Lodge, Tosh Brown, Derek McAuley, and Chris Greenhalgh. 2016. Personal Data Management with the Databox: What's Inside the Box?. In Proceedings of the ACM Workshop on Cloud-Assisted Networking (CAN'16). ACM, New York, NY, USA, 49--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Databox Project. 2016. EPSRC Project on Privacy-Aware Personal Data Platform. http://www.databoxproject.uk/. (2016).Google ScholarGoogle Scholar
  17. Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. FaceNet: A unified embedding for face recognition and clustering. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015. 815--823.Google ScholarGoogle ScholarCross RefCross Ref
  18. Rayman Preet Singh, Benjamin Cassel, S. Keshav, and Tim Brecht. 2016. TussleOS: Managing Privacy Versus Functionality Trade-Offs on IoT Devices. In Computer Communication Review, 2017.Google ScholarGoogle Scholar
  19. Kevin Ting, Richard Yu, and Mani Srivastava. 2013. Inferring Occupancy from Opportunistically Available Sensor Data. In BuildSys'13. 1--2.Google ScholarGoogle Scholar
  20. Poonam Yadav. 2015. Face Prediction Model for an Automatic Age-invariant Face Recognition System. CoRR abs/1506.06046 (2015). arXiv:1S06.06046 http://arxiv.org/abs/1506.06046Google ScholarGoogle Scholar
  21. Yang Zhao, Jeff Ashe, David Toledano, Brandon Good, Li Zhang, and Adam McCann. 2016. Occupancy and Activity Monitoring with Doppler Sensing and Edge Analytics: Demo Abstract. In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM(SenSys'16). ACM, New York, NY, USA, 322--323. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Providing Occupancy as a Service with Databox

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CitiFog'18: Proceedings of the 1st ACM International Workshop on Smart Cities and Fog Computing
          November 2018
          47 pages
          ISBN:9781450360517
          DOI:10.1145/3277893

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 4 November 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader