ABSTRACT
Occupancy modelling for efficient energy management of indoor spaces has gained significant recent attention. Unfortunately, many such models rely on copying sensor data to the cloud for third-party services to process, creating risks of privacy breach. Such matters have become particularly pertinent for companies handling data of EU citizens due to provisions of the General Data Protection Regulation (GDPR). In this paper we present an implementation of "Occupancy-as-a-Service" (OaaS) at the edge, inverting the usual model: rather than ship data to the cloud to be processed, we retain data where it is generated and compute on it locally. This effectively avoids many risks associated with moving personal data to the cloud, and increases the agency of data subjects in managing their personal data. We describe the Databox architecture, its core components, and the OaaS functionality. As well as improving the privacy of the occupants, our approach allows us to offer occupancy data to other applications running on Databox, at a granularity that is not constrained by network usage, storage or processing restrictions imposed by third-party services, but is under data subject control.
- K. Akkaya, I. Guvenc, R. Aygun, N. Pala, and A. Kadri. 2015. IoT-based occupancy monitoring techniques for energy-efficient smart buildings. (2015), 58--63.Google Scholar
- Irvan Bastian Arief Ang, Flora Dilys Salim, and Margaret Hamilton. 2016. Human Occupancy Recognition with Multivariate Ambient Sensors. In CoSDEO: Contact-free Ambient Sensing. 6.Google Scholar
- Arnar Birgisson, Joe Gibbs Politz, òlfar Erlingsson, Ankur Taly, Michael Vrable, and Mark Lentczner. 2014. Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud. In Network and Distributed System Security Symposium.Google Scholar
- C. Bormann, A. P. Castellani, and Z. Shelby. 2012. CoAP: An Application Protocol for Billions of Tiny Internet Nodes. IEEE Internet Computing 16, 2 (March 2012), 62--67. Google ScholarDigital Library
- Andy Crabtree, Tom Lodge, James Colley, Chris Greenhalgh, Kevin Glover, Hamed Haddadi, Yousef Amar, Richard Mortier, Qi Li, John Moore, Liang Wang, Poonam Yadav, Jianxin Zhao, Anthony Brown, Lachlan Urquhart, and Derek McAuley. 2018. Building accountability into the Internet of Things: the IoT Databox model. Journal of Reliable Intelligent Environments 4, 1 (01 Apr 2018), 39--55.Google ScholarCross Ref
- A. Ebadat, G. Bottegal, D. Varagnolo, B. Wahlberg, and K. H. Johansson. 2015. Regularized Deconvolution-Based Approaches for Estimating Room Occupancies. IEEE Transactions on Automation Science and Engineering 12, 4 (Oct 2015), 1157--1168.Google ScholarCross Ref
- T. Ekwevugbe, N. Brown, V. Pakka, and D. Fan. 2013. Real-time building occupancy sensing using neural-network based sensor network. In 2013 7th IEEE International Conference on Digital Ecosystems and Technologies (DEST). 114--119.Google Scholar
- T. Gazagnaire, A. Chaudhry, A. Madhavapeddy, R. Mortier, D. Scott adn D. Sheets, G. Tsipenyuk, and J. Crowcroft. 2014. Irmin: a branch-consistent distributed library database. In OCaml User and Developer Workshop.Google Scholar
- Sarthak Grover and Roya Ensafi. 2016. https://freedom-to-tinker.com/2016/01/19/who-will-secure-the-internet-of-things/s. (2016).Google Scholar
- Ruoxi Jia, Roy Dong, Sastry S. Shankar, and Costas J. Spanos. 2017. Privacy-Enhanced Architecture for Occupancy-based HVAC Control. In In Proceedings of e 8th ACM/IEEE International Conference on Cyber-Physical Systems, Pittsburgh, PA USA. 10. Google ScholarDigital Library
- Khee Poh Lam, Michael Höynck, Bing Dong, Burton Andrews, Yun shang Chiou, Diego Benitez, and Joonho Choi. 2009. Occupancy detection through an extensive environmental sensor network in an open-plan office building. In Proc. of Building Simulation 09, an IBPSA Conference.Google Scholar
- Yi Liang, Zhipeng Cai, Qilong Han, and Yingshu Li. 2017. Location Privacy Leakage through Sensory Data. Security and Communication Networks (2017), 12.Google Scholar
- Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 10S3--1067. https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/michalevsky Google ScholarDigital Library
- Philipp Morgner, Christian Müller, Matthias Ring, Björn Eskofier, Christian Riess, Frederik Armknecht, and Zinaida Benenson. 2017. Privacy Implications of Room Climate Data. In ESORICS 2017. 324--343.Google Scholar
- Richard Mortier, Jianxin Zhao, Jon Crowcroft, Liang Wang, Qi Li, Hamed Haddadi, Yousef Amar, Andy Crabtree, James Colley, Tom Lodge, Tosh Brown, Derek McAuley, and Chris Greenhalgh. 2016. Personal Data Management with the Databox: What's Inside the Box?. In Proceedings of the ACM Workshop on Cloud-Assisted Networking (CAN'16). ACM, New York, NY, USA, 49--54. Google ScholarDigital Library
- Databox Project. 2016. EPSRC Project on Privacy-Aware Personal Data Platform. http://www.databoxproject.uk/. (2016).Google Scholar
- Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. FaceNet: A unified embedding for face recognition and clustering. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015. 815--823.Google ScholarCross Ref
- Rayman Preet Singh, Benjamin Cassel, S. Keshav, and Tim Brecht. 2016. TussleOS: Managing Privacy Versus Functionality Trade-Offs on IoT Devices. In Computer Communication Review, 2017.Google Scholar
- Kevin Ting, Richard Yu, and Mani Srivastava. 2013. Inferring Occupancy from Opportunistically Available Sensor Data. In BuildSys'13. 1--2.Google Scholar
- Poonam Yadav. 2015. Face Prediction Model for an Automatic Age-invariant Face Recognition System. CoRR abs/1506.06046 (2015). arXiv:1S06.06046 http://arxiv.org/abs/1506.06046Google Scholar
- Yang Zhao, Jeff Ashe, David Toledano, Brandon Good, Li Zhang, and Adam McCann. 2016. Occupancy and Activity Monitoring with Doppler Sensing and Edge Analytics: Demo Abstract. In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM(SenSys'16). ACM, New York, NY, USA, 322--323. Google ScholarDigital Library
Index Terms
- Providing Occupancy as a Service with Databox
Recommendations
Personal Data Management with the Databox: What's Inside the Box?
CAN '16: Proceedings of the 2016 ACM Workshop on Cloud-Assisted NetworkingWe are all increasingly the subjects of data collection and processing systems that use data generated both about and by us to provide and optimise a wide range of services. Means for others to collect and process data that concerns each of us -- often ...
Using personal portfolios to manage customer data
DPM'11: Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus SecurityTransactions today are conducted in a way that leaves no real option to the customers to protect their privacy. Sensitive private information is left uncontrolled at the companies' disposal and is often (un)intentionally leaked to unauthorized parties. ...
Blockchain-based access control system for efficient and GDPR-compliant personal data management
AbstractNew digital technologies generate large amounts of information. This data is processed by Service Providers in order to improve and develop new services and products, but also to fund themselves. However, processing personal data may result in ...
Comments