SlideShare a Scribd company logo
1 of 43
© Waher Data AB, 2018.
IoT-Day 2018
Privacy for IoT with XMPP
© Waher Data AB, 2018.
1. Privacy
© Waher Data AB, 2018.
What is privacy?
A fundamental human right:
 The right to have confidential conversations.
 The ability to select with whom we communicate.
 Protection against unwarranted monitoring or
searches.
 Protection against attacks on honor and reputation.
© Waher Data AB, 2018.
Universal Declaration of Human Rights
Article 12:
No one shall be subjected to arbitrary
interference with his privacy, family,
home or correspondence, nor to attacks
upon his honour and reputation. Everyone
has the right to the protection of the
law against such interference or
attacks.
https://www.un.org/en/universal-declaration-human-rights/
© Waher Data AB, 2018.
Does privacy extend to the IoT?
Who can communicate with devices around you,
and about what?
Do you want uninvited to know:
 When you’re home?
 If you’re in the shower?
 What places you visit?
 Your health status?
Or be able to:
 Control your vehicle?
 Turn off your pacemaker?
© Waher Data AB, 2018.
E.U. privacy legislation (GDPR)
EU Regulation:
 Comes into full effect May 2018
 Automatic law in all member states
 Applicable to
 Anyone, if system in E.U.
 Any European citizen, in any system in the
world
 Heavy sanctions
 Suddenly, corporations become interested
in privacy.
© Waher Data AB, 2018.
Proportionality
GDPR balances:
 Rights to privacy for individuals
 Interests of corporations
 Legal requirements
Maximum requirement:
 Proportional to the rights of all participants
Minimum requirement:
 State of the art
 People “skilled in the art” (professionals)
 Lack of knowledge not valid reason
© Waher Data AB, 2018.
Personal Data
Any information that relates directly or
indirectly to an identified or identifiable
natural person.
Notice:
 Indirect means, you have to think before you
say there is no relation.
 Identifiable means, the individual might not
have been identified by your system. But if
anyone, perhaps smarter than you, can identify
the person from your data, perhaps with the use
of other external data, it’s personal data.
Easier to just assume data is personal, if
there’s doubt.
© Waher Data AB, 2018.
Personality is contagious
Data relating to personal data,
automatically becomes personal data.
(Personality acts like a virus, or disease, at
least for the data hoarder, or Big Brother.)
© Waher Data AB, 2018.
Removing personality
Removing personality is difficult.
Methods:
 Data aggregation
 Data masking or obfuscation
 Anonymization
 Anonymization ≠ Pseudonymization
© Waher Data AB, 2018.
Processing
Any operation (or set of operations) which
is performed on personal data (or on sets
of personal data)
Notice:
 The word “automatic” is not present in definition
 Manual processing is included (if sorted).
© Waher Data AB, 2018.
Minimalistic definition
A minimalistic definition of GDPR is:
Minimalism
You’re allowed to:
 Do as little as possible
 For as short a time as possible
 Share it with as few as possible
 For as few purposes as possible
 As correctly as possible
 Always transparently informing subjects about it
 With proportional data protection mechanisms
© Waher Data AB, 2018.
Transparency
Information you provide must be:
 Short
 Concise
 Clear
 Easy to understand
 Explicit
Transparency is measured on how your information
is received and understood.
© Waher Data AB, 2018.
Openness
Openness ≠ Transparency
Providing too much information hides
relevant information.
Transparency means you provide the
subjects with the information that is
relevant to them, not to you.
© Waher Data AB, 2018.
Woods and aquariums
“Can’t see the wood for all the trees”
If you can’t find the fish in the aquarium:
 The water might be muddy
 Or the aquarium too big
Transparency is about the correct amount
of easily understood, relevant information.
© Waher Data AB, 2018.
No retroactive processing
If you invent a new process, you must:
 Inform subjects before you process
 Not process historical data
You are only allowed to process the data
collected for that purpose, from the time
you inform the data subjects.
© Waher Data AB, 2018.
Paradigm shift
No longer true:
“The more data you collect (or process),
the more potential future value you have.”
New true:
“The more data you collect (or process),
the more risk you have.”
New paradigm:
You should only collect and process data,
to which you can assign value.
© Waher Data AB, 2018.
Individual rights
GDPR gives subjects following rights:
 Get information
 Access to data
 Export data (provided by subject)
 Correct (erroneous) data
 Erase data (under certain conditions)
 Object to processing
 Restrict processing of data
 Consent & withdrawal of consent (if applicable)
 Avoid being subject of automatic profiling that can
lead to automatic decisions having negative
consequences in a legal sense.
© Waher Data AB, 2018.
Sharing of personal data
When sharing data with others:
 Subjects must be informed
 Responsibilities must be delegated
 Requests from subjects must be
forwarded
 Includes links, copies and reproductions
© Waher Data AB, 2018.
2. Ownership
© Waher Data AB, 2018.
Who owns the data?
Who is the owner of data?
 The person/entity generating (inventing) the data?
 The person/entity storing (controlling) the data?
 The person about whom the data relates to?
Is it important?
© Waher Data AB, 2018.
Legislation
Which law is applicable?
 Copyright?
 Trade secrets?
 Intellectual Property?
 Privacy?
Enforcing ownership through legal means
is difficult.
© Waher Data AB, 2018.
Ownership of things
How is normal ownership enforced?
 Protection behind lock & key.
 Access only to trusted parties.
 Monitoring.
 Demonstration of ownership.
© Waher Data AB, 2018.
Ownership of data
Why treat data differently?
Local storage (decentralization) allows:
 Protection behind lock & key.
 Limiting access to trusted parties.
 Monitoring access.
 Demonstrating ownership.
 Enforcing ownership of data.
Added benefits:
 Intrinsic value of data through access.
 Easier to maintain integrity.
© Waher Data AB, 2018.
3. Security
© Waher Data AB, 2018.
Security
GDPR references as benchmark:
 “State of the art”.
 “Data protection by design and by
default”.
© Waher Data AB, 2018.
Data Protection by design
 Cannot be superficial:
 Not sufficient with log-in
 Or apparent security
 Must permeate architecture:
 APIs
 Databases
 Communication (Protocols)
 Code
 Hosting
 Runtime
© Waher Data AB, 2018.
Examples
Examples of Data Protection by design:
 Decentralization
 Ubiquitous encryption
 Authentication
 Authorization
 Hashing
 Signatures
 Anonymization
 Pseudonymization
 Obfuscation
 Data masking
 Data aggregation
 Security logging
 Monitoring
 …
© Waher Data AB, 2018.
Data Protection by default
You don’t add protection
 It’s all on by default
You remove protection
 Permissions are granted
Compare difference between:
 White-list (by default)
 Black-list (not by default)
© Waher Data AB, 2018.
Decentralization & security
Decentralization has security implications:
 More attack surfaces.
 But value of each node is small.
 Value/Effort ratio small.
 Easier to protect.
 Massive data breaches difficult.
 You don’t put all your eggs into the same basket.
 More resilient.
 End-to-end encryption.
Bonuses:
 Permits enforcing ownership of data
 Owner can authorize access, restrict processing or delete data
© Waher Data AB, 2018.
Anonymization vs. Strong Identities
Anonymization:
 Protects whistle blower or dissident
(or criminal or terrorist)
 Makes security decisions difficult.
Strong identities (pseudonyms):
 Protect information owners.
 Allows selective responses.
Both protect privacy, in different ways.
© Waher Data AB, 2018.
4. XMPP
© Waher Data AB, 2018.
XMPP
 eXtensible Messaging and Presence
Protocol
 Standardized (IETF)
 RFC 6120-6122
 Originally developed in the late 1990-ies.
 “Jabber”
 Based on XML
 Open
 Free
 Free interfaces, libraries & software
© Waher Data AB, 2018.
Basic features
Some basic features of XMPP include:
 Global scalability (federation)
 Global federated identities
 Extensibility (namespaces)
 Robustness (close to 20 years of operation)
 Open (public & free)
 Standardized
 Secure
 Interoperable
© Waher Data AB, 2018.
Extensibility
 XML Namespaces
 Avoid collisions
 Owner of domain can extend it freely
 Extensions standardized by XSF
 XMPP Standards Foundation
 XMPP Extension Protocol (XEP)
 Types
 Client-side extensions
 Component-extensions
 Server-side extensions
© Waher Data AB, 2018.
Communication Patterns
Async.
Msg.
Req/Resp Pub/Sub Federation Broker P2P7
MQTT ✓ ✓
HTTP ✓ ✓
CoAP ✓ ✓ ✓
XMPP ✓ ✓ ✓✓ ✓ ✓* ✓
* Note: XMPP supports server-less communication as well.
© Waher Data AB, 2018.
Stanzas
Three types of stanzas:
 message
 Asynchronous messages
 iq
 Information Query
 Request/Response
 Requires resource part
 presence
 Publish/subscribe
 Transmitted to contacts with approved subscription
 Forwards resource part
Note: A 2nd publish/subscribe mechanism exists, defined in XEP-0060. It’s
node-based.
© Waher Data AB, 2018.
Federated Brokers
 Authenticate clients
 SASL
 Cooperate (federation)
 Forward identities
 Authorization
 Roster
 Presence
 Subscription
 Solve
 Topology problem.
 Latency problem.
 Scalability problem.
© Waher Data AB, 2018.
Security
 Encryption
 TLS
 End-to-end encryption optional
 Authentication
 SASL
 Distributed authentication model
 Identities always forwarded in stanzas
 Authorization
 Presence subscription
 Trust-based
 Provisioning (IoT)
 Decision support for things
 Control details
 Blocking
 Spam reporting
© Waher Data AB, 2018.
Data Protection by Design
XMPP supports data protection by design:
 Decentralization
 Ubiquitous encryption
 Even end-to-end encryption
 Global identities
 Authenticated
 Forwarded
© Waher Data AB, 2018.
Data Protection by Default
XMPP supports data protection by default:
 Presence negotiation
 Consent-based
 Required to be able to communicate
using iq and presence.
 Consent can be withdrawn.
© Waher Data AB, 2018.
IEEE IoT Harmonization
Interoperability interfaces for IoT
 Sensor Data (former XEP-0323)
 Provisioning (former XEP-0324)
 Control (former XEP-0325)
 Concentrator/Bridge (former XEP-0326)
 Thing Registries & Discovery (XEP-0347)
 Secure Account Creation (XEP-0348)
https://gitlab.com/IEEE-SA/XMPPI/IoT
https://prezi.com/esosntqhewhs/iot-xmpp/
https://www.slideshare.net/peterwaher/iot-harmonization-using-xmpp
© Waher Data AB, 2018.
 Raspberry Pi & Arduino
 Sensors, Actuators, Controllers,
Concentrators, Bridges
 Protocols:
MQTT, HTTP, CoAP, LWM2M,
XMPP
 Interoperability
 Social Interaction
 Decision Support
 Product Lifecycle
 IoT Service Platforms
 IoT Harmonization
 Security
 Privacy
Amazon
Packt
Bokus
Bokus (e-book version)
Contact: https://waher.se/
Mastering Internet of Things

More Related Content

What's hot

Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Peter Waher
 
Cross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationCross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationPeter Waher
 
Dsdt meetup july2018
Dsdt meetup july2018Dsdt meetup july2018
Dsdt meetup july2018JDA Labs MTL
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchainUlf Mattsson
 
Get Rich with Blockchain & Cryptocurrency
Get Rich with Blockchain & CryptocurrencyGet Rich with Blockchain & Cryptocurrency
Get Rich with Blockchain & Cryptocurrencykeerthi678722
 
Global Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupGlobal Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupMaeva Ghonda
 
Blockchain security a different perspective
Blockchain security a different perspectiveBlockchain security a different perspective
Blockchain security a different perspectiveSecunoid Systems Inc
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsDr. Nikolaus Lipusch
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesPistoia Alliance
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonUlf Mattsson
 
What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015
What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015
What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015Robert Schwentker
 
Software Architecture and Model-driven Engineering for Blockchain Applications
Software Architecture and Model-driven Engineering for Blockchain ApplicationsSoftware Architecture and Model-driven Engineering for Blockchain Applications
Software Architecture and Model-driven Engineering for Blockchain ApplicationsIngo Weber
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceEryk Budi Pratama
 
Blockchain FinTech PoC
Blockchain FinTech PoCBlockchain FinTech PoC
Blockchain FinTech PoCSanjeev Raman
 
Azure blockchain service
Azure blockchain serviceAzure blockchain service
Azure blockchain serviceRavi Okade
 
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Digipolis Antwerpen
 
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...eraser Juan José Calderón
 
Security Model of Blockchain
Security Model of BlockchainSecurity Model of Blockchain
Security Model of Blockchainsaficus
 
Blockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsBlockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsSanjeev Verma, PhD
 
Wp blockchain ilnas_e-version
Wp blockchain ilnas_e-versionWp blockchain ilnas_e-version
Wp blockchain ilnas_e-versionJonas Mercier
 

What's hot (20)

Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...
 
Cross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationCross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperation
 
Dsdt meetup july2018
Dsdt meetup july2018Dsdt meetup july2018
Dsdt meetup july2018
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
 
Get Rich with Blockchain & Cryptocurrency
Get Rich with Blockchain & CryptocurrencyGet Rich with Blockchain & Cryptocurrency
Get Rich with Blockchain & Cryptocurrency
 
Global Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupGlobal Cybersecurity Blockchain Group
Global Cybersecurity Blockchain Group
 
Blockchain security a different perspective
Blockchain security a different perspectiveBlockchain security a different perspective
Blockchain security a different perspective
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain Ecosystems
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab Slides
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
 
What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015
What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015
What is Blockchain Tech for Tokyo Blockchain Summit Dec 2015
 
Software Architecture and Model-driven Engineering for Blockchain Applications
Software Architecture and Model-driven Engineering for Blockchain ApplicationsSoftware Architecture and Model-driven Engineering for Blockchain Applications
Software Architecture and Model-driven Engineering for Blockchain Applications
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Blockchain FinTech PoC
Blockchain FinTech PoCBlockchain FinTech PoC
Blockchain FinTech PoC
 
Azure blockchain service
Azure blockchain serviceAzure blockchain service
Azure blockchain service
 
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
 
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
 
Security Model of Blockchain
Security Model of BlockchainSecurity Model of Blockchain
Security Model of Blockchain
 
Blockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsBlockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and Applications
 
Wp blockchain ilnas_e-version
Wp blockchain ilnas_e-versionWp blockchain ilnas_e-version
Wp blockchain ilnas_e-version
 

Similar to Privacy for IoT with XMPP

Smart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CitySmart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CityPeter Waher
 
Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CityPeter Waher
 
Smart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CitySmart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CityPeter Waher
 
Smart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of ThingsSmart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of ThingsPeter Waher
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
Le soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRLe soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRJürgen Ambrosi
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18Cloudera, Inc.
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceCloudera, Inc.
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSInteraktiv
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?Forcepoint LLC
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
How businesses can benefit from privacy preserving synthetic data
How businesses can benefit from privacy preserving synthetic dataHow businesses can benefit from privacy preserving synthetic data
How businesses can benefit from privacy preserving synthetic dataBenjamin Nolan
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataNeo4j
 

Similar to Privacy for IoT with XMPP (20)

Smart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CitySmart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart City
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart City
 
Smart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CitySmart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart City
 
Smart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of ThingsSmart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lecture 4 - Harmonizing the Internet of Things
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Le soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRLe soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPR
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
How businesses can benefit from privacy preserving synthetic data
How businesses can benefit from privacy preserving synthetic dataHow businesses can benefit from privacy preserving synthetic data
How businesses can benefit from privacy preserving synthetic data
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 

More from Peter Waher

Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...Peter Waher
 
Interoperabilidad e Internet
Interoperabilidad e InternetInteroperabilidad e Internet
Interoperabilidad e InternetPeter Waher
 
Smart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesSmart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesPeter Waher
 
Smart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart CitySmart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart CityPeter Waher
 
Smart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling ActuatorsSmart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling ActuatorsPeter Waher
 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionPeter Waher
 
Smart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering DevicesSmart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering DevicesPeter Waher
 
Smart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your SensorSmart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your SensorPeter Waher
 
Smart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your DeviceSmart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your DevicePeter Waher
 
Smart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and ActuatorsSmart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and ActuatorsPeter Waher
 
XMPP and IoT - an overview
XMPP and IoT - an overviewXMPP and IoT - an overview
XMPP and IoT - an overviewPeter Waher
 
XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)Peter Waher
 
Web 3.0 & IoT (English)
Web 3.0 & IoT (English)Web 3.0 & IoT (English)
Web 3.0 & IoT (English)Peter Waher
 
XSF - XMPP Standards Foundation
XSF - XMPP Standards FoundationXSF - XMPP Standards Foundation
XSF - XMPP Standards FoundationPeter Waher
 

More from Peter Waher (15)

Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
 
Interoperabilidad e Internet
Interoperabilidad e InternetInteroperabilidad e Internet
Interoperabilidad e Internet
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Smart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesSmart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your Devices
 
Smart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart CitySmart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart City
 
Smart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling ActuatorsSmart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling Actuators
 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to Encryption
 
Smart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering DevicesSmart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering Devices
 
Smart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your SensorSmart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your Sensor
 
Smart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your DeviceSmart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your Device
 
Smart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and ActuatorsSmart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and Actuators
 
XMPP and IoT - an overview
XMPP and IoT - an overviewXMPP and IoT - an overview
XMPP and IoT - an overview
 
XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)
 
Web 3.0 & IoT (English)
Web 3.0 & IoT (English)Web 3.0 & IoT (English)
Web 3.0 & IoT (English)
 
XSF - XMPP Standards Foundation
XSF - XMPP Standards FoundationXSF - XMPP Standards Foundation
XSF - XMPP Standards Foundation
 

Recently uploaded

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 

Recently uploaded (20)

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 

Privacy for IoT with XMPP

  • 1. © Waher Data AB, 2018. IoT-Day 2018 Privacy for IoT with XMPP
  • 2. © Waher Data AB, 2018. 1. Privacy
  • 3. © Waher Data AB, 2018. What is privacy? A fundamental human right:  The right to have confidential conversations.  The ability to select with whom we communicate.  Protection against unwarranted monitoring or searches.  Protection against attacks on honor and reputation.
  • 4. © Waher Data AB, 2018. Universal Declaration of Human Rights Article 12: No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks. https://www.un.org/en/universal-declaration-human-rights/
  • 5. © Waher Data AB, 2018. Does privacy extend to the IoT? Who can communicate with devices around you, and about what? Do you want uninvited to know:  When you’re home?  If you’re in the shower?  What places you visit?  Your health status? Or be able to:  Control your vehicle?  Turn off your pacemaker?
  • 6. © Waher Data AB, 2018. E.U. privacy legislation (GDPR) EU Regulation:  Comes into full effect May 2018  Automatic law in all member states  Applicable to  Anyone, if system in E.U.  Any European citizen, in any system in the world  Heavy sanctions  Suddenly, corporations become interested in privacy.
  • 7. © Waher Data AB, 2018. Proportionality GDPR balances:  Rights to privacy for individuals  Interests of corporations  Legal requirements Maximum requirement:  Proportional to the rights of all participants Minimum requirement:  State of the art  People “skilled in the art” (professionals)  Lack of knowledge not valid reason
  • 8. © Waher Data AB, 2018. Personal Data Any information that relates directly or indirectly to an identified or identifiable natural person. Notice:  Indirect means, you have to think before you say there is no relation.  Identifiable means, the individual might not have been identified by your system. But if anyone, perhaps smarter than you, can identify the person from your data, perhaps with the use of other external data, it’s personal data. Easier to just assume data is personal, if there’s doubt.
  • 9. © Waher Data AB, 2018. Personality is contagious Data relating to personal data, automatically becomes personal data. (Personality acts like a virus, or disease, at least for the data hoarder, or Big Brother.)
  • 10. © Waher Data AB, 2018. Removing personality Removing personality is difficult. Methods:  Data aggregation  Data masking or obfuscation  Anonymization  Anonymization ≠ Pseudonymization
  • 11. © Waher Data AB, 2018. Processing Any operation (or set of operations) which is performed on personal data (or on sets of personal data) Notice:  The word “automatic” is not present in definition  Manual processing is included (if sorted).
  • 12. © Waher Data AB, 2018. Minimalistic definition A minimalistic definition of GDPR is: Minimalism You’re allowed to:  Do as little as possible  For as short a time as possible  Share it with as few as possible  For as few purposes as possible  As correctly as possible  Always transparently informing subjects about it  With proportional data protection mechanisms
  • 13. © Waher Data AB, 2018. Transparency Information you provide must be:  Short  Concise  Clear  Easy to understand  Explicit Transparency is measured on how your information is received and understood.
  • 14. © Waher Data AB, 2018. Openness Openness ≠ Transparency Providing too much information hides relevant information. Transparency means you provide the subjects with the information that is relevant to them, not to you.
  • 15. © Waher Data AB, 2018. Woods and aquariums “Can’t see the wood for all the trees” If you can’t find the fish in the aquarium:  The water might be muddy  Or the aquarium too big Transparency is about the correct amount of easily understood, relevant information.
  • 16. © Waher Data AB, 2018. No retroactive processing If you invent a new process, you must:  Inform subjects before you process  Not process historical data You are only allowed to process the data collected for that purpose, from the time you inform the data subjects.
  • 17. © Waher Data AB, 2018. Paradigm shift No longer true: “The more data you collect (or process), the more potential future value you have.” New true: “The more data you collect (or process), the more risk you have.” New paradigm: You should only collect and process data, to which you can assign value.
  • 18. © Waher Data AB, 2018. Individual rights GDPR gives subjects following rights:  Get information  Access to data  Export data (provided by subject)  Correct (erroneous) data  Erase data (under certain conditions)  Object to processing  Restrict processing of data  Consent & withdrawal of consent (if applicable)  Avoid being subject of automatic profiling that can lead to automatic decisions having negative consequences in a legal sense.
  • 19. © Waher Data AB, 2018. Sharing of personal data When sharing data with others:  Subjects must be informed  Responsibilities must be delegated  Requests from subjects must be forwarded  Includes links, copies and reproductions
  • 20. © Waher Data AB, 2018. 2. Ownership
  • 21. © Waher Data AB, 2018. Who owns the data? Who is the owner of data?  The person/entity generating (inventing) the data?  The person/entity storing (controlling) the data?  The person about whom the data relates to? Is it important?
  • 22. © Waher Data AB, 2018. Legislation Which law is applicable?  Copyright?  Trade secrets?  Intellectual Property?  Privacy? Enforcing ownership through legal means is difficult.
  • 23. © Waher Data AB, 2018. Ownership of things How is normal ownership enforced?  Protection behind lock & key.  Access only to trusted parties.  Monitoring.  Demonstration of ownership.
  • 24. © Waher Data AB, 2018. Ownership of data Why treat data differently? Local storage (decentralization) allows:  Protection behind lock & key.  Limiting access to trusted parties.  Monitoring access.  Demonstrating ownership.  Enforcing ownership of data. Added benefits:  Intrinsic value of data through access.  Easier to maintain integrity.
  • 25. © Waher Data AB, 2018. 3. Security
  • 26. © Waher Data AB, 2018. Security GDPR references as benchmark:  “State of the art”.  “Data protection by design and by default”.
  • 27. © Waher Data AB, 2018. Data Protection by design  Cannot be superficial:  Not sufficient with log-in  Or apparent security  Must permeate architecture:  APIs  Databases  Communication (Protocols)  Code  Hosting  Runtime
  • 28. © Waher Data AB, 2018. Examples Examples of Data Protection by design:  Decentralization  Ubiquitous encryption  Authentication  Authorization  Hashing  Signatures  Anonymization  Pseudonymization  Obfuscation  Data masking  Data aggregation  Security logging  Monitoring  …
  • 29. © Waher Data AB, 2018. Data Protection by default You don’t add protection  It’s all on by default You remove protection  Permissions are granted Compare difference between:  White-list (by default)  Black-list (not by default)
  • 30. © Waher Data AB, 2018. Decentralization & security Decentralization has security implications:  More attack surfaces.  But value of each node is small.  Value/Effort ratio small.  Easier to protect.  Massive data breaches difficult.  You don’t put all your eggs into the same basket.  More resilient.  End-to-end encryption. Bonuses:  Permits enforcing ownership of data  Owner can authorize access, restrict processing or delete data
  • 31. © Waher Data AB, 2018. Anonymization vs. Strong Identities Anonymization:  Protects whistle blower or dissident (or criminal or terrorist)  Makes security decisions difficult. Strong identities (pseudonyms):  Protect information owners.  Allows selective responses. Both protect privacy, in different ways.
  • 32. © Waher Data AB, 2018. 4. XMPP
  • 33. © Waher Data AB, 2018. XMPP  eXtensible Messaging and Presence Protocol  Standardized (IETF)  RFC 6120-6122  Originally developed in the late 1990-ies.  “Jabber”  Based on XML  Open  Free  Free interfaces, libraries & software
  • 34. © Waher Data AB, 2018. Basic features Some basic features of XMPP include:  Global scalability (federation)  Global federated identities  Extensibility (namespaces)  Robustness (close to 20 years of operation)  Open (public & free)  Standardized  Secure  Interoperable
  • 35. © Waher Data AB, 2018. Extensibility  XML Namespaces  Avoid collisions  Owner of domain can extend it freely  Extensions standardized by XSF  XMPP Standards Foundation  XMPP Extension Protocol (XEP)  Types  Client-side extensions  Component-extensions  Server-side extensions
  • 36. © Waher Data AB, 2018. Communication Patterns Async. Msg. Req/Resp Pub/Sub Federation Broker P2P7 MQTT ✓ ✓ HTTP ✓ ✓ CoAP ✓ ✓ ✓ XMPP ✓ ✓ ✓✓ ✓ ✓* ✓ * Note: XMPP supports server-less communication as well.
  • 37. © Waher Data AB, 2018. Stanzas Three types of stanzas:  message  Asynchronous messages  iq  Information Query  Request/Response  Requires resource part  presence  Publish/subscribe  Transmitted to contacts with approved subscription  Forwards resource part Note: A 2nd publish/subscribe mechanism exists, defined in XEP-0060. It’s node-based.
  • 38. © Waher Data AB, 2018. Federated Brokers  Authenticate clients  SASL  Cooperate (federation)  Forward identities  Authorization  Roster  Presence  Subscription  Solve  Topology problem.  Latency problem.  Scalability problem.
  • 39. © Waher Data AB, 2018. Security  Encryption  TLS  End-to-end encryption optional  Authentication  SASL  Distributed authentication model  Identities always forwarded in stanzas  Authorization  Presence subscription  Trust-based  Provisioning (IoT)  Decision support for things  Control details  Blocking  Spam reporting
  • 40. © Waher Data AB, 2018. Data Protection by Design XMPP supports data protection by design:  Decentralization  Ubiquitous encryption  Even end-to-end encryption  Global identities  Authenticated  Forwarded
  • 41. © Waher Data AB, 2018. Data Protection by Default XMPP supports data protection by default:  Presence negotiation  Consent-based  Required to be able to communicate using iq and presence.  Consent can be withdrawn.
  • 42. © Waher Data AB, 2018. IEEE IoT Harmonization Interoperability interfaces for IoT  Sensor Data (former XEP-0323)  Provisioning (former XEP-0324)  Control (former XEP-0325)  Concentrator/Bridge (former XEP-0326)  Thing Registries & Discovery (XEP-0347)  Secure Account Creation (XEP-0348) https://gitlab.com/IEEE-SA/XMPPI/IoT https://prezi.com/esosntqhewhs/iot-xmpp/ https://www.slideshare.net/peterwaher/iot-harmonization-using-xmpp
  • 43. © Waher Data AB, 2018.  Raspberry Pi & Arduino  Sensors, Actuators, Controllers, Concentrators, Bridges  Protocols: MQTT, HTTP, CoAP, LWM2M, XMPP  Interoperability  Social Interaction  Decision Support  Product Lifecycle  IoT Service Platforms  IoT Harmonization  Security  Privacy Amazon Packt Bokus Bokus (e-book version) Contact: https://waher.se/ Mastering Internet of Things