the idem project
play

The IDEM Project Energy Management vs. Data Privacy Cornelia Kappler - PowerPoint PPT Presentation

I n d ividualisierbares E nergiecontrollingsystem I D E M mit M andantenfhigkeit The IDEM Project Energy Management vs. Data Privacy Cornelia Kappler (deZem) Holger Kinkelin, Marcel von Maltitz (TUM) 21.05.2014 M Agenda I D E Motivation


  1. I n d ividualisierbares E nergiecontrollingsystem I D E M mit M andantenfähigkeit The IDEM Project Energy Management vs. Data Privacy Cornelia Kappler (deZem) Holger Kinkelin, Marcel von Maltitz (TUM) 21.05.2014

  2. M Agenda I D E  Motivation and Goals of the IDEM Project Cornelia Kappler, deZem  Selected Use Cases and application examples  Energy Management vs. Data Privacy Holger Kinkelin, Marcel v. Maltitz (TUM) 2 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  3. I D E M MOTIVATION AND GOALS 3 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  4. M Project Overview I D E  BMBF-supported project in context of funding program „KMU- innovativ: Ressourcen- und Energieeffizienz“  Supervised by DLR  Duration from January 2014 – December 2015  Partners:  deZem (leader)  TUM  Immobilien Management Duisburg 4 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  5. M Motivation I D E  Energy is wasted because it is not known that it is actually being consumed! ( Intransparency ).  Saving potential up to 40% without loss of comfort  Energy efficiency can be increased by  Measures requiring investment • New technology, insulation,...  Measures requiring no or low investment • Optimization of control settings • Educated user behaviour IDEM • Presence detection • ...  Only with monitoring, these potentials are reachable. ( Transparency ) 5 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  6. M Motivation I D E  Example: Ventilation system in an office building „definitly only is active during working hours“... Savings by improved settings: 6 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  7. Motivation I D E M  Energytransparency ist necessary ...  ....but not sufficient for reducing energy consumption, because...  ...the actual user is not reached : M E D I  ...the user does not feel responsible n o i t p m  ...the user doesn‘t know whether saving potentials exist u s n o c y g r e n e u t o b a k c a b d  ...the user does not know what to do e e f n r o • e i s t U p m u s n o c o f s i s y l a n a c t i n a o m t i c o a • t u A e r s u r o f s l a s o p  This is especially true in jointly used, „public“ rooms o r p e v i c t u r t s • n o C s e c i v e d o f  Offices o l r t n o c t n e g i l l • e n t Test installation and I  Conference rooms Living Lab at TUM and  Gyms IMD (gyms in Duisburg)  ... 7 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  8. M IDEM Core Ideas I D E  Idea 1:  Sharing rooms and infrastructure is resource efficient • Meeting rooms • School gyms • Printers  Energy costs are accounted according to the actual usage. • No „Umlage“ (static cost apportitioning)  Idea 2:  IDEM system monitors the environment  Gives feedback when needed, e.g. • Last user leaves but light is still on -> feedback „please switch off lights“ 8 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  9. I D E M ENERGY MANAGEMENT VS. DATA PRIVACY 9 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  10. M IDEM vs. Privacy I D E  Let us repeat:  IDEM measures, processes and logs vast amounts of energy consumption data.  Data is recorded in high temporal and spatial resolution. • E.g.: System outputs energy consumption data within one room each second  We know exactly how much energy is spent at which place 10 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  11. M Example of real graph measured by deZem system I D E  Usage profile of a PC + Monitor (screen goes off after 10 min.) 9:55 – 10:15 coffeebreak? 10:05 – 12:00 User is away 12:05 – 13:15 Lunch! 15:40 oops, Working day is over... 8:30 User starts working 11 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  12. M Simplified (Worst Case) Example Scenario I D E  Dave works in his own office.  The office is monitored by IDEM.  Dave‘s computer disables the screen when inactive for 3 minutes.  Dave is a strong smoker. 12 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  13. M The Energy Log of Dave’s Office I D E y Smoking Energ Dave is outside and break Smoking break #2 Dave works smokes #3 Dave arrives at ~8:00 and turns on computer and screen 8:00 9:00 10:00 11:00 Tim e 13 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  14. M Dave is in Trouble I D E  From this graph Dave‘s boss learned that  Dave arrived late today.  Dave interrupts his work every hour to smoke.  Dave spends about 7 minutes away from his desk every time.  Dave didn‘t work for about 45 minutes this day.  The energy monitoring log of the past 3 months show the same behavior.  Dave is in trouble and receives a written warning. These events and people are fictional and any resemblance to person living or dead is purely coincidental. 14 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  15. I D E M 15 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  16. I D E M  What do data protection laws mean for a project like IDEM? 16 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  17. M Definition of Personal Data I D E  According to the European Data Protection Directive personal data is defined as  “[…] any information relating to an identified or identifiable natural person ('data subject’)”  “An identifiable person is one who can be identified, directly or indirectly , in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity “ Source: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML 17 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  18. M How to protect Personal Data? (§9 BDSG) I D E  Public and non-public organizations, which collect personal data […] have to meet the technical and organizational measures that are necessary for the execution of the provisions of this law, especially of those requirements named in the addendum to this law… “Öffentliche und nicht-öffentliche Stellen, die selbst oder im Auftrag personenbezogene Daten erheben,  verarbeiten oder nutzen, haben die technischen und organisatorischen Maßnahmen zu treffen, die erforderlich sind, um die Ausführung der Vorschriften dieses Gesetzes, insbesondere die in der Anlage zu diesem Gesetz genannten Anforderungen, zu gewährleisten. Erforderlich sind Maßnahmen nur, wenn ihr Aufwand in einem angemessenen Verhältnis zu dem angestrebten Schutzzweck steht.” 18 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  19. M §9 BDSG (Addendum) I D E 1) Enforce physical access control to data processing devices (dt.: Zutrittskontrolle). 2) Prevent data access of unauthorized persons (dt.: Zugangskontrolle). 3) Provide fine grained access control (dt.: Zugriffskontrolle). 4) Ensure data confidentiality during transport and processing, and when data is stored. 5) Provide logging mechanisms for data processing. 6) Guarantee that data is processed in the intended way. 7) Guarantee that data can not be destroyed. 8) Guarantee that data sets of different types can not be merged. (Translated from German; Requirements of European law, OECD, etc. are quite similar) 19 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  20. M Implementing the Requirements I I D E 2) Prevent data access of unauthorized persons 3) Provide fine grained access control  Intention:  Prevent 3 rd parties from accessing data  Typically enforced by:  Authentication mechanism (e.g. username/password, asymmetric cryptography, …)  Subsequent authorization (Access control lists, policies, …)  State of the Art 20 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  21. M Implementing the Requirements II I D E 4) Ensure data confidentiality during transport and processing, and when data is stored.  Typically implemented using:  Symmetric cryptography; works well if key is strong and secret  Intention:  Prevent 3 rd parties from eavesdropping information  State of the Art 21 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

  22. M Implementing the Requirements III I D E 6) Guarantee that data is processed in the intended way. 8) Guarantee that data sets of different types can not be merged  Intention:  Different than before!  System operator may use data for specific purposes only!  Can be realized by a system architecture that obeys privacy by design rules  Important goal of IDEM 22 IDEM - I n d ividualisierbares E nergiecontrollingsystem mit M andantenfähigkeit

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend