Abstract
We present an overview of the Databox application development environment or SDK as a means of enabling trusted IoT app development at the network edge. The Databox platform is a dedicated domestic platform that stores IoT, mobile and cloud data and executes local data processing by third party apps to provide end-user control over data flow. Key challenges for building apps in edge environments concern (i) the complexity of IoT devices and user requirements, and (ii) supporting privacy preserving features that meet new data protection regulations. We examine how the Databox SDK can ease the burden of regulatory compliance and be used to sensitize developers to privacy related issues in the very course of building apps.
This work was supported by the Engineering and Physical Sciences Research Council (Grant Numbers EP/M001636/1, EP/N028260/1, EP/M02315X/1).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
References
Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are. https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf. Accessed 26 June 2018
IDC FutureScape: Worldwide IoT 2018 Predictions. https://www.idc.com/getdoc.jsp?containerId=US43171317. Accessed 26 June 2018
Amazon Echo. https://en.wikipedia.org/wiki/Amazon_Echo. Accessed 26 June 2018
Apple HomePod. https://www.apple.com/uk/homepod. Accessed 26 June 2018
Google Home. https://store.google.com/product/google_home. Accessed 26 June 2018
Home Assistant. https://www.home-assistant.io. Accessed 26 June 2018
nCube. https://ncubehome.co.uk. Accessed 26 June 2018
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Official J. Eur. Union, L119, 1–88, April 2016
Chaudhry, A., Crowcroft, J., Howard, H., Madhavapeddy, A., Mortier, R., Haddadi, H., McAuley, D. : Personal data: thinking inside the box. In Proceedings of the Fifth De-cennial Aarhus Conference on Critical Alternatives, pp. 29–32. Aarhus University Press (2015)
Lee, S., Wong, E. L., Goel, D., Dahlin, M., Shmatikov, V.: PiBox: a platform for privacy-preserving apps. In: Proceedings of NSDI, pp. 501–514 (2013)
Giffin, D.B., Levy, A., Stefan, D., Terei, D., Mazières, D., Mitchell, J.C., Russo, A.: Hails: protecting data privacy in untrusted web applications. In: Proceedings of OSDI, pp. 47–60 (2012)
Willis, D., Dasgupta, A., Banerjee, S.: ParaDrop: a multi-tenant platform to dynamically install third party services on wireless gateways. In: Proceedings of the 9th ACM Workshop on Mobility in the Evolving Internet Architecture, pp. 43–48. ACM (2014)
Youngblood, G.M., Cook, D.J., Holder, L.B.: A learning architecture for automating the intelligent environment. In: Proceedings of the Conference on Innovative Applications of Artificial Intelligence, pp. 1576–1583. MIT Press, Cambridge (2005)
How GDPR Will Change the Way You Develop. https://www.smashingmagazine.com/2018/02/gdpr-for-web-developers. Accessed 26 June 2018
Domoticz. https://domoticz.com. Accessed 26 June 2018
OpenHAB. https://www.openhab.org. Accessed 26 June 2018
OpenRemote. http://www.openremote.com. Accessed 26 June 2018
Project Things. https://iot.mozilla.org. Accessed 26 June 2018
Cozify. https://en.cozify.fi. Accessed 26 June 2018
Fibaro. https://www.fibaro.com. Accessed 26 June 2018
Vera. http://getvera.com. Accessed 26 June 2018
Mydex. https://mydex.org. Accessed 26 June 2018
Hub of All Things. https://hubofallthings.com. Accessed 26 June 2018
Android Things. https://developer.android.com/things/index.html. Accessed 26 June 2018
Apple HomeKit. https://www.apple.com/uk/ios/home. Accessed 26 June 2018
Samsung SmartThings. http://www.samsung.com/uk/smartthings. Accessed 26 June 2018
Newman, M.W.: Now we’re cooking: recipes for end-user service composition in the digital home. Position Paper- CHI 2006 Workshop IT@Home (2006)
IFTTT. https://ifttt.com. Accessed 26 June 2018
Stringify. https://www.stringify.com. Accessed 26 June 2018
Yeti. https://getyeti.co. Accessed 26 June 2018
Zapier. https://zapier.com. Accessed 26 June 2018
Mi, X., Feng Q., Ying, Z., XiaoFeng, W.: An empirical characterization of IFTTT: eco-system, usage, and performance. In: Proceedings of the 2017 Internet Measurement Conference, pp. 398–404. ACM, New York (2017)
Surbatovich, M., Jassim, A., Lujo B., Anupam D., Limin, J.: Some recipes can do more than spoil your appetite: analyzing the security and privacy risks of IFTTT recipes. In: Proceedings of the 26th International Conference on World Wide Web, International World Wide Web Conferences Steering Committee, pp. 1501–1510 (2017)
Attacking Discrimination in ML. https://research.google.com/bigpicture/attacking-discrimination-in-ml. Accessed 26 June 2018
Eslami, M., Krishna Kumaran, S.R., Sandvig, C., Karahalios, K.: Communicating algorithmic process in online behavioral advertising. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, p. 432. ACM (2018)
Ribeiro, M.T., Singh, S., Guestrin, C.: Why should I trust you?: explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135–1144. ACM (2016)
Morrison, J.P.: Flow-based programming. In: Proceedings of the 1st International Workshop on Software Engineering for Parallel and Distributed Systems, pp. 25–29 (1994)
Weiss, G.M., Lockhart, J.W.: Identifying user traits by mining smart phone accelerometer data. In: Proceedings of the Fifth International Workshop on Knowledge Discovery from Sensor Data, pp. 61–69. ACM (2011)
Smart meters review TV viewing habits. http://www.h-online.com/security/news/item/Smart-meters-reveal-TV-viewing-habits-1346385.html. Accessed 26 June 2018
Kim, Y., Schmid, T., Srivastava, M.B., Wang, Y.: Challenges in resource monitoring for residential spaces. In: Proceedings of the First ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings, pp. 1–6. ACM (2009)
Crabtree, A., Lodge, T., Colley, J., Greenhalgh, C., Mortier, M.: Building accountability into the Internet of Things: the IoT Databox Model. J. Reliable Intell. Environ. SSRN (2018)
Wang, Q., Hassan, W.U., Bates, A., Gunter, C.: Fear and logging in the Internet of Things. In: Network and Distributed Systems Symposium (2018)
Schreiber, A., Struminski, R.: Tracing personal data using comics. In: International Conference on Universal Access in Human-Computer Interaction, pp. 444–455 (2017)
Edwards, L., Veale, M.: Slave to the algorithm: why a right to an explanation is probably not the remedy you are looking for. Duke L. Tech. Rev. 16, 18 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Lodge, T., Crabtree, A., Brown, A. (2018). Developing GDPR Compliant Apps for the Edge. In: Garcia-Alfaro, J., Herrera-JoancomartÃ, J., Livraga, G., Rios, R. (eds) Data Privacy Management, Cryptocurrencies and Blockchain Technology. DPM CBT 2018 2018. Lecture Notes in Computer Science(), vol 11025. Springer, Cham. https://doi.org/10.1007/978-3-030-00305-0_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-00305-0_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00304-3
Online ISBN: 978-3-030-00305-0
eBook Packages: Computer ScienceComputer Science (R0)