<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards Privacy-Preserving IoT Systems Using Model Driven Engineering</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Judith Michael , Lukas Netz, Bernhard Rumpe and Simon Varga Software Engineering, RWTH Aachen University Aachen</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>15</fpage>
      <lpage>22</lpage>
      <abstract>
        <p>-Considering the Internet of Things in production To consider privacy in systems design, Hoepman et al. processes, the human factor and aspects such as data protection [6], [7] introduce and discuss eight privacy design strategies: and data transparency are often ignored. However, collecting, minimize, hide, separate, abstract, inform, control, enforce and isntortihnigs adnodmparionc.esTsihnigs dinactaluidsegsoidnagtatofbroema ssteannsdoarrsd, pmraocchedinuerse, demonstrate. These design strategies have already been taken and processes as well as individual data about people. Recent into account when discussing our ideas for a privacy model approaches such as assistive systems for human-computer and and an according system architecture in [8]. This paper goes a human-machine interaction need more personal data than ever step further and discusses them in relation with model- driven before to provide purposeful, tailored support. For MDE ap- engineering (MDE). lpervoeal.chTehsisit piaspiemrpdoirstcaunstsetso acownsaiydetro pcrrievaatcey parlirveaacdyy-pornesemrvoidnegl We believe that MDE and model-based software engineering IoT systems using an MDE approach to support privacy and (MBSE) can well help to incorporate privacy considerations data transparency. We show the relevance and application on a at model level. It can provide means to support the aforemenuse case from industrial production processes. Additionally, we tioned privacy design strategies. discuss abilities for practical realization and its limitation. Research question. These considerations lead us to the folpriIsnedeIxnfToerrmmast-ionDoSmyasitne-mSsp,ecIifincforLmanatgiuoangePs,orGtaelns,eraIntetdernEentteorf- lowing research question: How is it possible to include privacy Things, Model-Based Software Engineering Privacy-By-Design, considerations in the MDE development process already on Privacy Modeling model level? Contribution. The approach presented in this paper uses I. INTRODUCTION MDE tools and frameworks together with a set of domain specific languages (DSLs) to create an Enterprise Information Motivation and research gap. Research on the digitization System (EIS) considering privacy- preservation and provide of work processes for the production of the future is currently users and data providers with the relevant information to focusing strongly on technical solutions, such as the interfaces make informed decisions about their data use. We show a between software and devices (cyber-physical systems), the possible DSL model structure including domain models, a recognition of work steps and processes with sensors, mathe- privacy model and possible instantiations as well as relevant matical evaluations of the collected data and model-based sys- aspects which have to be considered for the system design, tems engineering [1], [2]. However, the human factor, both as e.g., privacy checkpoints. a working person and as an individual, is often not sufficiently In previous work [8], we have already presented a concept taken into account in these considerations. Human actions for user-centered privacy-preserving process mining systems can influence processes both positively and negatively and are design for IoT. This paper goes a step further and discusses therefore indispensable in an integrated view of production the inclusion of privacy considerations for an MDE approach processes and systems. The rise of wearable technologies and appropriate tooling. makes it possible to equip them with miniaturized sensors [3]. The MDE tooling we use in our example for a realIn order to assist people in the execution of their work ization are MontiCore [9] and MontiGEM [10]. MontiCore tasks, e.g. by means of body-hugging assistance systems by is a workbench for modeling language development which using motion capture systems for the markerless acquisition supports the agile and compositional development of DSLs. of postures to support an ergonomic analysis and improved MontiGEM, the Generator for Enterprise Management, is ergonomic intervention process [4] in a context- and target- based on MontiCore and uses (1) a set of models which are group-specific way, or by providing them means to learn about (2) parsed and transformed using a template engine towards work tasks, e.g., by using smart glasses [5], individual data (3) the target, namely output files in the target language. As a will have to be collected, processed and stored. However, result, MontiGEM creates an information system out of class this development goes hand in hand with questions about the diagrams and graphical interface models. informational self-determination, the security of data collected Overview. The next section discusses the term privacy as well as data protection and transparency. and general concepts for privacy-preserving systems design. Copyright ©2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Section III presents a use case from the IoT domain, namely
a production process and shows its representation in a
domain specific data model. Section IV shows our idea on
how to combine privacy-preserving IoT systems and MDE
approaches. We show an exemplary system architecture and
relevant privacy checkpoints (PrC), the needed privacy model
to support the execution of the privacy checkpoints, concrete
examples for a purpose tree and the privacy policies (PPs)
including privacy policy rules (PPRs) and the description on
how to compare PPs and make the decision if data should
be provided after a request or not. Section V discusses our
approach in comparison to other approaches, weaknesses and
limitations of it and advantages on using it. The last section
summarizes and concludes our paper.</p>
      <p>II. PRIVACY AND PRIVACY-PRESERVING SYSTEM DESIGN</p>
      <p>
        The term privacy is related to informal self-determination,
which means the ability to decide what information about a
person is passed on [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Whereas this paper has a strong focus
on privacy, the term is strongly related to security, the notion
of trust and data sovereignty.
      </p>
      <p>
        To ensure data privacy, security provides the needed
foundations as it preserves the confidentiality, integrity and
availability of information and supports the authenticity, accountability,
non-repudiation and reliability [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. An important aspect is
access control. There exist different variants such as role-based
access control (RBAC) [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], policy-based access control, also
known as attribute-based access control (ABAC) [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] or
combinations of RBAC and attributes [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. As the proposed
approach needs a detailed way to define who gets access to
what data, we use privacy policies together with ABAC.
      </p>
      <p>
        To trust a person or system and in a next step to share
date with them, it depends on several factors such as past
interactions, what relationship exists to each other, similar
personality attributes such as interests or the sensitive nature
of the data we are sharing at that moment in time [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. To
ensure consent for data use and show the purpose for each data
capture helps to build trust in organizations [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. It is important
that employees are in control of their personal data.
      </p>
      <p>
        Our understanding of data sovereignty is related with the
personal rights of the people from whom the data originate
[
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Acquisti et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] state the importance to protect
individuals with minimal requirement of informed and rational
decision making and that it is important for privacy policies
to have a baseline framework of protection already included.
By using models and generative approaches, it is possible
to develop privacy policies which already include baseline
protection. Moreover, the generation of an information portal
could help to keep users informed about their data.
      </p>
      <p>
        It is important to comply with privacy regulations such as
the Europe’s General Data Protection Regulation (EU GDPR).
Due to the EU GDPR[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] it is important to consider privacy
throughout the complete development process.
Privacy-bydesign [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] is the most prominent approach to consider privacy
already in the development process when designing a new
technology.
      </p>
      <p>
        To take privacy in systems design into account, Hoepman
et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] introduce eight privacy design strategies:
minimize, hide, separate, abstract, inform, control, enforce and
demonstrate. They should be considered for privacy-by-design
approaches, which are compliant with EU GDPR and must be
also seen as requirements for the design of privacy-preserving
IoT systems, no matter if the design approaches are
modelbased, model-driven or without relation to modeling at all.
These strategies are discusses in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] in relation with privacy
challenges in human-centered industrial environments
especially considering process mining. This includes minimization,
aggregation, traceability, monitoring and transparency,
deletion, consent and purpose, trust and acceptance, privacy vs.
benefit, auditing and privacy breaches.
      </p>
      <p>
        Regarding IoT, privacy became relevant with the massive
deployment of sensors in various environments (see section V).
It is possible to collect data and information about people and
to use analytic tools to profile users and identify them even
from anonymized data [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. The following use case will show
an example for data collection in working environments and
thus, where privacy considerations become important.
      </p>
    </sec>
    <sec id="sec-2">
      <title>III. IOT USE CASE &amp; MDE</title>
      <p>When investigating IoT in production processes, humans are
often not taken into account as much as necessary. Our use
case shows examples where it is important to consider human
privacy concerns when collecting, storing and processing data
in such processes. Moreover, we show an excerpt of the
domain model including data needed for our running example.
Please remark that our approach can be applied onto other use
cases as well, as the domain information is well encapsulated.</p>
      <sec id="sec-2-1">
        <title>A. Humans in IoT production processes</title>
        <p>Fig. 1 shows one station of a manufacturing area. There,
several operators and robots collaborate in the production
process. We use an IoT box as product to exemplary describe
the process. The process steps for the IoT box assembly are:
put the lower part of its case on the conveyor belt, assemble
the different components such as the USB-port, serial ports,
a WiFi and bluetooth module and HDMI port, put the upper
part on top, test the functionality of the box and lift it off the
assembly line into the transport boxes which are moved to the
next production line for shipping.</p>
        <p>
          There are several operators included in this process which
are wearing (1) smart glasses and (2) smart watches and are
using (2) smartphones and (3) tablets. All of these devices
are able to collect data about the usage and location in the
manufacturing area. Moreover, health data could be processed
for different purposes, e.g., to detect physical and mental
stress [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ], or to analyze ergonomics. Motion capture systems
(including cameras, smart clothes or other technologies) are
used for the ergonomic analysis of postures of the operators,
to support the ergonomic intervention process and an
optimization of the daily personnel deployment planning [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ].
        </p>
        <p>The plastic parts of the product (4) include RFID chips
which make it possible to track them during the assembly
10
7</p>
        <p>4
6
7
process. The assembly line itself (6) and involved machines
such as the one for functionality testing (5) trace the product to
recognize in which assembly step the process is. The robots (7)
mainly support the lift onto and off process steps and (8) the
transportation of needed resources and the final product in the
transport boxes (9). These could be again tracked using RFID
technology. Moreover, information portals (10) could provide
the relevant information needs. Mobile and smart devices
(1)(3) could provide this information as well.</p>
        <p>Starting with this real life scenario, we create a domain
model including relevant context information and data
collected in various ways. Clearly, MDE approaches need domain
information to create the database and persistence layer.</p>
      </sec>
      <sec id="sec-2-2">
        <title>B. Domain Model</title>
        <p>
          Considering the use case in Fig. 1, we create the domain
model including all relevant persons, their abilities, machines,
resources, processes and locations as well as attributes for
handling sensor data. As suggested in [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ], we split it into the
main context areas: personal and social context, environmental
context, spatial context and behavioral context. Listing 1 shows
an excerpt of these concepts and their relations in the notation
of the class diagram for analysis (CD4A) language [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
Models in this textual modeling language can be used by
MontiCore and MontiGEM generators to create the according
data structure [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>For the personal and social context employees, relationships
between persons, their abilities and other personal data is
relevant. There exists the general concept Person including
information such as the name and the postal address. For
Employees it might be relevant to have their birthday and
employment dates. Operators (line 12) and other user
groups can inherit from this concept. Operators have again
specific attributes such as their shoe size to be able to provide
them the right safety shoes or their position in the company.</p>
        <p>For assistance purposes HealthData (lines 17-23) is
needed, e.g., the heart rate, blood pressure or current stress
level. For ergonomic analyzes the SkeletonModel
including joints and relations in-between them is relevant as well.
This data could be collected via smart devices and depth
cameras.</p>
        <p>
          CD4A..
association [*] Ability -&gt; (type) AbilityType [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ];
//Personal and Social Context
//Person, Employee, Supplier,...
class Employee extends Person {
        </p>
        <p>ZonedDateTime employmentStart;
&lt;Optional&gt; ZonedDateTime employmentEnd;</p>
        <p>ZonedDateTime birthday;
class Operator extends Employee {
long shoeSize;</p>
        <p>String gpsPosition;
class HealthData {
int heartRate;
String bloodPressure;
/String stressLevel;
/List&lt;String&gt; ergonomicProblems;</p>
        <p>ZonedDateTime timestamp;</p>
        <p>Listing 1: Data model in CD4A notation (excerpt)
58
59
60
61
62
63
64
65
66
67
68
69
70
71 }</p>
        <p>Every operator has certain Abilities (lines 25-27). There
are different AbilityTypes, such as the ability to control
a certain machine type, do a specific process step, having
a certain driving license, a specific certificate or further
education. With this knowledge it is possible to know what
person to place on which position in the company. The
AbilityLevel (lines 31-35) defines the concrete level
of ability the person has at a certain time. This might be
influenced by physical and metal restrictions at a certain time
which are reflected in the HealthData.</p>
        <p>Other relevant data could be e.g., FinancialData to be
able to make the salary payment, or pictures for access control.
Also Suppliers and Customers might be relevant, e.g.,
for customer and supplier relationship management processes.</p>
      </sec>
      <sec id="sec-2-3">
        <title>The environmental context describes Resources, which</title>
        <p>are needed to perform certain process steps. Possible resource
types are device, item, fixture and application.
Devices such as Robots could be further specified
into IndustrialRobot, TransportRobot or other
needed variants. Further relevant devices are Machines,
such as the QualityCheckMachine (5) in Figure 1, or
smart devices such as SmartWatches, SmartGlasses or
SmartPhones. It is possible to define Functions (lines
44-48) for Devices and list relevant Abilities (line 47)
and AbilityLevels (line 57) to be able to use or operate
a certain resource. This is relevant for assisting employees.</p>
        <p>The spatial context defines all elements relevant for
navigation, mobility and virtual relationships. The definition of
the relevant buildings, areas and other parts are strongly
dependent on the concrete company and its structure.
Starting from the Location, it is possible to define
relevant FactoryBuildings, Areas on certain floors or
Stations (lines 60-66) and relations among them (line 68).
To relate certain Resources to a special Area or Station
modelers can define Equipment on a certain position.</p>
        <p>
          The behavioral context (not further described in Listing 1)
includes Behavioral Units, Operations, connections
between operations and Goals as well as Events and
Traces from event logs (see [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ], [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] for details).
        </p>
        <p>Clearly, the class diagram is not complete but it shows
the most relevant classes and attributes for discussing privacy
considerations of our use case. MDE approaches can be used
to create the persistence layer and databases out of this model.</p>
        <p>IV. PRIVACY-PRESERVING IOT SYSTEMS AND MDE
The next steps towards privacy-preserving system design
for IoT using an MDE approach are (1) to discuss
privacypreserving systems design in the system architecture of our
use case including relevant privacy checkpoints and (2) the
privacy model which is needed to define the most relevant
privacy data. We show (3) concrete examples for a purpose
tree and the privacy policies and (4) the description on how to
compare privacy policies and make the decision if data should
be provided after a request or not.</p>
      </sec>
      <sec id="sec-2-4">
        <title>A. Privacy-Preserving System Design</title>
        <p>
          In [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], we have already discussed an approach for
usercentered privacy-preserving system design for systems
combining process mining and information systems. Fig. 2 presents
an overview of the high level system architecture for
humancentered industrial environments: (A) Data from resources and
sensory devices connected with operators is (B) collected,
e.g., via human activity recognition systems and a common
observation interface [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ]. The data is either (C) stored
and afterward (D) used for the main reasons why it was
stored (Primary Use) or it might be directly used (D) after
collection (B). After a defined time (E) the data should be
removed/deleted from the data storage (C) or it might be
directly removed after the primary use (D). The data might
be used (F) for other services than the ones that affect the
employees directly, e.g. for calculation which process steps
cause the highest stress level to optimize production processes.
Again, data removal (E) after this use should be ensured. Our
approach includes an information portal (G), to provide a user
friendly representation of stored data, data access attempts,
the management of policies and foresee privacy preservation
strategies for each data pass.
        </p>
        <p>Company ABC</p>
        <p>Resources</p>
        <p>A</p>
        <p>Operators</p>
        <p>G
Information</p>
        <p>Portal
PrC2 D</p>
        <p>Primary Use</p>
        <p>PrC4
F
Secondary Use</p>
        <p>Sensors</p>
        <p>PrC1</p>
        <p>B Data Collection
PrC5 E</p>
        <p>C
Data Storage</p>
        <p>PrC3</p>
        <p>PrC5</p>
        <p>Data Removal</p>
        <p>
          Fig. 2: System architecture with privacy checkpoints
On each data pass, we have introduced and extended the
privacy checkpoints (PrC 1- PrC5) from [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] to our use case.
They show at which points it is important to consider privacy
also when using MDE approaches.
        </p>
        <p>PrC 1: Inform in (G) which data is collected, the duration
of storage, possibilities for data removal and how raw data
is combined (PP for data collection). Operators can give
their consent and withdraw it. The portal ensures privacy
control, the traceability of data needs to be ensured in the
system architecture by considering all checkpoints.
PrC 2: Inform in (G) which (real-time) analysis will be
conducted and/or which services will receive the data for
what purpose (PP for data use), about risks and benefits of
analyzes and services, which services cannot be provided
without access to the data and again options to delete the
data at any point.</p>
        <p>PrC 3: Inform in (G) for what purpose the data is used
for (primary and secondary use), provide an option to
determine how long data can be stored, provide
possibilities to determine who has access to the data and obtain
consent (PP for data storage and data use). A sustainable
level of abstraction has to be considered before storing
the data, unnecessary personal data has to be anonymized
before storing (PP for data storage). (C) needs to provide
means for data encryption and empower the data provider
to be in control of that. If new purposes for data use
occur (additions in the purpose tree) or other attributes
of data are relevant for a purpose as well (changes in the
purpose tree), (G) needs to inform the employee about
these changes and provide possibilities to define new
PPRs or change existing ones.</p>
        <p>PrC 4: Inform in (G) which service has asked for access
to the data and to whom access was granted (comparison
of PPs), about aggregation with other data, if the data is
exported or shared with a 3rd party. If new purposes occur,
the employee has to be asked for consent again (define
a new PPR). Moreover, the employee should have the
ability to see the results of the secondary use.</p>
        <p>PrC 5: (G) provides possibilities to delete the data at
any point (during, at the end or after a service). Based
on the retention time in the PPRs the deletion has to be
done automatically after a certain period. After a deletion
request, the data controller has to ensure that also analysis
results and aggregated data are only kept if no connection
to the data provider is possible.</p>
        <p>These privacy checkpoints have to be considered in the
system architecture.</p>
      </sec>
      <sec id="sec-2-5">
        <title>B. Privacy Model</title>
        <p>
          The next step towards privacy-preservation is to define the
privacy model which includes the most relevant data to identify
important roles, define privacy preferences, define a companies
purposes for data processing and to handle data requests. As
discussed in [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], we rely on attribute-based access control and
use privacy policies and rules.
        </p>
        <p>Figure 3 shows the relevant privacy data as a class diagram
and how it is related. Privacy-preserving systems need at
least four roles: the DataProvider, the DataConsumer,
the DataController and a DataAuthority. The
DataProvider is the data source and should be enabled
to verify the correct use of his data. Thus, it defines a
PrivacyPolicy where it defines e.g., who can do what
with his data. The DataConsumer is an entity with an
interest in the data. It has to define a PrivacyPolicy which
declares e.g., what it wants to do with which data for what
purpose. Note that it has to be ensured, that only one relation
between PrivacyPolicy and either DataProducer or
DataConsumer can exist.</p>
        <p>The DataController processes and stores the data and
has to ensure the correct use of it. The DataAuthority
is able to control the processing of data and can check
compliance with data protection regulations.
DataProvider</p>
        <p>DataConsumer</p>
        <p>DataController</p>
        <p>DataAuthority
String name
0..1
has
1 1
PrivacyPolicy
String name
PolicyType type
1
*
has</p>
        <p>String name</p>
        <p>0..1
has</p>
        <p>String name</p>
        <p>String name
enum PolicyType
{Collect, Store, Use}
enum ComparisonStatus
{Requested, InComparison, Granted, NotGranted}</p>
        <p>enum Country
{Germany, Austria, US,+}</p>
        <p>enum PurposeLevel
{NoCollectionNoDistribution, CollectionNoDistribution,</p>
        <p>CollectionLimitedDistribution, CollectionAndDistribution}</p>
        <p>PrivacyPolicyRule
String collector
List&lt;String&gt; what
String aggregation
ZonedDateTime retentionTime
PurposeLevel level
List&lt;String&gt; recipients
Country storage
Country legislation
ZonedDateTime validFrom
&lt;Optional&gt; ZonedDateTime validTo
*
includes</p>
        <p>*
* *
relatedWith</p>
        <p>Purpose
String name
String description
0..1</p>
        <p>*</p>
        <p>DataRequest
ZonedDateTime requestDate</p>
        <p>ComparisonStatus status</p>
        <p>Fig. 3: Privacy Model</p>
        <p>Each PrivacyPolicy (either for collecting, storing or
using data) consists of several PrivacyPolicyRules.
They define very detailed (1) who collects the data (collector),
(2) what attributes are collected and/or stored, (3) on which
aggregation level the data is stored, e.g., each person, station,
production line, and daily, weekly, monthly, (4) how long the
data could be stored (retention time), (5) what purpose level is
addressed (see enum PurposeLevel), (6) which recipients
are allowed to have the data, (7) in which country the data is
stored and (8) the legislation of the country in which the data
processing is carried out. Additionally, it is important to store
historical information to know which PPR was valid when.</p>
        <p>Every PrivacyPolicyRule is related to one or more
Purposes. They can have further hierarchies as each purpose
can be related with another purpose. Constraints need to check
that the purposes for a tree structure in order to be computable.</p>
        <p>PrivacyPolicyRules can be related with several
DataRequests. Here it is stored who has requested access
to this data by using which PrivacyPolicyRule and if
the access to it was granted or not.</p>
        <p>This privacy model is domain independent, so please remark
that the privacy model is used additionally to the domain
model. This means that relations between privacy and domain
model have to be added such as the definition which class of
persons can be a data provider or consumer, e.g., via additional
and/or external tagging of the domain model.</p>
      </sec>
      <sec id="sec-2-6">
        <title>C. Instances of Privacy Policies and Purpose Trees</title>
        <p>Additionally to the defined models (domain and privacy
model) it is important to define a concrete instance of the
purpose tree and instances of the PPs (see Figure 4). The
purpose tree should be defined by the company which collects
the data to make it possible to use the purposes in the instances
of the PPs which are defined by operators in a further step.</p>
        <p>Domain Model</p>
        <p>Personal and Social Context
e.g., Person, Operator, Supplier,
Abilities, Health Data, Skeleton
Model, Financial Data
Environmental Context
e.g., Resources with Types Device,
Fixture, Item or Application, relative
Positions between Resources,</p>
        <p>Functions, Instructions</p>
        <p>There are several different ways for data controllers using
MDA approaches to define a purpose tree: it is possible to use
object diagrams (OD), a tagging language or any DSL with a
tree like structure. Figure 5 shows an excerpt of such a purpose
tree by using a simple graphical representation. The attributes
named at the leaf level of the tree are clearly related to the
ones in the domain model. Thus, it is important to check the
purpose tree instance and domain model for consistency and
to tag used attributes with the purpose in the domain model.</p>
        <p>In our concrete example productivity analysis and to provide
assistance e.g., by using ergonomic analysis or stress detection
are relevant purposes. Figure 5 shows the related attributes for
each of them. Other relevant purposes are e.g., to make the
work contract by the human resources department, salary
payment for the financial department, health insurance payments,
access control or quality assurance.</p>
        <p>general purpose
analysis
productivity
assistance
ergonomic analysis
stress detection
Station.hourlyProducedUnits Operator.surname Operator.HealthData.
Station.medianDowtime Operator.familyname heartrate
Station.ProcessEvent.* Operator.SkeletonModel.* Operator.HealthData.
QualityCheckMachine. Operator. gpsPosition bloodPressure
ProcessEvent.* Operator.HealthData.
timestamp</p>
        <p>Fig. 5: Example purpose tree (excerpt)</p>
        <p>In a next step the operators define their PP instances.
Figure 6 shows some examples, whereas the left side shows the
PP of type use including three rules of a data provider (Susan
Porter) and the right side two PP instances of different data
consumers. These PP definition processes of data providers
and data consumers happen independent from each other.
Susan has defined a rule for productivity and quality analysis,
one for ergonomic analysis and one for her data for stress
detection. Her employers health department has defined one
for providing assistance based on the health data. The quality
assurance department of a supplier has defined a PP as well
for productivity and quality analysis purposes.</p>
        <p>Privacy Policy</p>
        <p>Susan Porter (Operator)
Owner
Rule 1
Collector
What</p>
        <p>Company ABC
Station.hourlyProducedUnits
Station.medianDowtime
Station.processEvent.*
QualityCheckMachine.</p>
        <p>processEvent.*
Aggregation station, week
Retention unlimited
Purpose productivity, quality analysis
Level C&amp;LD
Recipient Company ABC, Suppliers
Storage Europe
Legislation Europe
Rule 2
Collector
What</p>
        <p>Company ABC
Operator.surname
Operator.familyname
Operator.skeletonModel.*</p>
        <p>Operator.gpsPosition
Aggregation person, day
Retention 1 year
Purpose ergonomic analysis
Level C&amp;ND
Recipient Company ABC
Storage Europe
Legislation Europe
Rule 3
Collector
What</p>
        <p>Company ABC
Operator.healthData.heartrate
Operator.healthData.bloodPressure</p>
        <p>Operator.healthData.timestamp
Aggregation person, month
Retention 1 month
Purpose stress detection
Level C&amp;ND
Recipient Company ABC
Storage Europe
Legislation Europe
Privacy Policy
Company ABC</p>
        <p>Health Department
Owner
Rule 1
Collector
What</p>
        <p>Company ABC
Operator.surname
Operator.familyname
Operator.skeletonModel.*
Operator.gpsPosition
Operator.healthData.
heartrate
Operator.healthData.
bloodPressure
Operator.healthData.</p>
        <p>timestamp
Aggregation person, month
Retention 1 month
Purpose assistance
Level C&amp;ND
Recipient Company ABC</p>
        <p>Health Department
Storage Europe
Legislation Europe</p>
        <p>Privacy Policy
PlasticFactory AG</p>
        <p>Quality Assurance
Owner
Rule 1
Collector
What</p>
        <p>Company ABC
Station.hourlyProducedUnits
Station.medianDowtime
QualityCheckMachine.</p>
        <p>processEvent.*
Aggregation station, month
Retention 1 year
Purpose productivity, quality analysis
Level C&amp;LD
Recipient PlasticFactory AG</p>
        <p>Management, Production</p>
        <p>Management
Storage Germany</p>
        <p>Legislation Germany</p>
        <p>Fig. 6: Examples for privacy policy instances</p>
      </sec>
      <sec id="sec-2-7">
        <title>D. Comparison of Privacy Policies and Decision Making</title>
        <p>The data controller has to compare the policies of data
consumers and providers to allow data transmissions. In case
of policy conflicts, the highest data protection restriction of
one or more data providers always win. If no PPR is defined
for a purpose, there is no access granted to the data. The
system compares each policy element of potential rules of the
provider and consumer and decides whether access is granted
or not. Decisions are stored as a DataRequest object.</p>
        <p>Figure 6 shows an example: When the health department
asks for the data defined in the PPR, each attribute has to be
compared. The attributes in what are defined in Rule 2 and 3
of the data provider, the purpose assistance is in the purpose
tree above ergonomic analysis and stress detection, so Rules 2
and 3 are relevant. The aggregation level month is the same as
in Rule 3 and more general as in Rule 2, retention time is the
same as in Rule 3 and less than in Rule 2, the purpose levels
are the same, as well as recipient, storage, and legislation.
Thus, access would be granted.</p>
        <p>The same occurs for the PlasticFactory AG and their data
request for the data provider: The attributes they request are
less than in Rule 1 and the according purposes in the purpose
tree, the aggregation level is higher with a month compared
to a week, retention time is unlimited in Rule 1 and thus
irrelevant, storage and legislation are in Europe. As a result of
the comparison, access is granted. These decisions are stored
in the DataRequest class of the Privacy Model in Figure 3.</p>
        <p>
          Code Generation. The described models can be used as
input for MontiGEM to generate the system code and the
information portal (see (G) in Figure 2) [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. The privacy
checkpoints needs to be included in the architecture to provide
PP checks in each application interface, e.g. database
connection or network communication, to make sure the policies are
fulfilled at all times. Using architecture description languages,
such as MontiArc [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ], a relation has to be established
between the privacy checkpoints and the communication between
components of the basic system architecture. Further details
are currently under investigation.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>V. DISCUSSION AND RELATED WORK</title>
      <p>
        Related work. Improvements for human workers
regarding the interaction with production systems in processes are
already ongoing work such as the transformation of the shop
floor into a smart environment with multimodal interaction
facilities to bridge the gap between physical world and the
digital part of the production system [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>
        Considering privacy, security and trust in the IoT domain,
a broad variety of approaches exist. Nevertheless, most of the
lacks to tackle the human factor including information for
and control by involved humans. Sicari et al. [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] provide an
extensive overview of security requirements as well as privacy,
trust, enforcement, secure middlewares and mobile security in
IoT. [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] discusses open issues for security and privacy. [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]
discusses the security and privacy of IoT architectures and
systems but lacks to discuss the human factor. [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] presents a
security-and quality-aware system architecture for IoT systems
considering data quality including data annotation. Moreover,
the IoT-A privacy model [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] includes functional components
for aspects such as identity management, authentication,
authorization, trust and reputation. [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ] considers information
privacy research in information systems. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] discussed
technological and organizational privacy challenges for process
mining in human-centered industrial environments. There exist
approaches to consider privacy in the system architecture such
as [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ], discussing privacy-friendly systems in case of
privacyby-policy, privacy-by-architecture or privacy-by-design [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>
        Work on model-based and model-driven approaches
considering privacy exist mainly in other domains, e.g., [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ] discuss
MDE for privacy management in business ecosystems or [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ]
in e-Health systems. The general idea to combine
privacypreserving system design with MDE approaches was shortly
introduced in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. To the best of our knowledge no other
approach exists which combines MDE and privacy engineering
for the IoT domain.
      </p>
      <p>
        Weaknesses and Limitations of the approach. The
proposed approach is easily applicable for greenfield design,
we expect that for adding privacy consideration into existing
projects and architectures further considerations have to be
made. This paper does not discuss security issues such as data
encryption or decryption [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] or privacy preserving techniques
applied directly on data such as k-anonymity [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] or
differential privacy [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ]. A challenging aspect for IoT systems is
the continuous addition of interfaces. Here it is important to
reconsider relevant PrCs every time a new interface is added
as it is a possible privacy leak. This can be improved by
automated checks of the interfaces against the architectural
models (including the PrCs) at compile time. Clearly, this
needs further investigation. The purpose tree instance has to
be kept up to date by the data controller himself. He has to be
aware of changes in the real life (e.g. new purposes for data
use) and is responsible for the ongoing maintenance of the
privacy aspects of the system. Nevertheless, this also occurs
for system design without MDE approaches. Moreover, further
investigations about the useability and understandability of the
PPs by users have to follow.
      </p>
      <p>Advantages using the approach. The use of MDE
approaches improves the maintainability of privacy-preserving
systems: for changing domain models or PrCs in architectural
models, continuous re-generation facilitates the creation and
change process and improves consistency requirements. As
such changes might have effects on the operators’ privacy
policy instances, these can be automatically checked against
the domain model and suggest changes or additions for users.
Further investigations of the maintainability are ongoing work.</p>
      <p>
        Regarding the design strategies [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], creating an information
portal supports users as they are informed and have fully
control over their data collection, storage, operation, and
dissemination. The information portal provides means for
operators and data consumers to easily create, read, update and
delete privacy policies and their rules and for data controllers
to easily maintain their purpose tree instance. The approach
enforces data controllers for creating, ensuring, and complying
with contractual and legal policy obligations. Moreover, it
helps to demonstrate the data authority that a controller
adheres to legal requirements including auditing, logging, and
reporting. The minimize, hide, separate and abstract strategies
are strongly related with database functions itself, so how they
are related with MDE approaches needs further investigation.
      </p>
      <p>Our approach is domain independent and can thus be
applied onto other use cases and scenarios where data is
collected, stored and processed as well. Domain information
is only included in the domain CD and the mapping between
the domain model and the privacy model.</p>
    </sec>
    <sec id="sec-4">
      <title>VI. CONCLUSION</title>
      <p>This paper presents an approach to include privacy
considerations in the MDE development process of IoT systems
and shows its application to a use case from human-centered
industrial environments. We use a set of DSLs and MDE tools
and frameworks to create an information system considering
privacy-preservation and provide users and data providers with
the relevant information to make informed decisions about
their data use. We show a possible DSL model structure
including domain models, a privacy model and possible
instantiations as well as relevant aspects which have to be considered
for the system design such as privacy checkpoints.</p>
      <p>To sum up, our approach is easily applicable on similar use
cases and system designs. Privacy preservation is important for
other IoT systems as well such as assistive systems in general,
smart home environments, wearables and health applications.
Further investigations in other domains will follow.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Ramos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. V.</given-names>
            <surname>Ferreira</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Barcelo</surname>
          </string-name>
          , “
          <article-title>Model-based systems engineering: An emerging approach for modern systems</article-title>
          ,
          <source>” IEEE Transactions on Systems, Man, and Cybernetics</source>
          , Part C (
          <article-title>Applications</article-title>
          and Reviews), vol.
          <volume>42</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>101</fpage>
          -
          <lpage>111</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>K.</given-names>
            <surname>Ho</surname>
          </string-name>
          <article-title>¨lldobler</article-title>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Michael</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. O.</given-names>
            <surname>Ringert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Rumpe</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Wortmann</surname>
          </string-name>
          , “
          <article-title>Innovations in model-based software and systems engineering</article-title>
          ,”
          <source>The Journal of Object Technology</source>
          , vol.
          <volume>18</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>60</lpage>
          ,
          <year>Jul 2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>F.</given-names>
            <surname>Mannhardt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Petersen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Fradinho Duarte de Oliveira</surname>
          </string-name>
          , “
          <article-title>Privacy challenges for process mining in human-centered industrial environments,” in Intelligent Environments 2018</article-title>
          . IEEE Xplore,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C.</given-names>
            <surname>Brandl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bonin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mertens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wischniewski</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C. M.</given-names>
            <surname>Schlick</surname>
          </string-name>
          , “
          <article-title>Digitalisierungsansa¨tze ergonomischer analysen und interventionen am beispiel der markerlosen erfassung von ko¨rperhaltungen bei arbeitsta¨tigkeiten in der produktion</article-title>
          ,”
          <source>Zeitschrift fu¨r Arbeitswissenschaft</source>
          , vol.
          <volume>70</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>89</fpage>
          -
          <lpage>98</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Spitzer</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Nanic</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ebner</surname>
          </string-name>
          , “
          <article-title>Distance learning and assistance using smart glasses,” Education Sciences</article-title>
          , vol.
          <volume>8</volume>
          , no.
          <issue>1</issue>
          , p.
          <fpage>21</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.-H.</given-names>
            <surname>Hoepman</surname>
          </string-name>
          , “
          <article-title>Privacy design strategies,” in ICT Systems Security</article-title>
          and Privacy Protection. Springer,
          <year>2014</year>
          , pp.
          <fpage>446</fpage>
          -
          <lpage>459</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Colesky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hoepman</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Hillen</surname>
          </string-name>
          , “
          <article-title>A critical analysis of privacy design strategies,” in IEEE Security and Privacy Workshops (SPW</article-title>
          ),
          <year>2016</year>
          , pp.
          <fpage>33</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Michael</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Koschmider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mannhardt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Baracaldo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Rumpe</surname>
          </string-name>
          , “
          <article-title>User-centered and privacy-driven process mining system design for iot,” in Information Systems Engineering in Responsible Information Systems, ser</article-title>
          .
          <source>LNBIP</source>
          . Springer,
          <year>2019</year>
          , vol.
          <volume>350</volume>
          , pp.
          <fpage>194</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>K.</given-names>
            <surname>Ho</surname>
          </string-name>
          <article-title>¨lldobler and B</article-title>
          .
          <string-name>
            <surname>Rumpe</surname>
          </string-name>
          ,
          <source>MontiCore 5 Language Workbench Edition</source>
          <year>2017</year>
          ,
          <article-title>ser</article-title>
          . Aachener
          <string-name>
            <surname>Informatik-Berichte</surname>
          </string-name>
          , Software Engineering, Band 32. Shaker Verlag,
          <year>December 2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>K.</given-names>
            <surname>Adam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Michael</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Netz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Rumpe</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Varga</surname>
          </string-name>
          , “
          <article-title>Enterprise information systems in academia and practice: Lessons learned from a mbse project,” in Digital Ecosystems of the Future: Methods, Techniques and Applications (EMISA'19), ser</article-title>
          .
          <source>LNI</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          , (in press).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>E.</given-names>
            <surname>Bergeron</surname>
          </string-name>
          , “
          <article-title>The difference between security and privacy</article-title>
          ,”
          <year>2000</year>
          . [Online]. Available: https://www.w3.org/P3P/mobile-privacy-ws/papers/ zks.html
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>I.</surname>
          </string-name>
          <year>27000</year>
          , “Information technology
          <article-title>- security techniques - information security management systems - overview</article-title>
          and vocabulary,” International Organization for Standardization, Standard,
          <year>2018</year>
          , fifth edition, 2018-
          <fpage>02</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P.</given-names>
            <surname>Colombo</surname>
          </string-name>
          and E. Ferrari, “
          <article-title>Privacy aware access control for big data: A research roadmap</article-title>
          ,”
          <source>Big Data Research</source>
          , vol.
          <volume>2</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>145</fpage>
          -
          <lpage>154</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>L.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wijesekera</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Jajodia</surname>
          </string-name>
          , “
          <article-title>A logic-based framework for attribute based access control,” ser</article-title>
          .
          <source>FMSE '04. ACM</source>
          ,
          <year>2004</year>
          , pp.
          <fpage>45</fpage>
          -
          <lpage>55</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>D. R.</given-names>
            <surname>Kuhn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. J.</given-names>
            <surname>Coyne</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T. R.</given-names>
            <surname>Weil</surname>
          </string-name>
          , “
          <article-title>Adding attributes to role-based access control</article-title>
          ,
          <source>” Computer</source>
          , vol.
          <volume>43</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>79</fpage>
          -
          <lpage>81</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>O.</given-names>
            <surname>Sacco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. G.</given-names>
            <surname>Breslin</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Decker</surname>
          </string-name>
          , “
          <article-title>Fine-grained trust assertions for privacy management in the social semantic web</article-title>
          ,
          <source>” in 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>218</fpage>
          -
          <lpage>225</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mettler</surname>
          </string-name>
          , “
          <article-title>Blockchain technology in healthcare: The revolution starts here,”</article-title>
          <source>in IEEE Int. Confe. on e-Health Networking, Applications and Services (Healthcom)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Acquisti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Brandimarte</surname>
          </string-name>
          , and G. Loewenstein, “
          <article-title>Privacy and human behavior in the age of information</article-title>
          ,” Science, vol.
          <volume>347</volume>
          , no.
          <issue>6221</issue>
          , pp.
          <fpage>509</fpage>
          -
          <lpage>514</lpage>
          , Jan.
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>European</surname>
            <given-names>Union</given-names>
          </string-name>
          , “
          <string-name>
            <surname>Regulation</surname>
          </string-name>
          (EU)
          <year>2016</year>
          /
          <article-title>679 of the European Parliament and of the Council on the protection of natural persons with regard to the processing of personal data and on the free movement of such data</article-title>
          ,
          <source>and repealing Directive</source>
          <volume>95</volume>
          /46/EC (GDPR),
          <source>” Official Journal of the European Union</source>
          , vol.
          <source>L119</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>88</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>P.</given-names>
            <surname>Schaar</surname>
          </string-name>
          , “
          <article-title>Privacy by design,” Identity in the Information Society</article-title>
          , vol.
          <volume>3</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>267</fpage>
          -
          <lpage>274</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>J.</given-names>
            <surname>Holler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Tsiatsis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Mulligan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Avesand</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Karnouskos</surname>
          </string-name>
          , and
          <string-name>
            <surname>D. Boyle,</surname>
          </string-name>
          <article-title>From Machine-to-Machine to the Internet of Things</article-title>
          .
          <source>Burlington: Elsevier Science</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M.</given-names>
            <surname>Fellmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Lambusch</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Waller</surname>
          </string-name>
          , “
          <article-title>Stress-sensitive it-systems at work: Insights from an empirical investigation,” in Business Information Systems</article-title>
          , Int. Conf.
          <article-title>(BIS); Part II, ser</article-title>
          . LNBIP,
          <string-name>
            <given-names>W.</given-names>
            <surname>Abramowicz</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Corchuelo</surname>
          </string-name>
          , Eds., vol.
          <volume>354</volume>
          . Springer,
          <year>2019</year>
          , pp.
          <fpage>284</fpage>
          -
          <lpage>298</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>P.</given-names>
            <surname>Campos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Graham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jorge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Nunes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Palanque</surname>
          </string-name>
          , and M. Winckler, Eds., Human-computer interaction - INTERACT
          <year>2011</year>
          ;
          <article-title>part II, ser</article-title>
          .
          <source>LNCS</source>
          . Berlin: Springer,
          <year>2011</year>
          , vol.
          <volume>6947</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>J.</given-names>
            <surname>Michael</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Steinberger</surname>
          </string-name>
          , “
          <article-title>Context modeling for active assistance,” in Proc. of the ER Forum 2017 and the ER 2017 Demo Track colocated with the 36th</article-title>
          <source>Int. Conference on Conceptual Modelling (ER</source>
          <year>2017</year>
          ),
          <string-name>
            <given-names>C.</given-names>
            <surname>Cabanillas</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Espan˜a, and S</article-title>
          . Farshidi, Eds.,
          <year>2017</year>
          , pp.
          <fpage>221</fpage>
          -
          <lpage>234</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>B.</given-names>
            <surname>Rumpe</surname>
          </string-name>
          ,
          <article-title>Modeling with UML: Language, Concepts</article-title>
          ,
          <source>Methods</source>
          . Springer International,
          <year>July 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>J.</given-names>
            <surname>Michael</surname>
          </string-name>
          and
          <string-name>
            <given-names>H. C.</given-names>
            <surname>Mayr</surname>
          </string-name>
          , “
          <article-title>Conceptual modeling for ambient assistance,” in Conceptual Modeling - ER 2013, ser</article-title>
          .
          <source>LNCS</source>
          , vol.
          <volume>8217</volume>
          . Springer,
          <year>2013</year>
          , pp.
          <fpage>403</fpage>
          -
          <lpage>413</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>V. A.</given-names>
            <surname>Shekhovtsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ranasinghe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. C.</given-names>
            <surname>Mayr</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Michael</surname>
          </string-name>
          , “
          <article-title>Domain Specific Models as System Links,” in Advances in Conceptual Modeling Workshops (</article-title>
          <source>ER'18)</source>
          . Springer,
          <year>2018</year>
          , pp.
          <fpage>330</fpage>
          -
          <lpage>340</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>A.</given-names>
            <surname>Haber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. O.</given-names>
            <surname>Ringert</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Rumpe</surname>
          </string-name>
          , “MontiArc - Architectural Modeling of Interactive Distributed and
          <string-name>
            <surname>Cyber-Physical</surname>
            <given-names>Systems</given-names>
          </string-name>
          ,” RWTH Aachen University,
          <source>Technical Report AIB-2012-03</source>
          ,
          <year>February 2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>K.</given-names>
            <surname>Schilling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Storms</surname>
          </string-name>
          , and W. Herfs, “
          <article-title>Environment-integrated human machine interface framework for multimodal system interaction on the shopfloor,” in Advances in human factors and systems interaction, ser</article-title>
          .
          <source>Advances in Intelligent Systems and Computing</source>
          ,
          <string-name>
            <given-names>I. L.</given-names>
            <surname>Nunes</surname>
          </string-name>
          , Ed. Cham: Springer,
          <year>2019</year>
          , vol.
          <volume>781</volume>
          , pp.
          <fpage>374</fpage>
          -
          <lpage>383</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sicari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rizzardi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Grieco</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Coen-Porisini</surname>
          </string-name>
          ,
          <article-title>“Security, privacy and trust in internet of things: The road ahead,” Computer Networks</article-title>
          , vol.
          <volume>76</volume>
          , pp.
          <fpage>146</fpage>
          -
          <lpage>164</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>M.</given-names>
            <surname>Abomhara</surname>
          </string-name>
          and
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Koien</surname>
          </string-name>
          , “
          <article-title>Security and privacy in the internet of things: Current status</article-title>
          and open issues,
          <source>” in Int. Conference on Privacy and Security in Mobile Systems (PRISMS)</source>
          . IEEE,
          <year>2014</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>E.</given-names>
            <surname>Vasilomanolakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Daubert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Luthra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Gazis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wiesmaier</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Kikiras</surname>
          </string-name>
          , “
          <article-title>On the security and privacy of internet of things architectures and systems</article-title>
          ,” in 2015 International Workshop on Secure Internet of Things. Piscataway, NJ: IEEE,
          <year>2015</year>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>57</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sicari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cappiello</surname>
          </string-name>
          , F. de Pellegrini,
          <string-name>
            <given-names>D.</given-names>
            <surname>Miorandi</surname>
          </string-name>
          , and A. CoenPorisini, “
          <article-title>A security-and quality-aware system architecture for internet of things,” Information Systems Frontiers</article-title>
          , vol.
          <volume>18</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>665</fpage>
          -
          <lpage>677</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Be</surname>
          </string-name>
          <article-title>´langer and Crossler, “Privacy in the digital age: A review of information privacy research in information systems</article-title>
          ,
          <source>” MIS Quarterly</source>
          , vol.
          <volume>35</volume>
          , no.
          <issue>4</issue>
          , p.
          <fpage>1017</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>S.</given-names>
            <surname>Spiekermann</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Cranor</surname>
          </string-name>
          , “Engineering privacy,”
          <source>IEEE Trans. on Software Engineering</source>
          , vol.
          <volume>35</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>67</fpage>
          -
          <lpage>82</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>C.</given-names>
            <surname>Feltus</surname>
          </string-name>
          , E. Grandry,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kupper</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.-N.</given-names>
            <surname>Colin</surname>
          </string-name>
          , “
          <article-title>Model-driven approach for privacy management in business ecosystem</article-title>
          ,
          <source>” in 5th Int. Conf. on Model-Driven Engineering and Software Development, INSTICC. SciTePress</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>392</fpage>
          -
          <lpage>400</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>F.</given-names>
            <surname>Amato</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Moscato</surname>
          </string-name>
          , “
          <article-title>A model driven approach to data privacy verification in e-health systems</article-title>
          ,
          <source>” Trans. Data Privacy</source>
          , vol.
          <volume>8</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>273</fpage>
          -
          <lpage>296</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>F.</given-names>
            <surname>Mannhardt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Koschmider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Baracaldo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Weidlich</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Michael</surname>
          </string-name>
          , “
          <article-title>Privacy-preserving process mining: Differential privacy for event logs</article-title>
          ,
          <source>” Business &amp; Information Systems Engineering (BISE)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>33</lpage>
          ,
          <year>2019</year>
          , (in press).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>