=Paper=
{{Paper
|id=Vol-2530/paper2
|storemode=property
|title=SmartWorkplace: A Privacy-based Fog Computing Approach to Boost Energy Efficiency and Wellness in Digital Workspaces
|pdfUrl=https://ceur-ws.org/Vol-2530/paper2.pdf
|volume=Vol-2530
|authors=Fatima Z. Benhamida,Joan Navarro,Oihane Gómez-Carmona,Diego Casado-Mansilla,Diego López-de-Ipiña,Agustín Zaballos
|dblpUrl=https://dblp.org/rec/conf/iot/BenhamidaNGCLZ19
}}
==SmartWorkplace: A Privacy-based Fog Computing Approach to Boost Energy Efficiency and Wellness in Digital Workspaces==
SmartWorkplace: A Privacy-based Fog Computing Approach to Boost Energy Efficiency and Wellness in Digital Workplaces Fatima Z. Benhamida Joan Navarro Oihane Gómez-Carmona Laboratoire des méthodes de Grup de Recerca en Internet MORElab – Deusto Institute of conception des systèmes–Ecole Technologies & Storage, La Salle – Technology Nationale Superieure d’Informatique Universitat Ramon Llull Bilbao, Spain Oued Smar, Algeria Barcelona, Spain oihane.gomezc@deusto.es f_benhamida@esi.dz jnavarro@salle.url.edu Diego Casado-Mansilla Diego López-de-Ipiña Agustín Zaballos MORElab – Deusto Institute of MORElab – Deusto Institute of Grup de Recerca en Internet Technology Technology Technologies & Storage, La Salle – Bilbao, Spain Bilbao, Spain Universitat Ramon Llull dcasado@deusto.es dipina@deusto.es Barcelona, Spain agustin.zaballos@salle.url.edu ABSTRACT 1 INTRODUCTION The massive digitalization of modern society has transformed hu- With the advent of new ubiquitous technologies and the emerging man lifestyles in several dimensions ranging from social interac- creation of a new interconnected world, digital transformation is tions to healthcare and wellness, including transportation systems, playing a crucial role in modern societies [52]. Several fields and jobs, machinery, or energy management. However, physical envi- domains such as healthcare [2], business [6], Industry 4.0 [48], trans- ronments and people have not evolved at the same pace, leaving a portation [20], or even education [15] have already taken advantage challenging gap between the advances in technology and how soci- of the never-ending advances in the Information and Communi- ety efficiently interact with it. One specific case is the workplaces cation Technologies (ICT). where digital literacy is not widespread among all employees (e.g. Under this context, the predominant presence of technology can blue or grey collars) and the advent of such digitalization is a reality. play a relevant role in bringing added value services in a way This work presents an architectural approach to improve energy never imagined before and facing existing societal challenges [33]. efficiency and wellness at work (by suggesting new behaviours However, despite this continuous progress in services and and dynamics) while maintaining user comfort and keeping user’s technology, human beings seem to struggle on keep-ing the pace of privacy. More specifically, this approach—inspired by the Fog com- such digital achievements. puting paradigm—features a hierarchical scheme based of privacy An example can be found in office-based workplaces (i.e. those maintenance which (1) collects real-time data from the users at the spaces in which employees perform their working duties in a workplace environment; (2) processes these data in either in the Fog workstation) [7] that basically have kept the same physical or Cloud infrastructure depending on the data sensitiveness; and (3) layout and configuration—typically composed of a table, a lamp, a provides feedback to the user along with a set of recommendations (desktop) computer and a monitor—for the last three decades but related to energy usage. As such, the user is included in the whole the digital services and data they use have changed enormously. data-cycle which allows employees to decide what information can Besides the digital gap that some white and grey collars have, this be monitored, where it can be computed and the appropriate ICT traditional set-up, contributes to increasing the large number of channels to receive the feedback. health issues related to the interactions of workers and their en- vironment [40]. KEYWORDS In particular, the unconscious habits and behaviors associated to Fog computing, energy efficiency, privacy, confidence, smart envi- this spaces take a primary role on the physical, mental and social ronments well-being of the worker [36], including long periods of inactivity and sitting times [10], [38], ergonomic related problems [50],[17] or the development of computer vision syndrome because of the exponential screen time exposure [43], [28]. 1st Workshop on Cyber-Physical Social Systems (CPSS2019), October 22, 2019, Bilbao, Spain. Copyright © 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). 9 CPSS2019, October 22, 2019, Bilbao, Spain F. Z. Benhamida, et al. Workplaces are very sensitive places to conduct experiments [5] This idea of "Smart Workplace" seeks to turn a working space since they might affect to workers performance and, most impor- into a more efficient, trustworthy and acceptable environment by tantly, compromise critical data from companies and their employ- its workers. Thus, transform the way we work and we interact ees. For instance, installing a camera in an office might provide mas- with our environment while promoting more healthier sive amounts of valuable data to enhance user’s health and energy behaviours or increasing levels of comfort and the productivity to consumption (e.g., worker’s postures, office illumination, hazardous their occupants in return. To summarize, this paper contributes situations, etc.) but it also may reveal private data regarding con- with a two-fold approach: tents of contracts, meetings, etc. (i) We present our concept of a Fog Computing architecture, Also, it has to be considered that people in modern societies designed both from the technical and the user perspective, to are averse to be continuously tracked and monitored without contribute to the transformation of smart workplaces while knowing which data they are sharing [1]. Therefore, securing keeping users’ privacy. Through this implementation, we users’ privacy while making them aware which data they are seek to convert the workplace into an appropriate setting disclosing is a critical issue to be addressed when considering to to motivate workers toward more sustainable and healthier design or deploy any (new) device in a workplace or using data behaviours while promoting changes that hopefully persist generated in it [19]. over time. The purpose of this work is contributing to this open challenge (ii) We illustrate the principal challenges associated with ev- by discussing the feasibility of conceiving a platform able to trans- ery layer of the architecture and the needs that should be form the digital workplace into a proactive entity (coined as Smart taken into account for succeeding in the transformation of Workplace) while ensuring user’s data privacy. In the proposed workplaces. architecture, the worker decides which data wants to disclose and The remainder of this paper is organized as follows. The next until up to what extent and, from there, it is continuously monitored section reviews the related work on smart workplaces. Later, the and then advised on the best actions to increase his/her comfort proposed system architecture required to transform a digital work- while optimizing energy usage. place into a smart workplace is outlined. Finally, a discussion on More specifically, instead of con-ceiving expensive and new ad the limitations of the proposed approach and some conclusions are hoc gadgets, we aim to benefit from the off-the-shelf technology provided. already deployed in digital workplaces (e.g., desktop computers, smartphones) to sense the environmen-tal status and worker 2 RELATED WORK dynamics and naturally interact with them. To overcome the data storage and computing limitations associ-ated to this From occupational risk assessment and ensuring safety in the work- continuous monitoring, the key idea of this proposal is to build a places [34], the idea of transforming the workplace has progres- Fog Computing domain composed of all the digital devices sively evolved from a safety-first concern to a more holistic ap- deployed in a workplace (that can join or leave at will) and a Cloud proach that includes persistent lifestyle changes within such spaces Computing layer that will be used whenever the devices need to [37]. Since technology allows the possibility to provide context- carry more complex computations. aware guidance and influence on the users, technology-based solu- The combination of Fog and Cloud layers enables the system tions can be considered appropriate drivers to promote wellness and to limit the scope of the sensed data according to the worker’s energy awareness on the workplace. Therefore, several attempts preferences in relation to the privacy they wanted to preserve, have been made to design enhanced workplaces [5] through the while obscuring its data when needed (i.e., splitting the adoption of ICTs, offering different solutions for facing indirect computation process in several distributed nodes improves data risks associated with these spaces and bringing energy awareness security [31, 32]). while reaching large audiences. The PEROSH initiative [22] studied Hence, privacy is considered throughout the whole data-cycle: how wearable devices could be part of wellness promotion inter- since data collection, through data intensive computing and user ventions and elaborated a decision support framework for selecting feedback. The user is then in-volved from the very beginning of useful sensors and a proper data collection strategies for avoiding the design of the architectural approach presented. Thus, an sedentary behaviors neglecting data privacy issues. In the same employee can decide in real-time which information is sensible to way, Jimenez et al. [26] presented some guidelines to promote work- him/her and what information can be more or less flexible to share place health by using electronic and mobile health tools to provide or compute. This intermediate step will help to decide if the easier administration for campaign proposers while considering computation of the activity recognition or the best moment to data privacy from a technical and psychological points of view. send feedback can be computed on a secured and reliable Fog However, no specific ICT architectures are proposed to conduct environment or it can be sent to the Cloud layer. this processes. With this, the novelty of the proposed system strives on our goal Indeed, assessing occupational sedentary behavior standouts as to combine innovative data processing architectures, distributed one of the most relevant factors to consider in these spaces and intelligence processes and advanced immersive interaction inter- several initiatives have been designed from diverse perspectives to faces between users and things to give place to a more healthy and face this problem. In this direction, in 2018, Taylor et Al. reviewed secure working environments. the existing literature addressing interventions designed to reduce 10 SmartWorkplace: A Privacy-based Fog Computing Approach to Boost Energy CPSS2019, October 22, 2019, Bilbao, Spain Efficiency andWellness in DigitalWorkplaces sitting time and the role of the organizational culture [47]. Digi- operations close to where data were generated and, thus, minimiz- tal technologies have also been proposed for reducing sedentary ing the amount of information sent to the Cloud. Many studies behaviours[23] as well as to increase energy expenditure [39]. show that users, enterprises and stakeholders are more keen to Moreover, other approaches have addressed the influence of share and collaborate if that sensitive data are managed locally at interruptions on high cognitive loads [45], and non-intrusive moni- the edge of the network [29]. toring systems specifically designed to avoid lower back injuries The smart workplace transformation unavoidably requires using have been proposed [51], modeled physical fatigue in workplaces personal data about users’ behavior to make better decisions ac- [34] or designed a smart chair to improve the sitting behavior [44]. cordingly (see Section 2). For this reason, the proposed architecture More in particular, some works have already explored how people aims to define a system model able to transform a workplace into a and the devices that populate Smart Workplaces can cooperate smart environment using personal data while considering workers’ towards higher energy efficiency [13] or bringing health aware- privacy. The architecture is composed of four main layers: (1) Sens- ness to the workplace by increasing technology acceptance [18]. ing Layer responsible of data collection, (2) Early Stage Computing Whilst other works have considered how to enhance safety [41] and Layer represented by a Fog network used for local computation, comfort[3] in working spaces through 5G and IoT. Other platforms, (3) Intensive Computing Layer deployed in a Cloud infrastructure such as Comfy 1, which proposed a cloud-enabled platform to con- and responsible for data aggregation, which is used to obtain more nect employees directly to their physical and digital workplace accurate recommendations, and (4) Worker-Workplace Layer that is through the captured data. used to optimize the interaction between the users and the devices Similar advances have been proposed for energy-awareness in while giving recommendations. This four layers are supervised by these spaces and to guide workers in their routine. In this regard, a Decision Support System (DSS) that with the aid of the worker, Irizar-Arrieta et al. [24] proposed a digital interface able to inform defines through intents the scope of every datum according to some workers about their performance related to energy consumption. rules such as privacy, presence or availability. This intent-based Similarly, the GreenSoul project [25] designed an enhanced object DSS is based on S3OiA architecture [49]. We explain hereafter the for office environments—an interactive coaster—to persuade work- role of functionality of each layer. ers to be more aware of the energy consumption of the electrical devices surrounding them in their desktop. Also, there are works 3.1 Sensing layer focused on how to reach larger audiences and several strategies The Sensing layer is committed to collect as much data as possible have been implemented to address this goal: from measuring shared from the workplace. It can be best seen as an IoT sub-domain where lab equipment usage [35] to projecting real-time energy statistics every digital object does its best to sense as many environmental of a factory in the physical environment [27] and convert work variables as possible. For instance, a smart phone can easily sense equipment into persuasive devices which raise eco-awareness [12]. ambient light intensity, background noise or the amount of phone In contrast to addressed literature, our proposal puts the focus calls interrupting worker’s activity. Analogously, a desktop com- on the requirements to design an open new innovative architec- puter can easily infer user activity by counting keystrokes (or clicks ture able to allocate interactive interventions in the workplaces in the mouse) in a period of time. It can also detect user presence, while considering system scalability, users’ privacy, and low-cost. sitting posture, eye gaze, eye blinking by using the built-in camera Additionally, this approach addresses both, energy consumption [11]. Additionally, other smart devices such as smart plugs, smart and workers health, as a whole rather than individually fighting watches, or smart speakers (digital assistants) can be easily recon- them with expensive or commercial (e.g., Comfy Enlighted 2) ad figured to report all the data that they seamlessly capture. These hoc devices. This links the Fog Computing paradigm with the work data will be later used to be processed and matched to a certain environment and represents a new way of envisioning the basis behavior at the upper layers. for the digital transformation of these spaces. In the following, the proposed architecture will be described together to the different challenges associated with each corresponding layer. 3.2 Early Stage Computing Layer Similarly to a Fog architecture, the Early Stage Computing layer will 3 SYSTEM MODEL receive data from the sensing layer and conduct local non-intensive To address the transformation of a digital workplace into a smart computations. From a data privacy point of view, this layer can be workplace in a generic and widely adoptable way, we proposed the best seen as the frontier in which sensible data shall not go beyond. following hierarchical architecture (see Figure 1) inspired by the Hence, as long as the data privacy policies allow it, this layer will Fog computing approach. send encrypted data to the upper layer for strong recommendations Fog Computing is defined as a highly virtualized platform that that require much computing power and more robust models. provides processing, storage and networking services between ter- Devices located at the edge of the network can be typically iden- minals and data centers used by traditional Cloud Computing, typi- tified as gateways, computers, or local servers. To further explain cally located, but not exclusively, on the edge of the network [8]. the role of the Early Stage Computing Layer, suppose that a smart Fog Computing comes to alleviate those fears related to sharing plug sends the power consumption of a heater. When the gate- sensitive and private data on the Cloud by conducting computation way detects that the heater has been turned on uninterruptedly for a specified number of hours, it might suggest to turn off the 1 https://www.comfyapp.com/ heater, which would result in energy saving. In the next computing 2 https://www.enlightedinc.com/ layer (i.e., Intensive Computing Layer), the power consumption 11 CPSS2019, October 22, 2019, Bilbao, Spain F. Z. Benhamida, et al. Figure 1: Proposed system architecture of the heater will be correlated with other variables (e.g., ambi- 3.3 Intensive computing and storage layer ent temperature, office hours, office occupancy, etc.) to make the At this layer, the power of a Cloud computing infrastructure is ex- recommendation stronger. ploited by (1) logging and aggregating all the collected data, (2) us- Additionally, it is worth mentioning the situation in which the ing a Learning Classifier System able to build a set of user-readable same physical device—due to its advanced sensing, computing and rules (i.e., recommendations), and (3) forwarding these rules to the communication capabilities—belongs to the Sensing and Early Stage devices that have sensing but also acting capabilities from the Early Computing Layers at a time. For instance, suppose that a smart Stage Computing Layer (i.e., Worker-Workplace interaction Layer). phone collects (Sensing Layer) data regarding ambient light inten- These recommendations resulting from data analysis, will be mainly sity. When it detects an excess of ambient light (Early Stage Com- transmitted by means of the Worker-Workplace interaction Layer, puting Layer) it might suggest to turn off the office light, which which will be in charge of finding the best moment/manner to send would result in energy saving. However, these data should also be recommendations to the worker (for instance, worker’s presence again cross-checked with data from other sources (e.g. the desktop must be guaranteed before making a recommendation). screen is momentarily displaying bright images) in order to make a strong recommendation. This is why the early stage layer will 3.4 Worker-workplace interaction layer transfer sensed data to the upper layer for intensive computing and The availability of a large amount of data provides the opportunity global storage. to use this information to influence workers and guide their actions Finally, it is also worth considering the situation in which a towards more healthier and sustainable behaviors. For this reason, camera is used to track workers’ postures and, thus, user privacy this layer oversees optimizing the interaction between the users and is of paramount importance. In this case, we propose to take an the devices by delivering contextualized feedback. This depends on alternative approach by encrypting and sending to the following when and how to interact with the workers to effectively influence layer the worker’s body/face landmarks [11] instead of the whole their behaviour. On the one side, by choosing the right recommen- video stream (as done in [51]). Note that this strategy intrinsically dation mechanism (e.g persuasive strategies based on personalized boosts worker’s privacy since it is guaranteed that (1) the whole messages [12]). On the other side, by selecting the right moment image stream cannot be reconstructed from the landmarks (i.e., no to provide the recommendations: trough anticipation (about-to-do plain images are sent) and (2) no other environmental information moments) and reflection on action (just-in-time moments). The first of the workplace leave the physical building. Additionally, the over- one is based on anticipation, consisting of recognizing pre-action all amount of data transferred to the communications network is patterns that allow providing immediate interaction to redirect greatly reduced. the activity through context-aware signals (lights, sounds or vibra- tions, among others). The second one consists on providing the worker with all the information related to his behavior and their performance, analyzing in depth patterns and changes over time 12 SmartWorkplace: A Privacy-based Fog Computing Approach to Boost Energy CPSS2019, October 22, 2019, Bilbao, Spain Efficiency andWellness in DigitalWorkplaces and showing the possible consequences of this trend. Unlike the consider ethical concerns of personal data collection [9]. In par- previous type of action, in this case we seek to influence future ticular, users are more reluctant to be monitored in these spaces habits through personal inquiry. as it can be associated with their schedules or work performance [4]. Secondly, data needs to be gathered without affecting workers 3.5 Illustrative Example routine and minimizing their attention theft. Thus, it needs to be To better understand the functionality of the proposed architec- as non-intrusive as possible, creating an ecosystem surrounding ture, we give a simple scenario of a worker using a set of standard the employee that allows collecting data without any effect on its devices (i.e., desktop computer with in-built camera, smart phone, routine[46]. smart plug, fan, and voice assistant) with sensing capabilities in the The proposed architecture considers both factors. Privacy con- workplace environment. cerns are covered ensuring the security of the data in every layer of On the one hand, the desktop computer continuously monitors the architecture, with special focus on the way sensitive informa- (i.e., Early Stage Computing Layer) the worker position and period- tion is processed and sent to the cloud. Therefore, no personal data ically triggers alerts when no significant movement is detected for is available and the privacy of the workers is preserved. The second long periods of time. Additionally, the face/body landmarks are sent aspect is avoided by using digital devices deployed in a workplace via HTTPS to the Intensive Computing Layer to precisely analyse so that space is not over-instrumented with disruptive elements. In the worker’s gaze, eye blinking and sitting posture. This layer sends general terms, a successful ICT initiative should have a strong point back recommendations to the desktop in order to complement their in ensuring how the user interacts with the technology, promoting local decisions. its adherence while creating a sense of confidence and trust. On the other hand, the smart plug is continuously sending the power consumption (via JSON messages) to the same desktop ap- 4.2 Early Stage Computing Layer plication that locally monitors worker’s movements. At this point The Early Stage Computing Layer is similar to the fog Scheme (Early Stage Computing Layer) the system can infer that if there where components in the edge of the network are used to make is no movement and the fan is turned on (i.e., there is power con- local computations, preliminary data analysis, and decompose in- sumption) the worker might have forgotten to turn off the fan and, formation to make it harder to retrieve in upper layers. This Fog thus, might decide to trigger a warning via the voice assistant, just architecture ensures sharing resources and services in the neighbor- in case the worker is still in the office. Additionally, at the Intensive hood of a network while enhancing their secrecy and availability. Computing Layer, the power consumption of the smart plug can be Indeed, sharing data to the Cloud raises fears when it comes to correlated with the worker agenda (via Microsoft Outlook Calendar disclose sensitive and private data. Since user is involved in the API) to check whether the worker shall be elsewhere and, thus, whole chain of the proposed system model, he/she might be more decide to turn off the fan by means of the smart plug. keen to share and collaborate if that sensitive data were managed Overall, with this example it can be seen how worker comfort and locally at the edge of the network. In this regard, the Early Stage energy efficient can be addressed with the proposed architecture. Computing Layer is introduced as an intermediate layer that offers local decisions based on data collected at the Sensing Layer. 4 DRIVERS AND CHALLENGES However, edge devices are limited in computational and energy We recall that the basic idea behind the system model proposed resources. Hence, they can only cover common decisions (e.g., turn above is mainly to offer a n a rchitecture w here: ( 1) t he s ystem is off office lights when sensing a high ambient light intensity). For able to propose strategies offering wellness (user perspective) and this reason, the proposed system model still requires sending data energy efficiency (resource consumption), (2) the user is strongly in- to an upper layer with more computing and storage capabilities. volved in the whole system, from sensing data to applying suggested This layer is the most critical point to consider data privacy. strategies so his preferences and/or privacy are most respected, and Therefore, we propose to (1) Filter/transform personal data, and/or (3) sensitive data protection is a major key to consider while trans- (2) encrypt data before sending it to the upper layer (i.e. Cloud mitting information through different layers of the system model. services). Many existing security schemes can be used in this fog- Hence, each layer is responsible to satisfy the objectives bellow. inspired architecture. For instance, SKES-Fog can be implemented We explain hereafter how the design of the proposed architecture in the proposed system model as the architecture could be pre- offers flexibility and privacy for the user. We also discuss how to sented using domains as suggested in [14]. Besides, data filtering overcome open challenges related to the same objectives. Figure 2 or transformation allows to delete unnecessary data during the depicts the drivers (left side) and challenges (right side) for each decision making process (e.g., user’s identity). Later, the interaction layer of the proposed architecture. layer will assign the anonymized data to its corresponding worker to send accurate recommendations (based on the decisions from 4.1 Sensing layer the Intensive Computing and Early Stage Computing layers). Transforming the digital workplace to pursue wellness and sustain- ability in these spaces involves quantifying physical metrics of both 4.3 Intensive computing and storage layer the employees and their interaction with the work environment. The Intensive Computing and Storage Layer takes advantage of Work environments are especially challenging scenarios when the power of Cloud computing infrastructures where: (1) the great technology is the primary way to collect data and obtain informa- amount of collected data is stored as a whole to be all exploited and tion about the workers. First, it must preserve their privacy and analysed for accurate decisions, (2) all the sensed data transmitted 13 CPSS2019, October, 2019, Bilbao, Spain F. Z. Benhamida, et al. from the Early Stage Computing Layer are aggregated, (3) work- place recommendations are inferred by using a Learning Classifier System, and (4) rules are forwarded to both Early Stage Computing Worker-Workplace Interaction and Interaction layers, which will merge all data (protected and Communicate Recommendations Layer HCI Strategy aggregated) and then use a strategy to communicate recommenda- tions to the workers. The Intensive Computing and Storage Layer allows to run com- Intensive Computing & Storage plex algorithms and use a huge amount of data to make accurate strong/cross recommendations Layer Complexity of decision making decisions. Some of Learning Classifier Systems could be based on KNN (K-Nearest Neighbors) [16], LSDT for reinforcement learning [30], etc. Early Stage Computing Layer However, in view of the sensitivity of the information shared in Early/local decisions Limited computations Fog/Cloud applications, safety and availability are sine qua non con- ditions for the development and adoption of both Early Stage and Intensive Computing layers. Security schemes proposed in previous Sensing layer User Resilience Collect data Privacy sections cover data privacy for Fog and Cloud architectures, and hence, can also be applied for both layers in the proposed system. 4.4 Worker-workplace interaction layer Figure 2: Drivers and Challenges of the proposed architec- Besides the technological requirements of the architecture that sup- ture ports this system, the central pillar of the strategy goes through en- gaging the users and leading them to appropriate lifestyle changes. increasing rates of participation and attachment levels that will In particular, the habits and behaviours that we maintain in the contribute to bringing health-awareness and energy efficiency to workplace are very entrenched and our tendency is to concentrate the workplace. There are many directions for future research that on our tasks and leave other factors aside. Thus, any system or have arisen as a result of this proposed architecture. On the one architecture designed to promote new habits in these spaces needs side, find a middleware based on micro-services that can hold and to consider the role of the user as a key factor. orchestrate the proposal investigating the work that Pore et al. [42] The basis of the change-management process are the way the carried on in design issues for Fog and Edge middlewares. On the information used as an awareness mechanism and how this infor- other side, formally model the different classification or inference mation is provided to the workers. In particular, information needs tasks within a digital workplace to better understand the way a to be delivered effectively and digital feedback is an appropriate DSS can decide where (Edge / CLoud ) and how to compute (Serial way to influence i n t he r eceiver [ 21]. I n t his p roposal, t he role On-the-fly / Parallelization) the incoming sensitive data. of the user is boosted by the Worker-Workplace layer, in charge of optimizing the interaction between the users and the system through contextualized feedback [12] and privacy-based user inten- ACKNOWLEDGMENTS tions [49]. The former pursues involving the workers in the process This work has been partially funded by the Aristos Campus Mundus and influencing their behaviour through the application of tech- under research grant ACM2019_25. nological persuasion techniques that increase their engagement and motivation. The latter allows the user to expresses the data REFERENCES a user want to preserve and a set of requirements which have to [1] Israel T Agaku, Akinyele O Adisa, Olalekan A Ayo-Yusuf, and Gregory N Connolly. 2013. Concern about security and privacy, and perceived control over collection be accomplished to this endeavour. The user will be always able and use of health information are related to withholding of health information to supervise the whole procedure in a reliable and understandable from healthcare providers. Journal of the American Medical Informatics Association manner. 21, 2 (2013), 374–378. [2] Ritu Agarwal, Guodong Gao, Catherine DesRoches, and Ashish K Jha. 2010. Research commentaryâĂŤThe digital transformation of healthcare: Current 5 CONCLUSION AND DISCUSSION status and the road ahead. Information Systems Research 21, 4 (2010), 796–809. [3] E. Ahmed, I. Yaqoob, A. Gani, M. Imran, and M. Guizani. 2016. Internet-of- In this work, we have presented an easily deployable platform to things-based smart environments: state of the art, taxonomy, and open research challenges. IEEE Wireless Communications 23, 5 (October 2016), 10–16. improve energy efficiency and user wellness by transforming the [4] Ifeoma Ajunwa, Kate Crawford, and Jason Schultz. 2017. Limitless worker surveil- digital workplace. Beyond the addressed technological challenges lance. Cal. L. Rev. 105 (2017), 735. of the proposal, succeeding in the creation of this kind of smart [5] Eileen Appelbaum and Rosemary L Batt. 1994. The new American workplace: Transforming work systems in the United States. Cornell University Press. spaces needs to overcome additional barriers regarding the privacy [6] Saul J Berman. 2012. Digital transformation: opportunities to create new business concerns of the collected data and the lack of adherence of the models. Strategy & Leadership 40, 2 (2012), 16–24. target audience. Therefore, this work seeks to boost the effective- [7] Nouha Blagui. 2017. The main points to consider regarding digital work- place evolution (Infographic). https://www.exoplatform.com/blog/2017/05/ ness of technology-based interventions by providing an improved 16/infographic-the-evolution-of-digital-workplace-technology-2/ interaction framework through personalized and context-aware [8] Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog Computing and Its Role in the Internet of Things. In Proceedings of the First services. In essence, our approach states that improving how work- Edition of the MCC Workshop on Mobile Cloud Computing (MCC ’12). ACM, New ers interact with the system and ensuring their privacy leads to York, NY, USA, 13–16. https://doi.org/10.1145/2342509.2342513 14 SmartWorkplace: A Privacy-based Fog Computing Approach to Boost Energy CPSS2019, October 22, 2019, Bilbao, Spain Efficiency andWellness in DigitalWorkplaces [9] Judy Bowen, Annika Hinze, Christopher Griffiths, Vimal Kumar, and David Bain- [31] Thomas Léauté and Boi Faltings. 2013. Protecting privacy through distributed bridge. 2017. Personal Data Collection in the Workplace: Ethical and Technical computation in multi-agent decision making. Journal of Artificial Intelligence Challenges. In British Human Computer Interaction Conference,(BHCI). Research 47 (2013), 649–695. [10] John P Buckley, Alan Hedge, Thomas Yates, Robert J Copeland, Michael Loose- [32] Yehida Lindell. 2005. Secure multiparty computation for privacy preserving data more, Mark Hamer, Gavin Bradley, and David W Dunstan. 2015. The sedentary mining. In Encyclopedia of Data Warehousing and Mining. IGI Global, 1005–1009. office: a growing case for change towards better health and productivity. Ex- [33] Ann Majchrzak, M Lynne Markus, and Jonathan Wareham. 2016. Designing for pert statement commissioned by Public Health England and the Active Working digital transformation: Lessons for information systems research from the study Community Interest Company. Br J Sports Med (2015), bjsports–2015. of ICT and societal challenges. MIS quarterly 40, 2 (2016), 267–277. [11] Zhe Cao, Ginés Hidalgo, Tomas Simon, Shih-En Wei, and Yaser Sheikh. 2018. [34] Zahra Sedighi Maman, Mohammad Ali Alamdar Yazdi, Lora A Cavuoto, and OpenPose: Realtime Multi-Person 2D Pose Estimation using Part Affinity Fields. Fadel M Megahed. 2017. A data-driven approach to modeling physical fatigue in CoRR abs/1812.08008 (2018). arXiv:1812.08008 http://arxiv.org/abs/1812.08008 the workplace using wearable sensors. Applied ergonomics 65 (2017), 515–529. [12] Diego Casado-Mansilla, Pablo Garaizar, Diego López-de Ipina, et al. 2018. Design- [35] Evan Morgan, Lynda Webb, Kate Carter, and Nigel Goddard. 2018. Co-Designing insights for Devising Persuasive IoT Devices for Sustainability in the Workplace. a Device for Behaviour-Based Energy Reduction in a Large Organisation. Pro- In 2018 Global Internet of Things Summit (GIoTS). IEEE, 1–6. ceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 125. [13] Diego Casado-Mansilla, Ioannis Moschos, Oihane Kamara-Esteban, Apostolos [36] World Health Organization et al. 2010. Healthy workplaces: a model for action: C. Tsolakis, Cruz E. Borges, Stelios Krinidis, Ane Irizar-Arrieta, Konstantinos for employers, workers, policy-makers and practitioners. (2010). Kitsikoudis, Ander Pijoan, Dimitrios Tzovaras, and Diego López-de Ipiña. 2018. A [37] World Health Organization et al. 2017. Promoting a healthy lifestyle at the Human-centric & Context-aware IoT Framework for Enhancing Energy Efficiency workplace-be the change. (2017). in Buildings of Public Use. IEEE Access 6, 1 (2018), 31444–31456. https://doi.org/ [38] Neville Owen, Geneviève N Healy, Charles E Matthews, and David W Dunstan. 10.1109/ACCESS.2018.2837141 2010. Too much sitting: the population-health science of sedentary behavior. [14] Y. Challal, F. Z. Benhamida, and O. Nouali. 2018. Scalable Key Management Exercise and sport sciences reviews 38, 3 (2010), 105. for Elastic Security Domains in Fog Networks. In 2018 IEEE 27th International [39] Scott J Pedersen, Paul D Cooley, and Casey Mainsbridge. 2014. An e-health Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises intervention designed to increase workday energy expenditure by reducing (WETICE). 187–192. https://doi.org/10.1109/WETICE.2018.00043 prolonged occupational sitting habits. Work 49, 2 (2014), 289–295. [15] Allan Collins and Richard Halverson. 2018. Rethinking education in the age of [40] Sarah Perez. 2012. Forrester: 66% Of Employees Use 2 Or More Devices At Work, technology: The digital revolution and schooling in America. Teachers College 12% Use Tablets. https://techcrunch.com/2012/10/10/forrester-66-of-employees- Press. use-2-or-more-devices-at-work-12-use-tablets [16] M. Connor and P. Kumar. 2010. Fast construction of k-nearest neighbor graphs [41] Daniel Podgórski, Katarzyna Majchrzycka, Anna Dąbrowska, Grzegorz Gralewicz, for point clouds. IEEE Transactions on Visualization and Computer Graphics 16, 4 and Małgorzata Okrasa. 2017. Towards a conceptual framework of OSH (July 2010), 599–608. https://doi.org/10.1109/TVCG.2010.9 risk management in smart working environments based on smart PPE, [17] Julia Faucett and Dolores McCarthy. 2003. Chronic pain in the workplace. The ambient intelligence and the Internet of Things technologies. Interna- Nursing clinics of North America 38, 3 (September 2003), 509–523. tional Journal of Occupational Safety and Ergonomics 23, 1 (2017), 1–20. [18] Oihane Gomez-Carmonaa, Diego Casado-Mansillaa, and Javier Garcıa-Zubiab. arXiv:https://doi.org/10.1080/10803548.2016.1214431 2019. Opportunities and Challenges of Technology-ased Interventions to Increase [42] Madhurima Pore, Vinaya Chakati, Ayan Banerjee, and SK Gupta. 2019. Middle- Health-wareness in the Workplace. Transforming Ergonomics with Personalized ware for fog and edge computing: Design issues. In Fog and Edge Computing: Health and Intelligent Workplaces 25 (2019), 33. Principles and Paradigms. Wiley. [19] Katrin Hänsel. 2016. Wearable and ambient sensing for well-being and emotional [43] Susan A Randolph. 2017. Computer vision syndrome. Workplace health & safety awareness in the smart workplace. In Proceedings of the 2016 ACM International 65, 7 (2017), 328–328. Joint Conference on Pervasive and Ubiquitous Computing: Adjunct. ACM, 411–416. [44] CC Roossien, J Stegenga, AP Hodselmans, SM Spook, W Koolhaas, S Brouwer, GJ [20] Alexander Hars. 2015. Self-Driving Cars: The Digital Transformation of Mobility. Verkerke, and Michiel F Reneman. 2017. Can a smart chair improve the sitting Springer Berlin Heidelberg, Berlin, Heidelberg, 539–549. https://doi.org/10.1007/ behavior of office workers? Applied ergonomics 65 (2017), 355–361. 978-3-662-43782-7_57 [45] Florian Schaule, Jan Ole Johanssen, Bernd Bruegge, and Vivian Loftness. 2018. [21] Sander Hermsen, Jeana Frost, Reint Jan Renes, and Peter Kerkhof. 2016. Using Employing Consumer Wearables to Detect Office Workers’ Cognitive Load for feedback through digital technology to disrupt and change habitual behavior: Interruption Management. Proceedings of the ACM on Interactive, Mobile, Wearable a critical review of current literature. Computers in Human Behavior 57 (2016), and Ubiquitous Technologies 2, 1 (2018), 32. 61–74. [46] Ghasson Shabha. 2006. A critical review of the impact of embedded smart sensors [22] Andreas Holtermann, Vera Schellewald, Svend Erik Mathiassen, Nidhi Gupta, on productivity in the workplace. Facilities 24, 13/14 (2006), 538–549. Andrew Pinder, Anne Punakallio, Kaj Bo Veiersted, Britta Weber, Esa-Pekka [47] WC Taylor, RR Suminski, BM Das, RJ Paxton, and DW Craig. 2018. Organizational Takala, Francesco Draicchio, et al. 2017. A practical guidance for assessments of Culture and Implications for Workplace Interventions to Reduce Sitting Time sedentary behavior at work: A PEROSH initiative. Applied ergonomics 63 (2017), Among Office-Based Workers: A Systematic Review. Front. Public Health 6 (2018), 41–52. 263. [23] Yitong Huang, Steve Benford, and Holly Blake. 2019. Digital Interventions to [48] Alp Ustundag and Emre Cevikcan. 2017. Industry 4.0: managing the digital Reduce Sedentary Behaviors of Office Workers: Scoping Review. Journal of transformation. Springer. medical Internet research 21, 2 (2019), e11079. [49] Mario Vega-Barbas, Diego Casado-Mansilla, Miguel A Valero, Diego López-de [24] Ane Irizar-Arrieta and Diego Casado-Mansilla. [n. d.]. COPING WITH USER Ipina, José Bravo, and Francisco Flórez. 2012. Smart spaces and smart objects DIVERSITY: UX INFORMS THE DESIGN OF A DIGITAL INTERFACE THAT interoperability architecture (S3OiA). In 2012 Sixth International Conference on ENCOURAGES SUSTAINABLE BEHAVIOUR. ([n. d.]). Innovative Mobile and Internet Services in Ubiquitous Computing. IEEE, 725–730. [25] Ane Irizar-Arrieta, Diego Casado-Mansilla, and Aiur Retegi. 2018. Accounting [50] Gordon Waddell and A Kim Burton. 2001. Occupational health guidelines for the for User Diversity in the Design for Sustainable Behaviour in Smart Offices. In management of low back pain at work: evidence review. Occupational medicine 2018 3rd International Conference on Smart and Sustainable Technologies (SpliTech). 51, 2 (2001), 124–135. IEEE, 1–6. [51] Wenbing Zhao, Roanna Lun, Connor Gordon, Abou-Bakar M Fofana, Deborah D [26] Paulino Jimenez and Anita Bregenzer. 2018. Integration of eHealth tools in the Espy, M Ann Reinthal, Beth Ekelman, Glenn D Goodman, Joan E Niederriter, and process of workplace health promotion: proposal for design and implementation. Xiong Luo. 2017. A human-centered activity tracking system: Toward a healthier Journal of medical Internet research 20, 2 (2018), e65. workplace. IEEE Transactions on Human-Machine Systems 47, 3 (2017), 343–355. [27] Li Jönsson, Loove Broms, and Cecilia Katzeff. 2010. Watt-Lite: energy statistics [52] Kevin Zhu, Shutao Dong, Sean Xin Xu, and Kenneth L Kraemer. 2006. Innovation made tangible. In Proceedings of the 8th ACM Conference on Designing Interactive diffusion in global contexts: determinants of post-adoption digital transformation Systems. ACM, 240–243. of European companies. European journal of information systems 15, 6 (2006), [28] Haji Omid Kalte, Mansour Ziaei, Hossein Najafi, Atiyeh Karami, Arash Ak- 601–616. barzadeh, Iman Ahmadnezhad, and Mohsen Karchani. 2014. Use of the Finnish method to quantify the ergonomic properties in an office environment among the workplaces in an Electricity Distribution Company in West Tehran Province. Electronic physician 6, 1 (2014), 779. [29] Saad Khan, Simon Parkinson, and Yongrui Qin. 2017. Fog computing security: a review of current applications and security solutions. Journal of Cloud Computing 6, 1 (2017), 19. [30] Michail G Lagoudakis and Ronald Parr. 2003. Least-squares policy iteration. Journal of machine learning research 4, Dec (2003), 1107–1149. 15