<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards de ning Data Usage Restrictions in the Built Environment</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>TEKNIKER, Basque Research and Technology Alliance (BRTA) In~aki Goenaga 5</institution>
          ,
          <addr-line>20600 Eibar</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <fpage>37</fpage>
      <lpage>49</lpage>
      <abstract>
        <p>The building sector consumes about 40% of global energy, which is largely caused by buildings' operations. Research showed that providing users with detailed consumption and appliance-usage data may engage them in energy e ciency activities. To do so, data analytic services must be deployed by third parties. These services require a huge amount of data from the users in order to o er high quality services. Nevertheless, users are usually reluctant to share their data especially if its private. This is the case of those measurements performed inside the buildings, as they may be an indicative of the occupants' behaviour. In these scenarios, data sovereignty plays a key role because it provides to data owners a way to de ne data usage requirements and verify their compliance in a trustworthy way. In consequence, the owners' predisposition to exchange their data is expected to increase. This article takes a step forward in the development of a trustworthy ecosystem for the built environment where data sovereignty is provided. Speci cally, an approach is proposed to formally specify data usage requirements for the built environment based on ontologies. Furthermore, this approach has been implemented in a real world home use case.</p>
      </abstract>
      <kwd-group>
        <kwd>Buildings</kwd>
        <kwd>Policy Speci cation</kwd>
        <kwd>Ontology</kwd>
        <kwd>Distributed Data Usage Control</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The European Commission agreed a set of binding legislation inside the EU 2020
package in order to meet the energy sustainability and minimize the climate
change. One of the spotlighted sectors regarding this package is the building
sector which, according to the UNEP (United Nations Environment Programme),
consumes about 40% of global energy and is responsible for 36% of CO2
emissions in the EU. This energy consumption, and specially energy demand peaks,
have a negative impact on operational cost and environmental aspects due to the
carbon-intense generation plants that are deployed to satisfy them [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Certainly,
demand peaks are largely caused by buildings' operations, including space and
water heating, followed by appliances, cooking and lighting [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Demand side management activities such as load curtailment or reallocation
have a huge potential to minimize these peaks, especially in the residential sector
which has traditionally been largely untapped. In this regard, the increasingly
penetration of Renewable Energy Sources (RES) in the energy production side,
and their combination with Demand Response (DR) programs and
improvement in energy storage options, could also contribute to signi cantly reduce
peak demands. DR can be understood as the set of technologies or programs
that concentrate on shifting energy use to help balancing energy supply and
demand [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], and they are introduced into the smart grids so that reliable and
economical operation of power systems are ensured. However, the full
capabilities of the DR are yet to be unlocked in the residential sector. This is mainly
caused by the heterogeneous group of end-users that conform this sector, who
do not easily stay engaged with DR programs.
      </p>
      <p>
        Research showed that providing users with historical consumption
information and detailed appliance-speci c consumption information contributed to the
reduction of the energy consumption in the residential sector [
        <xref ref-type="bibr" rid="ref1 ref10 ref14">14, 10, 1</xref>
        ]. As a
matter of fact, o ering usable and attractive services may further engage users
with DR programs. The quality of these services depends largely both on the
quality and on the amount of data provided by the user. Additionally, shared
data may also be exploited for other purposes apart from energy management,
such as the development of new business models1 including the data
monetization. However, even though home occupants are aware of the bene ts of these
services, they may still be reluctant to share their personal data [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], specially
if data sovereignty is not assured. Data sovereignty is de ned as the self
determination that individuals and organizations have regarding the usage of their
data [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. In order to ensure the sovereignty of exchanged data, a trustworthy
ecosystem must be developed where data usage is controlled in a distributed
way and the data provenance is ensured.
      </p>
      <p>Traditional access control standard XACML2 (eXtensible Access Control
Markup Language) has been established as the de-facto standard for data
control. However, access control mechanisms only provide control at the time of the
request on provider side when the consumer requests a resource in a speci c way
(e.g. write or read). That is, once data access is granted, there is no control over
its usage at consumer systems. In other words, access control is limited to past
and present data restrictions and cannot cope with future control.</p>
      <p>Distributed data usage control extends access control mechanisms by
controlling how data is used by distributed consumers once access is granted as shown
in Figure 1. Moreover, distributed data usage control is not limited to the
fulllment of a set of conditions (e.g. time-based restrictions or usage purpose). As
a matter of fact, it extends to the enforcement of obligations throughout data
usage. These obligations consist in a set of actions that can range from data
modi cations (e.g. anonymization) to system interactions (e.g. data deletion).</p>
    </sec>
    <sec id="sec-2">
      <title>1 https://op.europa.eu/en/publication-detail/-/publication/2d6d436e-4832-11e8</title>
      <p>be1d-01aa75ed71a1/language-en</p>
    </sec>
    <sec id="sec-3">
      <title>2 http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html</title>
      <p>
        Therefore, the development of a trustworthy ecosystem where data sovereignty
is provided must face new challenges [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] related to distributed data usage control
that are not addressed in the access control mechanisms:
{ Data Usage Requirements Speci cation and Implementation: Human-readable
data usage requirements are not directly implementable in scenarios where
data is provided, exchanged and used between machines instead of humans.
Therefore, the compliance with data usage requirements cannot be fully
guaranteed and will only depend on the consumer's trust. To solve this
issue, rst, all possible human-readable data usage requirements must be
speci ed in a formal way as a set of conditions and obligations to be readable
and interpretable by machines. Second, these formal speci ed requirements
must be translated into speci c data usage policy languages in a
technologydependent way. Finally, these policies must be implemented and attached to
the corresponding data at the provider side.
{ Data Usage Policies Enforcement: Distributed data usage control solutions
must be able to enforce all the conditions and obligations that have been
previously speci ed and implemented, in every distributed consumer system.
{ Reliability: Unlike access control, in distributed data usage control, data
usage requirements are enforced at external and distributed systems where
the provider has no control. Therefore, trustworthy guarantees about data
usage requirements compliance must be provided to providers.
      </p>
      <p>The International Data Spaces Association3 (IDSA) is working on the
development of a trustworthy open data platform where business-to-business
relationships can be searched and established to provide and consume data under easily
customised data usage requirements guaranteeing data sovereignty. To reach this
goal, distributed data usage control plays a key role. Therefore, IDSA is working
on the research of the challenges de ned above.</p>
    </sec>
    <sec id="sec-4">
      <title>3 https://www.internationaldataspaces.org/</title>
      <p>This article takes an step towards the development of a trustworthy
ecosystem for the built environment where data sovereignty is provided. Regarding
the aforementioned challenges, focus is placed on the data usage requirements
speci cation. Therefore, data usage requirements implementation, enforcement
and reliability related challenges are out of scope.</p>
      <p>Data usage requirements speci cation recognize three issues to be solved.
Firstly, the formal speci cation of human-readable data usage requirements in
a domain-agnostic way to be readable and interpretable by machines. In
nowadays digitized world, data is provided, exchanged and consumed by machines
instead of humans. Therefore, if human-readable data usage requirements are
not implemented on such machines, there will be no reliable way to guarantee
a provider that its data is actually being used as it was originally agreed.
Secondly, the assets identi cation and speci cation for speci c domains, as data
usage control is oriented to data sets rather than data points. Assets are
economic goods generated by a participant, that can classi ed data points based
on its value and usage requirements among others. These assets, must be
formally speci ed for the corresponding domain. Thirdly, the formal speci cation of
domain-agnostic data usage requirements in speci c domains. In this way, data
usage requirements will be applicable for a speci c domain.</p>
      <p>This article focuses on the formal speci cation of data usage requirements
for the built environment based on IDSA's domain-agnostic approach.</p>
      <p>The rest of the article is structured as follows. Section 2 introduces the
challenges when specifying data usage requirements. Section 3 introduces a use case
to illustrate the data usage control needs in a built environment scenario.
Section 4 describes the proposed approach for satisfying the identi ed needs. Finally,
conclusions of this work are described in Section 5.
2</p>
      <sec id="sec-4-1">
        <title>Data Usage Requirements Speci cation</title>
        <p>Traditionally, textual contracts have been enough for setting data exchange
agreements between business partners. Nevertheless, in nowadays digitized world
where interactions are performed between machines instead of humans, data
usage requirements must be autonomously translated to be machine-understandable.
Otherwise, their compliance cannot be guaranteed. Therefore, higher degrees of
formalization are needed to autonomously negotiate, specify, implement and
enforce data usage requirements. Figure 2 represents di erent degrees of
formalization for data usage requirements. The rst or lowest level of formalization
belongs to traditional human-readable textual-contracts whose limitations have
been previously identi ed. The second level comprises the descriptive policies
which refer to machine-readable representations of these contracts (e.g. in JSON
or XML format). However, the content of these policies must be manually
translated to be at least interpretable by machines. In the third level, the formal
policies extend these machine-readable policies by including speci cations such
as a consistent semantic provided by, for example, RDFs (Resource
Description Frameworks). Even though formal policies are interpretable by enforcement
points, they must be translated into speci c data usage policy languages of
existing technologies to be enforceable. In the fourth level, the enforceable policies
are made based on translations from formal policies in a technology-dependent
way in order to be autonomous enforceable. Finally, the autonomously
negotiated policies allow the negotiation of data usage requirements without human
interactions. This article focuses on reaching the level of formalization related
to formal policies for the built environment.
The IDSA de nes the IDS Information Model4, a domain-agnostic common
language for the semantic description of the participants and components within the
IDSA, which includes the speci cation of data usage requirements. This Data
usage requirement speci cation is based on the ODRL (Open Digital Rights
Language) Information model 2.25, a W3C recommended policy expression
language that provides a vocabulary and data model for the description of
machinereadable contracts. Moreover, the IDS Information Model extends it towards
data usage control descriptions and enforcement.</p>
        <p>IDSA de ne the concept of contract (ids:Contract ), a subclass of a
Policy (odrl:Policy ), that is an abstract set of rules (ids:Rule) which are
comprised of permissions (ids:Permission), prohibitions (ids:Prohibition ) and duties
(ids:Duty ). Each of these rules describes an action (ids:Action) that stakeholder
(ids:Participant ) might be permitted or prohibited to do on a digital content</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4 https://w3id.org/idsa/core</title>
    </sec>
    <sec id="sec-6">
      <title>5 https://www.w3.org/TR/odrl-model/</title>
      <p>(ids:DigitalContent ) under certain constraints (ids:Constraint ). This basic
contract representation is shown in Figure 3.</p>
      <p>As previously mentioned, the IDS Information Model is generic, with no
commitment to any particular domain. That is, the domain knowledge has to be
modelled or imported from other existing vocabularies. In this article, focus is
placed on the speci cation of data usage requirements for the built environment
to de ne formal policies based on this IDSA's approach.
3</p>
      <sec id="sec-6-1">
        <title>Use Case</title>
        <p>The RESPOND H20206 project aims to deploy an interoperable energy
automation, monitoring and control solution to deliver DR programs at a dwelling,
building and district level to neighborhoods across Europe.</p>
        <p>The use case presented in this article focuses on a home located in the Aran
Islands (Ireland) participating in the RESPOND project (from now on referred to
as Aran 01). In this use case, home occupants are provided with their
householdrelated information via the RESPOND Mobile App7 and they can interact with
the devices deployed in the home such as switching appliances on or o . Among
other relevant information, occupants can visualize the electrical consumption
and comfort measurements during a speci c time (both raw data or summarized
as aggregated data), as well as the recommended optimal electrical
consumption pro le. This optimal pro le is generated taking leverage of di erent data
analytic services developed by technology providers, including the electricity
demand forecasting, renewable energy production forecasting and optimization
services. For the development of these analytic services, technology providers</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>6 http://project-respond.eu/</title>
    </sec>
    <sec id="sec-8">
      <title>7 http://project-respond.eu/personal-energy-performance-assistant-version-1-13</title>
      <p>released/
needs data that must be exchanged between the di erent stakeholders involved
in this process. Therefore, some business relationships needs to be agreed.</p>
      <p>Next, the stakeholders involved in the use case, the assets exchanged and the
established agreements are described.
3.1</p>
      <sec id="sec-8-1">
        <title>Stakeholders</title>
        <p>The stakeholders identi ed in the Aran 01 use case play di erent roles as follows:
{ Owner: The person or company that owns the home or the building.
{ Occupant: The person who lives in the home. He/She may be the owner of
the home or not, if it is rented. He/She is the data owner of the monitored
data on building behaviour and the data consumer of the results received
from the analytic services.
{ Technology Provider: Third parties that provide hardware and/or software
services. They can be classi ed into two di erent categories:</p>
        <p>Data Acquisition Service Providers: The companies that provide the
service needed to obtain and exchange data with other parties, but never
use the data. They are the data providers.</p>
        <p>Analytic Service Providers: The companies that provide data analytic
services based on the data. They are the data consumers of the monitored
data on building behaviour and the data owners/providers of the results
obtained from the analytic services.</p>
        <p>
          Regarding the stakeholders and their roles, the Aran 01 dwellers are the
owners and the occupants of the home. Energomonitor SRO8 from the Czech
Republic, TEKNIKER9 from Spain and Institut Mihajlo Pupin10 (PUPIN) from
Serbia are the technology providers. On the one hand, Energomonitor is a data
acquisition service provider. Even tough Energomonitor provides the devices and
the gateways that make and send measurements to data consumers, the Aran 01
user is the owner of this data. Therefore, the Aran 01 user has the right to de ne
textual contracts related to home data. On the other hand, TEKNIKER and
PUPIN are the analytic service providers. Their services include the generation of
optimized energy pro les for electricity consumption management [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. Moreover,
TEKNIKER o ers comfort services that will provide the average temperature
of the home.
3.2
        </p>
      </sec>
      <sec id="sec-8-2">
        <title>Assets</title>
        <p>The assets are the data sets exchanged between the stakeholders. These, can be
classi ed as follows:
{ Temperature: Measurements related to the temperature in the home which
includes:</p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>8 https://www.energomonitor.com/</title>
    </sec>
    <sec id="sec-10">
      <title>9 https://www.tekniker.es/ 10 http://www.pupin.rs/</title>
      <p>Raw data: The temperature measured by a temperature sensor.
Comfort data: The average temperature of all the temperature sensors
of the home.
{ Electrical Demand: The measurements related to the electricity consumed
by the home which includes:</p>
      <p>Raw data: The electrical demand measured by an electricity meter.
Aggregated data: The average value of raw electrical demand data
aggregated for a given period of time (e.g. 1h).</p>
      <p>Forecast data: The predicted electrical demand based on one-hourly
aggregated electrical demand data.
{ Electrical Production: The measurements related to the electricity produced
by the PV panels installed in the house, which includes:</p>
      <p>Raw data: The electricity produced by the PV panels.</p>
      <p>Forecast data: The predicted electrical production based on the raw
electrical production data.
{ Electrical Optimized Pro le: The optimal electric demand curve with views
to maximizing the renewable energy exploitation and minimizing electric
demand peaks.
3.3</p>
      <sec id="sec-10-1">
        <title>Agreements</title>
        <p>To reach the main goal of the use case, the stakeholders identi ed need to
establish agreements between them for data exchange. Figure 4 shows the assets
exchanged in every agreement between the di erent stakeholders.</p>
        <p>Firstly, the Aran 01 user is the owner of the raw temperature measured every
30 seconds by the temperature sensors deployed in di erent rooms of the home,
the raw electrical demand measured by the electricity meter every 5 seconds
and the raw electrical production of the PV panels measured every hour. The
Aran 01 user establishes a relationship with TEKNIKER and PUPIN for the
exploitation of the data. On the one hand, TEKNIKER needs raw temperature
data to provide the comfort service, and raw electrical demand for generating
electrical demand aggregated data, which will be further used by TEKNIKER
for the electrical demand forecasting service. For that purpose, the Aran 01 user
grants TEKNIKER the raw temperature data usage for comfort purposes and
electrical demand data usage for aggregation purposes, as long as this data is
used before RESPOND project's ending date (i.e. 2021-01-01). Moreover, the
Aran 01 user prohibits TEKNIKER from sharing the raw electrical demand
data. On the other hand, PUPIN needs the electrical production raw data in
order to provide the electrical production forecasting service. For that purpose,
the Aran 01 user grants PUPIN the raw electrical production data usage for
prediction purposes. Similar to the requirements set to TEKNIKER, PUPIN
can only use the data prior to the RESPOND project's ending, and cannot
share the data.</p>
        <p>Secondly, TEKNIKER establishes a relationship with the Aran 01 user for
comfort and forecasted data visualization, and with PUPIN for data
exploitation purposes. On the one hand, the Aran 01 user is only allowed to use the
electrical demand and the for mobile app visualization. Moreover, TEKNIKER
forbids the Aran 01 user from sharing this data. On the other hand, PUPIN
needs the electrical demand forecast data, in order to exploit it for providing the
optimization service. Towards that goal, TEKNIKER allows PUPIN using the
electrical demand forecast data only for optimization purposes, as long as it is
used before the ending of the project. The sharing of this data is forbidden.</p>
        <p>Finally, PUPIN establishes a relationship with the Aran 01 user for sending
the results of the electrical production forecast service and the electrical
optimized pro le, so that they can be visualized in the RESPOND Mobile App. For
this purpose, PUPIN allows the Aran 01 user visualizing the forecasted
electrical production data and the optimized pro le, but the sharing of this data is
prohibited.</p>
        <p>Therefore, as a result of the data exchanged between the di erent
stakeholders, the Aran 01 user can visualize its own data, as well as aggregated, forecasted
and optimized data provided by third parties.
4</p>
        <sec id="sec-10-1-1">
          <title>The RESPOND approach</title>
          <p>
            In order to represent and formalize the use case's data usage requirements, the
IDS Information Model is used. However, as mentioned before, this ontology
domain-agnostic, so it is not enough to represent the assets to which data usage
requirements apply. Therefore, in order to represent all the necessary
information, the RESPOND ontology [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ] is used. The RESPOND ontology's core is
developed by reusing and extending three well-known ontologies: BOT11 [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ]
to represent the dwelling topology, and SAREF12 [
            <xref ref-type="bibr" rid="ref4">4</xref>
            ] and SEAS Feature Of
Interest13 [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ] ontologies to represent devices, features of interest and qualities
monitored and controlled by sensors and smart appliances. However, there were
other RESPOND requirements that remained unsolved and a set of new axioms
had to be de ned to satisfy them by extending the list of appliances, observed
qualities or units of measurement to name a few. Figure 5 shows the main classes
and properties of the RESPOND ontology.
          </p>
          <p>As part of other RESPOND project developments, every participant dwelling
and neighbourhood is represented with appropriate ontological terms. This
information remains accessible in an Openlink Virtuoso Server14 version 07.20.3217
for its further exploitation by other services via SPARQL queries.</p>
          <p>In order to showcase the machine-interpretable de nition of formal policies,
the contract between the Aran 01 user and TEKNIKER (described in the
previous section) has been considered. This contract comprises two rules: a permission
and a prohibition. This is represented with the following triples:
: c o n t r a c t 0 0 2 A Z 6 3 rdf : type ids : Contract ;
ids : p e r mi s s i o n : p e r m i s s i o n 2 5 ;
ids : p r o h i b i t i o n : p r o h i b i t i o n 4 3 .
: p e r m i s s i o n 2 5 rdf : type ids : Pe r m i s s i o n .
: p r o h i b i t i o n 4 3 rdf : type ids : P r o h i b i t i o n .
11 https://w3id.org/bot
12 https://saref.etsi.org/core
13 https://w3id.org/seas/FeatureOfInterestOntology
14 https://virtuoso.openlinksw.com/</p>
          <p>The permission de nes that TEKNIKER can use the Aran 01 user's demand
data for aggregation purposes until the end of the project, that is, prior to the
year 2021. This permission is represented with the following triples:
: permission25 ids : action ids : READ ;
ids : assignee : partner_TEKNIKER ;
ids : assigner : aran_01 :
ids : constraint : constraint_p25_01 ;
ids : constraint : constraint_p25_02 ;
ids : targetContent : aran_01_demand .
: constraint_p25_01 rdf : type ids : Constraint ;
ids : leftOperand ids : purpose ;
ids : operator idsa :EQ;
ids : rightOperand " Aggregation Purposes "^^ xsd : String .
: constraint_p25_02 rdf : type ids : Constraint ;
ids : leftOperand ids : now ;
ids : operator idsa : BEFORE ;
ids : rightOperand "2021 -01 -01 T00 :00:00 Z "^^ xsd : dateTimeStamp .</p>
          <p>As it can be seen, the contract de ned using the IDS Information Model
ontological terms is assigned to the aran 01 demand individual, which represents
the electrical demand of Aran 01. As mentioned before, Aran 01 and the rest of
the RESPOND participant dwellings are described and stored in the Virtuoso
triplestore. Next, a simpli ed RDF representation of Aran 01 is shown:
: irishSite rdf : type bot : Site ;</p>
          <p>bot : hasBuilding : aran_01 .
: aran_01 rdf : type bot : Building ;</p>
          <p>bot : hasElement : aran_01_electricityMeter .
: aran_01_electricityMeter rdf : type saref : Device ;</p>
          <p>saref : measuresProperty : aran_01_demand .
: aran_01_demand rdf : type saref : Property .</p>
          <p>Regarding the second rule of the aforementioned usage restriction, it de nes
that TEKNIKER cannot share the Aran 01 user's electrical demand data. This
rule can be represented with these triples:
: prohibition43 ids : action ids : DISTRIBUTE ;
ids : assignee : partner_TEKNIKER ;
ids : assigner : aran_01 :
ids : targetContent : aran_01_demand .</p>
        </sec>
        <sec id="sec-10-1-2">
          <title>5 Conclusions</title>
          <p>Nowadays, the ine cient operation of buildings makes the building sector
responsible for the consumption of about 40% of the global energy. According to
recent research, this consumption could be reduced if building occupants are
informed about their energy consumption and appliance-usage, as this information
could improve the user engagement in energy e ciency activities. Furthermore,
the data collected by the smart home solutions could then be exploited to provide
users with added-value services to further engage them in this kind of activities.
However, users are not eager to share their data unless data sovereignty is
ensured.</p>
          <p>With the proposed approach, which is based on IDSA's domain-agnostic
data usage requirements speci cation approach, it has been demonstrated that
machine-interpretable formal policies can be de ned in a built environment
scenario for every relationship established between stakeholders. In this way, a step
towards the development of a trustworthy ecosystem in the built environment
has been taken. Therefore, not only B2B data exchange models are boosted, but
also, high-quality analytic services and the energy consumption optimization as
a consequence.
5.1</p>
        </sec>
      </sec>
      <sec id="sec-10-2">
        <title>Future Work</title>
        <p>The presented work paves the way towards future research in two di erent
aspects.</p>
        <p>
          Both practice and research suggests the use of a graph-based format to
capture building data, nevertheless keeping numeric data explicitly out of the
semantic graph for computational performance reasons [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. Without having the
semantic representation of those numeric data, the de nition of assets must be
done at a quality level (e.g. temperature or humidity), thus a more ne-grained
asset de nition is not possible. Therefore, stakeholders cannot specify policies
at a measurement type level (e.g. raw temperature, aggregated temperature or
forecasted temperature data). This research line is worth being further
investigated.
        </p>
        <p>The IDSA approach is limited to the semantic representation of
humanreadable usage control requirements into machine-interpretable policies. In the
line of research related to the automatic speci cation and implementation of
human-readable data usage requirements, two main challenges will be studied.
On the one hand, the development of user-friendly templates which will
autonomously specify the data usage requirements based on the formal speci
cation proposed. On the other hand, before the implementation of data usage
policies in a technology-dependent way, a translation must be done in order
to make speci ed data usage requirements enforceable by speci c technologies.
The LUCON open source usage control technology15 is not able to translate
machine-intepretable policies into enforceable policies. LUCON will be studied in
order to develop a translator which will allow the implementation of
technologydependent policies from the speci ed data usage requirements.
15
https://industrial-data-space.github.io/trusted-connectordocumentation/docs/usage control/</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Abrahamse</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Steg</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vlek</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rothengatter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>The e ect of tailored information, goal setting, and tailored feedback on household energy use, energy-related behaviors, and behavioral antecedents</article-title>
          .
          <source>Journal of environmental psychology 27(4)</source>
          ,
          <volume>265</volume>
          {
          <fpage>276</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Agency</surname>
            ,
            <given-names>I.E.</given-names>
          </string-name>
          : Transition to Sustainable Buildings (
          <year>2013</year>
          ). https://doi.org/https://doi.org/https://doi.org/10.1787/9789264202955-en, https://www.oecd-ilibrary.org/content/publication/9789264202955-en
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. Collins,
          <string-name>
            <given-names>L.D.</given-names>
            ,
            <surname>Middleton</surname>
          </string-name>
          ,
          <string-name>
            <surname>R.H.</surname>
          </string-name>
          :
          <article-title>Distributed demand peak reduction with noncooperative players and minimal communication</article-title>
          .
          <source>IEEE Transactions on Smart Grid</source>
          (
          <year>2018</year>
          ). https://doi.org/10.1109/TSG.
          <year>2017</year>
          .2734113
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Daniele</surname>
          </string-name>
          , L.,
          <string-name>
            <surname>den Hartog</surname>
          </string-name>
          , F.,
          <string-name>
            <surname>Roes</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>Created in close interaction with the industry: the smart appliances reference (saref) ontology</article-title>
          . In: International Workshop Formal Ontologies Meet Industries. pp.
          <volume>100</volume>
          {
          <fpage>112</fpage>
          . Springer (
          <year>2015</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -21545-7 9
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Esnaola-Gonzalez</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Diez</surname>
            ,
            <given-names>F.J.:</given-names>
          </string-name>
          <article-title>Integrating building and iot data in demand response solutions</article-title>
          .
          <source>In: Proceedings of the 7th Linked Data in Architecture and Construction Workshop (LDAC</source>
          <year>2019</year>
          ). vol.
          <volume>2389</volume>
          , pp.
          <volume>92</volume>
          {
          <fpage>105</fpage>
          .
          <string-name>
            <surname>CEUR</surname>
          </string-name>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Esnaola-Gonzalez</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Diez</surname>
            ,
            <given-names>F.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pujic</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jelic</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tomasevic</surname>
            ,
            <given-names>N.:</given-names>
          </string-name>
          <article-title>An arti cial intelligent system for demand response in neighbourhoods</article-title>
          .
          <source>In: Proceedings of the Workshop on Arti cial Intelligence in Power and Energy Systems (AIPES</source>
          <year>2020</year>
          )
          <article-title>(Under Review)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Gil</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arnaiz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Higuero</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Towards assesment of existing frameworks for data usage control: Strength and limitations with respect to current application scenarios</article-title>
          .
          <source>In: IoT Connected World Semantic Interoperability Workshop (IoTCWSI)</source>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Jarke</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Otto</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ram</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Data sovereignty and data space ecosystems</article-title>
          .
          <source>Business Information Systems Engineering</source>
          <volume>61</volume>
          (08
          <year>2019</year>
          ). https://doi.org/10.1007/s12599- 019-00614-2
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Lefrancois</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Planned etsi saref extensions based on the w3c&amp;ogc sosa/ssncompatible seas ontology patterns</article-title>
          .
          <source>In: Proceedings of Workshop on Semantic Interoperability</source>
          and
          <article-title>Standardization in the IoT</article-title>
          , SIS-IoT, (
          <year>July 2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Peschiera</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taylor</surname>
          </string-name>
          , J.E.,
          <string-name>
            <surname>Siegel</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          :
          <article-title>Response{relapse patterns of building occupant electricity consumption following exposure to personal, contextualized and occupant peer network utilization data</article-title>
          .
          <source>Energy and Buildings</source>
          <volume>42</volume>
          (
          <issue>8</issue>
          ),
          <volume>1329</volume>
          {
          <fpage>1336</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Petrova</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pauwels</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Svidt</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jensen</surname>
            ,
            <given-names>R.L.</given-names>
          </string-name>
          :
          <article-title>In search of sustainable design patterns: Combining data mining and semantic data modelling on disparate building data</article-title>
          .
          <source>In: Advances in Informatics and Computing in Civil and Construction Engineering</source>
          , pp.
          <volume>19</volume>
          {
          <fpage>26</fpage>
          . Springer (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Ranade</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beal</surname>
          </string-name>
          , J.:
          <article-title>Distributed control for small customer energy demand management</article-title>
          .
          <source>In: 2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems</source>
          . pp.
          <volume>11</volume>
          {
          <fpage>20</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Rasmussen</surname>
            ,
            <given-names>M.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pauwels</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hviid</surname>
            ,
            <given-names>C.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karlsh</surname>
          </string-name>
          j, J.:
          <article-title>Proposing a central aec ontology that allows for domain speci c extensions</article-title>
          .
          <source>In: Joint Conference on Computing in Construction</source>
          . vol.
          <volume>1</volume>
          , pp.
          <volume>237</volume>
          {
          <issue>244</issue>
          (
          <year>2017</year>
          ). https://doi.org/10.24928/JC3- 2017/0153.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Ueno</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sano</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saeki</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsuji</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>E ectiveness of an energy-consumption information system on energy savings in residential houses based on monitored data</article-title>
          .
          <source>Applied Energy</source>
          <volume>83</volume>
          (
          <issue>2</issue>
          ),
          <volume>166</volume>
          {
          <fpage>183</fpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Warren</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>A review of demand-side management policy in the uk</article-title>
          .
          <source>Renewable and Sustainable Energy Reviews</source>
          <volume>29</volume>
          ,
          <issue>941</issue>
          {
          <fpage>951</fpage>
          (
          <year>2014</year>
          ). https://doi.org/10.1016/j.rser.
          <year>2013</year>
          .
          <volume>09</volume>
          .009
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>