Hydra is affilliated with the following programs and organisations:
The Hydra coordinater FhG FIT is a member of ARTEMISIA, the association for R&D actors in the field of ARTEMIS: Advanced Research & Technology for EMbedded Intelligence and Systems.
The Hydra middleware allows developers to create inclusive applications with a high degree of accessibility for all. The Hydra project supports the Commissions campaign: eInclusion - be part of it!
The Hydra project is part of the Cluster of European projects on the Internet of Things. The Cluster aims to promote a common vision of the Internet of Things.
Why not see the on-line Hydrademo? You can turn on and off devices and follow the energy consumption in real time. Just click on the picture and you see it!
PAW aimed at providing full privacy in an ambient
world by developing privacy protection architecture. It proposed four
categories of privacy:
Protecting a person’s identity
Protecting a person’s personal data
Protecting the actions of an identity
Protecting the instructions or tasks of an identity.
While the first two
categories are clear in meaning, there is a slight difference between
the last two. In the third category the identity is present while the
action is executed (maybe in an untrustworthy environment) while in the
fourth category the identity is not present when
action/tasks/instructions are executed (for example mobile agents). To
provide full privacy, it assumes that for each category adequate
solutions need to be found. Protecting a person’s identity can be
achieved by using pseudo-identities or anonymous connections. The other
three categories of privacy can be achieved by the use of ‘Licenses’
during communication.
PAW
proposes a license language “that allows agents to distribute data
with usage policies in a decentralized architecture”. The framework
does not enforce that the data is used in compliance with the license.
But the agents may be audited by an auditing authority which can be of
any form, such as another agent or even a group of other agents. To
enable auditing, the licenses and actions are stored in such a way that
the auditing authority can access it at any arbitrary point in time.
Actions here can be the transmission of a license or data. Also a model
for proofing is described for an agent to be allowed to perform a
certain action on the data. For that proofing, a scheme is proposed for
securing data accountability based on time stamping and a signature,
which are not maintained by centralized authorities. Thus, each agent
can use a time stamping and signing authority which he trusts.
Relevance to HYDRA:
The advantage of the proposal is the
decentralization, where no central authority for controlling is
necessary. But unfortunately an agent can use data in a way which it is
not allowed to do and can only be held responsible after the misuse of
the data and so this is not ideal for real scenarios.