{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T09:38:44Z","timestamp":1775986724845,"version":"3.50.1"},"reference-count":116,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T00:00:00Z","timestamp":1648944000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union\u2019s Horizon 2020","award":["871477"],"award-info":[{"award-number":["871477"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The enforcement of the GDPR in May 2018 has led to a paradigm shift in data protection. Organizations face significant challenges, such as demonstrating compliance (or auditability) and automated compliance verification due to the complex and dynamic nature of consent, as well as the scale at which compliance verification must be performed. Furthermore, the GDPR\u2019s promotion of data protection by design and industrial interoperability requirements has created new technical challenges, as they require significant changes in the design and implementation of systems that handle personal data. We present a scalable data protection by design tool for automated compliance verification and auditability based on informed consent that is modeled with a knowledge graph. Automated compliance verification is made possible by implementing a regulation-to-code process that translates GDPR regulations into well-defined technical and organizational measures and, ultimately, software code. We demonstrate the effectiveness of the tool in the insurance and smart cities domains. We highlight ways in which our tool can be adapted to other domains.<\/jats:p>","DOI":"10.3390\/s22072763","type":"journal-article","created":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T06:04:01Z","timestamp":1648965841000},"page":"2763","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":56,"title":["Data Protection by Design Tool for Automated GDPR Compliance Verification Based on Semantically Modeled Informed Consent"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3905-7878","authenticated-orcid":false,"given":"Tek Raj","family":"Chhetri","sequence":"first","affiliation":[{"name":"Semantic Technology Institute (STI), Department of Computer Science, University of Innsbruck, 6020 Innsbruck, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4512-5969","authenticated-orcid":false,"given":"Anelia","family":"Kurteva","sequence":"additional","affiliation":[{"name":"Semantic Technology Institute (STI), Department of Computer Science, University of Innsbruck, 6020 Innsbruck, Austria"}]},{"given":"Rance J.","family":"DeLong","sequence":"additional","affiliation":[{"name":"The Open Group, Reading, Berkshire RG1 1AX, UK"}]},{"given":"Rainer","family":"Hilscher","sequence":"additional","affiliation":[{"name":"Semantic Technology Institute (STI), Department of Computer Science, University of Innsbruck, 6020 Innsbruck, Austria"},{"name":"Center for Data Science, RTI International, Research Triangle Park, NC 27709, USA"}]},{"given":"Kai","family":"Korte","sequence":"additional","affiliation":[{"name":"Institut f\u00fcr Rechtsinformatik (IRI), Leibniz Universit\u00e4t Hannover, 30167 Hannover, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1391-7104","authenticated-orcid":false,"given":"Anna","family":"Fensel","sequence":"additional","affiliation":[{"name":"Semantic Technology Institute (STI), Department of Computer Science, University of Innsbruck, 6020 Innsbruck, Austria"},{"name":"Wageningen Data Competence Center, Wageningen University & Research, 6708 PB Wageningen, The Netherlands"},{"name":"Consumption and Healthy Lifestyles Chair Group, Wageningen University & Research, 6706 KN Wageningen, The Netherlands"}]}],"member":"1968","published-online":{"date-parts":[[2022,4,3]]},"reference":[{"key":"ref_1","unstructured":"European Parliament and Council (2021, December 03). Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and REPEALING DIRective 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union, L119. Available online: https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Mangini, V., Tal, I., and Moldovan, A.N. (2020, January 25\u201328). An empirical study on the impact of GDPR and right to be forgotten-organisations and users perspective. Proceedings of the 15th International Conference on Availability, Reliability and Security, Event, Ireland.","DOI":"10.1145\/3407023.3407080"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Rhahla, M., Allegue, S., and Abdellatif, T. (2019, January 29\u201331). A framework for GDPR compliance in big data systems. Proceedings of the International Conference on Risks and Security of Internet and Systems, Hammamet, Tunisia.","DOI":"10.1007\/978-3-030-41568-6_14"},{"key":"ref_4","first-page":"787","article-title":"Design Challenges for GDPR RegTech","volume":"Volume 2","author":"Ryan","year":"2020","journal-title":"Proceedings of the 22nd International Conference on Enterprise Information Systems, ICEIS"},{"key":"ref_5","unstructured":"Zheng, Z., Dai, H.N., Tang, M., and Chen, X. (2020). Enhancing User Privacy in IoT: Integration of GDPR and Blockchain. Blockchain and Trustworthy Systems, Springer."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Ryan, P., Crane, M., and Brennan, R. (2021, January 26\u201328). GDPR Compliance tools: Best practice from RegTech. Proceedings of the International Conference on Enterprise Information Systems, Online.","DOI":"10.1007\/978-3-030-75418-1_41"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Merlec, M.M., Lee, Y.K., Hong, S.P., and In, H.P. (2021). A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR. Sensors, 21.","DOI":"10.3390\/s21237994"},{"key":"ref_8","unstructured":"Sako, K., Schneider, S., and Ryan, P.Y.A. (2019). Monitoring the GDPR. European Symposium on Research in Computer Security, Springer International Publishing."},{"key":"ref_9","unstructured":"(2021, December 12). International Association of Privacy Professionals (IAPP). Available online: https:\/\/iapp.org."},{"key":"ref_10","unstructured":"IAPP (2021, December 08). IAPP-FTI Consulting Privacy Governance Report 2020. Technical Report. Available online: https:\/\/iapp.org\/media\/pdf\/resource_center\/IAPP_FTIConsulting_2020PrivacyGovernanceReport.pdf."},{"key":"ref_11","unstructured":"The smashHit project (2021, December 19). Public Report D1.3 Public Innovation Concept. Available online: https:\/\/www.smashhit.eu\/wp-content\/uploads\/2021\/03\/smashHit_D1.3_Public_Innovation_Concept_v100.pdf."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Verborgh, R., Dimou, A., Hogan, A., d\u2019Amato, C., Tiddi, I., Br\u00f6ring, A., Mayer, S., Ongenae, F., Tommasini, R., and Alam, M. (2021). Improving Decision Making Using Semantic Web Technologies. The Semantic Web: ESWC 2021 Satellite Events, Springer International Publishing.","DOI":"10.1007\/978-3-030-80418-3"},{"key":"ref_13","unstructured":"(2022, January 05). The smashHit EU H2020 Project. Available online: https:\/\/smashhit.eu."},{"key":"ref_14","unstructured":"(2021, December 23). RegTech. Available online: https:\/\/www.regnology.net\/en\/."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Fensel, D., Simsek, U., Angele, K., Huaman, E., K\u00e4rle, E., Panasiuk, O., Toma, I., Umbrich, J., and Wahler, A. (2020). Knowledge Graphs: Methodology, Tools and Selected Use Cases, Springer.","DOI":"10.1007\/978-3-030-37439-6"},{"key":"ref_16","unstructured":"Kurteva, A., Chhetri, T.R., Pandit, H.J., and Fensel, A. (2021). Consent through the lens of semantics: State of the art survey and best practices. Semant. Web, 1\u201327."},{"key":"ref_17","unstructured":"Kirrane, S., Fern\u2019andez, J.D., Bonatti, P., Milosevic, U., Polleres, A., and Wenning, R. (2020). The SPECIAL-K Personal Data Processing Transparency and Compliance Platform. arXiv."},{"key":"ref_18","unstructured":"(2022, January 02). Introducing JSON. Available online: https:\/\/www.json.org\/json-en.html."},{"key":"ref_19","unstructured":"(2021, December 27). JSON Web Tokens (JWT). Available online: https:\/\/jwt.io."},{"key":"ref_20","unstructured":"van Rossum, G., and Barry Warsaw, N.C. (2022, January 10). PEP 8\u2014Style Guide for Python Code. Available online: hhttps:\/\/www.python.org\/dev\/peps\/pep-0008\/."},{"key":"ref_21","unstructured":"(2022, January 07). GraphDB. Available online: https:\/\/graphdb.ontotext.com."},{"key":"ref_22","unstructured":"(2021, December 10). MongoDB. Available online: https:\/\/www.mongodb.com."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Ko\u00e7, \u00c7.K., \u00d6zdemir, F., and \u00d6demi\u015f \u00d6zger, Z. (2021). Rivest-Shamir-Adleman Algorithm. Partially Homomorphic Encryption, Springer.","DOI":"10.1007\/978-3-030-87629-6"},{"key":"ref_24","first-page":"1","article-title":"Advanced encryption standard","volume":"6","author":"Selent","year":"2010","journal-title":"Rivier Acad. J."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Tonetta, S., Schoitsch, E., and Bitsch, F. (2017). Automated Legal Compliance Checking by Security Policy Analysis. Computer Safety, Reliability, and Security, Springer International Publishing.","DOI":"10.1007\/978-3-319-66266-4"},{"key":"ref_26","unstructured":"Parliament, E. (2022, January 02). European Data Protection Directive (EU DPD). Available online: https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A31995L0046."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Poels, G., Gailly, F., Serral Asensio, E., and Snoeck, M. (2017). Toward GDPR-Compliant Socio-Technical Systems: Modeling Language and Reasoning Framework. The Practice of Enterprise Modeling, Springer International Publishing.","DOI":"10.1007\/978-3-319-70241-4"},{"key":"ref_28","unstructured":"Dalpiaz, F., Paja, E., and Giorgini, P. (2016). Security Requirements Engineering: Designing Secure Socio-Technical Systems, MIT Press."},{"key":"ref_29","unstructured":"Westphal, P., Fernandez Garcia, J.D., Kirrane, S., and Lehmann, J. (2018, January 10\u201313). SPIRIT: A semantic transparency and compliance stack. Proceedings of the 14th International Conference on Semantic Systems, Vienna, Austria."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1007\/s10115-018-1248-0","article-title":"The big data system, components, tools, and technologies: A survey","volume":"60","author":"Rao","year":"2019","journal-title":"Knowl. Inf. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s41125-019-00042-z","article-title":"A framework for GDPR compliance for small-and medium-sized enterprises","volume":"4","author":"Brodin","year":"2019","journal-title":"Eur. J. Secur. Res."},{"key":"ref_32","first-page":"165","article-title":"Blockchain-based consent manager for GDPR compliance","volume":"2019","author":"Camilo","year":"2019","journal-title":"Open Identity Summit"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Davari, M., and Bertino, E. (2019, January 9\u201312). Access Control Model Extensions to Support Data Privacy Protection based on GDPR. Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA.","DOI":"10.1109\/BigData47090.2019.9006455"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2699444","article-title":"Monitoring Metric First-Order Temporal Properties","volume":"62","author":"Basin","year":"2015","journal-title":"J. ACM (JACM)"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Basin, D., Harvan, M., Klaedtke, F., and Z\u0103linescu, E. (2011). MONPOLY: Monitoring usage-control policies. International Conference on Runtime Verification, Springer.","DOI":"10.1109\/TIME.2011.14"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Piras, L., Al-Obeidallah, M.G., Praitano, A., Tsohou, A., Mouratidis, H., Crespo, B.G.N., Bernard, J.B., Fiorani, M., Magkos, E., and Sanz, A.C. (2019, January 26\u201329). DEFeND architecture: A privacy by design platform for GDPR compliance. Proceedings of the International Conference on Trust and Privacy in Digital Business, Linz, Austria.","DOI":"10.1007\/978-3-030-27813-7_6"},{"key":"ref_37","unstructured":"(2021, December 27). The DEFeND Project. Available online: https:\/\/www.defendproject.eu."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1746","DOI":"10.1109\/TIFS.2019.2948287","article-title":"GDPR-Compliant Personal Data Management: A Blockchain-Based Solution","volume":"15","author":"Truong","year":"2020","journal-title":"Trans. Inf. Forensics Secur."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"119697","DOI":"10.1109\/ACCESS.2020.3005509","article-title":"GDPR Compliance Verification in Internet of Things","volume":"8","author":"Barati","year":"2020","journal-title":"IEEE Access"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Basin, D., Debois, S., and Hildebrandt, T. (2018). On Purpose and by Necessity: Compliance Under the GDPR. Financial Cryptography, Springer.","DOI":"10.1007\/978-3-662-58387-6_2"},{"key":"ref_41","unstructured":"(2021, October 07). Ethereum. Available online: https:\/\/ethereum.org\/en\/."},{"key":"ref_42","unstructured":"Data and Knowledge Group, University of Oxford (2021, October 20). HermiT OWL Reasoner. Available online: http:\/\/www.hermit-reasoner.com."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s13218-020-00677-4","article-title":"Machine Understandable Policies and GDPR Compliance Checking","volume":"34","author":"Bonatti","year":"2020","journal-title":"KI-K\u00fcnstliche Intell."},{"key":"ref_44","unstructured":"Bechhofer, S., van Harmelen, F., Hendler, J., Horrocks, I., McGuinness, D.L., Patel-Schneider, P.F., and Stein, L.A. (2021, December 20). OWL Web Ontology Language. Available online: https:\/\/www.w3.org\/TR\/owl-ref\/."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Bonatti, P.A. (2018, January 13\u201319). Fast Compliance Checking in an OWL2 Fragment. Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, IJCAI-18, International Joint Conferences on Artificial Intelligence Organization, Stockholm, Sweden.","DOI":"10.24963\/ijcai.2018\/241"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Mahindrakar, A., and Joshi, K.P. (2020, January 25\u201327). Automating GDPR Compliance using Policy Integrated Blockchain. Proceedings of the 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), Baltimore, MD, USA.","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00026"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Barati, M., and Rana, O. (2020). Tracking GDPR Compliance in Cloud-based Service Delivery. IEEE Trans. Serv. Comput., 1.","DOI":"10.1109\/SERVICES51467.2021.00013"},{"key":"ref_48","unstructured":"Data Protection Vocabularies and Controls W3C Community Group (2022, January 04). Data Privacy Vocabulary (DPV). Available online: https:\/\/github.com\/dpvcg\/dpv."},{"key":"ref_49","unstructured":"Lebo, T., Sahoo, S., McGuinness, D., Belhajjame, K., Cheney, J., Corsar, D., Garijo, D., Soiland-Reyes, S., Zednik, S., and Zhao, J. (2013). PROV-O: The PROV Ontology, W3C Recommendation, World Wide Web Consortium."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Hamdani, R.E., Mustapha, M., Amariles, D.R., Troussel, A., Mee\u00f9s, S., and Krasnashchok, K. (2021, January 21\u201325). A Combined Rule-Based and Machine Learning Approach for Automated GDPR Compliance Checking. Proceedings of the Eighteenth International Conference on Artificial Intelligence and Law, S\u00e3o Paulo, Brazil.","DOI":"10.1145\/3462757.3466081"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Wilson, S., Schaub, F., Dara, A., Liu, F., Cherivirala, S., Leon, P., Andersen, M., Zimmeck, S., Sathyendra, K., and Russell, N. (2016, January 7\u201312). The Creation and Analysis of a Website Privacy Policy Corpus. Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, Berlin, Germany.","DOI":"10.18653\/v1\/P16-1126"},{"key":"ref_52","unstructured":"GDPR (2021, December 20). Data Protection Impact Assessments, Article 35 of GDPR. Available online: https:\/\/gdpr-info.eu\/art-35-gdpr\/."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Daoudagh, S., Marchetti, E., Savarino, V., Bernabe, J.B., Garc\u00eda-Rodr\u00edguez, J., Moreno, R.T., Martinez, J.A., and Skarmeta, A.F. (2021). Data Protection by Design in the Context of Smart Cities: A Consent and Access Control Proposal. Sensors, 21.","DOI":"10.3390\/s21217154"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"100733","DOI":"10.1016\/j.jlamp.2021.100733","article-title":"Static checking of GDPR-related privacy compliance for object-oriented distributed systems","volume":"125","author":"Tokas","year":"2022","journal-title":"J. Log. Algebr. Methods Program."},{"key":"ref_55","unstructured":"Conference of the Independent Data Protection Supervisory Authorities of the Federation and the L\u00e4nder (2021, December 15). The Standard Data Protection Model\u2014A Method for Data Protection Advising and Controlling on the Basis of Uniform Protection Goals, Version 2.0b. Available online: https:\/\/www.datenschutzzentrum.de\/uploads\/sdm\/SDM-Methodology_V2.0b.pdf."},{"key":"ref_56","unstructured":"(2022, January 09). smashHitCore Ontology. Available online: https:\/\/smashhiteu.github.io\/smashHitCore\/."},{"key":"ref_57","unstructured":"(2021, November 05). SPARQL Query Language for RDF. Available online: https:\/\/www.w3.org\/TR\/rdf-sparql-query\/."},{"key":"ref_58","unstructured":"(2022, January 05). smashHitCore GraphnDB SPARQL Endpoint. Available online: https:\/\/smashhitactool.sti2.at\/sparql."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Verborgh, R., Dimou, A., Hogan, A., d\u2019Amato, C., Tiddi, I., Br\u00f6ring, A., Mayer, S., Ongenae, F., Tommasini, R., and Alam, M. (2021). Implementing Informed Consent with Knowledge Graphs. The Semantic Web: ESWC 2021 Satellite Events, Springer International Publishing.","DOI":"10.1007\/978-3-030-80418-3"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Bless, C., D\u00f6tlinger, L., Kaltschmid, M., Reiter, M., Kurteva, A., Roa-Valverde, A.J., and Fensel, A. (2021). Raising Awareness of Data Sharing Consent Through Knowledge Graph Visualisation. Further with Knowledge Graphs, IOS Press.","DOI":"10.3233\/SSW210034"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Mazzara, M., and Meyer, B. (2017). Microservices: Yesterday, Today, and Tomorrow. Present and Ulterior Software Engineering, Springer International Publishing.","DOI":"10.1007\/978-3-319-67425-4"},{"key":"ref_62","unstructured":"Subramanian, H., and Raj, P. (2019). Hands-On RESTful API Design Patterns and Best Practices: Design, Develop, and Deploy Highly Adaptable, Scalable, and Secure RESTful Web APIs, Packt Publishing Ltd."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"De Lauretis, L. (2019, January 28\u201331). From Monolithic Architecture to Microservices Architecture. Proceedings of the 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Berlin, Germany.","DOI":"10.1109\/ISSREW.2019.00050"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Hasselbring, W., and Steinacker, G. (2017, January 5\u20137). Microservice Architectures for Scalability, Agility and Reliability in E-Commerce. Proceedings of the 2017 IEEE International Conference on Software Architecture Workshops (ICSAW), Gothenburg, Sweden.","DOI":"10.1109\/ICSAW.2017.11"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Hung, J.C., Yen, N.Y., and Chang, J.W. (2020). Hybrid Encryption. Frontier Computing, Springer.","DOI":"10.1007\/978-981-15-3250-4"},{"key":"ref_66","unstructured":"(2021, December 15). SPARQL 1.1 Query Language. Available online: https:\/\/www.w3.org\/TR\/sparql11-query\/."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1093\/ijlit\/eax024","article-title":"New challenges to personal data processing agreements: Is the GDPR fit to deal with contract, accountability and liability in a world of the Internet of Things?","volume":"26","author":"Lindqvist","year":"2017","journal-title":"Int. J. Law Inf. Technol."},{"key":"ref_68","unstructured":"(2020). Information Technology\u2014Next Generation Access Control (NGAC) (Standard No. INCITS 565-2020). Available online: https:\/\/standards.incits.org\/apps\/group_public\/project\/details.php?project_id=2328."},{"key":"ref_69","unstructured":"(2021, December 09). NoSQL Database. Available online: https:\/\/hostingdata.co.uk\/nosql-database\/."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MS.2020.3023302","article-title":"Serverless Applications: Why, When, and How?","volume":"38","author":"Eismann","year":"2021","journal-title":"IEEE Softw."},{"key":"ref_71","unstructured":"Atlas Database (2021, December 10). Deploy a Multi-Cloud Database. Available online: https:\/\/www.mongodb.com\/atlas\/database."},{"key":"ref_72","unstructured":"(2021, December 06). Amazon Web Services (AWS). Available online: https:\/\/aws.amazon.com."},{"key":"ref_73","unstructured":"(2021, December 06). Kubernetes. Available online: https:\/\/kubernetes.io."},{"key":"ref_74","unstructured":"(2021, December 06). Linode. Available online: https:\/\/www.linode.com."},{"key":"ref_75","unstructured":"(2021, December 22). Linux. Available online: https:\/\/www.linux.org."},{"key":"ref_76","unstructured":"(2021, December 04). Ubuntu. Available online: https:\/\/ubuntu.com."},{"key":"ref_77","unstructured":"(2021, December 14). Debian. Available online: https:\/\/www.debian.org."},{"key":"ref_78","unstructured":"(2021, December 01). Python. Available online: https:\/\/www.python.org."},{"key":"ref_79","unstructured":"(2022, January 10). SWI Prolog. Available online: https:\/\/www.swi-prolog.org."},{"key":"ref_80","unstructured":"(2021, December 19). Flask. Available online: https:\/\/flask.palletsprojects.com\/en\/2.0.x\/."},{"key":"ref_81","unstructured":"(2021, December 17). Flask-RESTful. Available online: https:\/\/flask-restful.readthedocs.io\/en\/latest\/."},{"key":"ref_82","unstructured":"(2021, December 28). Flask-SQLAlchemy. Available online: https:\/\/flask-sqlalchemy.palletsprojects.com\/en\/2.x\/."},{"key":"ref_83","unstructured":"(2021, December 10). Requests: HTTP for Humans. Available online: https:\/\/docs.python-requests.org\/en\/latest\/."},{"key":"ref_84","unstructured":"(2021, December 15). Flask-Apispec: Auto-Documenting REST APIs for Flask. Available online: https:\/\/flask-apispec.readthedocs.io\/en\/latest\/."},{"key":"ref_85","unstructured":"(2022, January 09). PyCryptodome. Available online: https:\/\/www.pycryptodome.org\/en\/latest\/src\/introduction.html."},{"key":"ref_86","unstructured":"(2021, December 14). Flask-JWT-Extended\u2019s Documentation. Available online: https:\/\/flask-jwt-extended.readthedocs.io\/en\/stable\/."},{"key":"ref_87","unstructured":"(2021, November 29). FuzzyWuzzy. Available online: https:\/\/github.com\/seatgeek\/fuzzywuzzy."},{"key":"ref_88","unstructured":"(2021, December 18). NLTK. Available online: https:\/\/www.nltk.org."},{"key":"ref_89","unstructured":"(2021, December 15). spaCy: Industrial-Strength Natural Language Processing. Available online: https:\/\/spacy.io."},{"key":"ref_90","unstructured":"(2022, January 04). SPARQL Endpoint Interface to Python. Available online: https:\/\/sparqlwrapper.readthedocs.io\/en\/latest\/."},{"key":"ref_91","unstructured":"(2021, December 07). PyMongo. Available online: https:\/\/pymongo.readthedocs.io\/en\/stable\/."},{"key":"ref_92","unstructured":"(2022, January 04). Docker. Available online: https:\/\/www.docker.com."},{"key":"ref_93","unstructured":"(2021, December 14). SQLite. Available online: https:\/\/sqlite.org\/index.html."},{"key":"ref_94","unstructured":"(2021, December 29). Data Tracker. Available online: https:\/\/datatracker.ietf.org\/doc\/html\/rfc7519."},{"key":"ref_95","unstructured":"(2021, December 19). OpenAPI Initiative. Available online: https:\/\/www.openapis.org."},{"key":"ref_96","unstructured":"(2021, December 11). National Institute of Standards and Technology (NIST), Available online: https:\/\/www.nist.gov."},{"key":"ref_97","unstructured":"(2001). Advanced Encryption Standard (AES) (Standard No. FIPS 197)."},{"key":"ref_98","first-page":"1190","article-title":"Comparison of asymmetric algorithms in cryptography","volume":"3","author":"Garg","year":"2014","journal-title":"J. Comput. Sci. Mob. Comput. (IJCSMC)"},{"key":"ref_99","unstructured":"(2022, January 11). RFC 8017. Available online: https:\/\/www.rfc-editor.org\/info\/rfc8017."},{"key":"ref_100","unstructured":"(2022, January 11). RFC 5208. Available online: https:\/\/www.ietf.org\/rfc\/rfc5208.txt."},{"key":"ref_101","unstructured":"Bellare, M., Rogaway, P., and Wagner, D. (2022, January 05). EAX: A Conventional Authenticated-Encryption Mode. IACR Eprint Archive. Available online: https:\/\/ia.cr\/2003\/069."},{"key":"ref_102","unstructured":"(2021, October 19). Marshmallow: Simplified Object Serialization. Available online: https:\/\/marshmallow.readthedocs.io\/en\/stable\/index.html."},{"key":"ref_103","unstructured":"Becker, M., Malkis, A., and Bussard, L. (2010). S4P: A Generic Language for Specifying Privacy Preferences and Policies, Microsoft Research. Technical Report MSR-TR-2010-32."},{"key":"ref_104","unstructured":"Alex Ellis (2021, December 05). OpenFaas. Available online: https:\/\/blog.alexellis.io\/tag\/openfaas\/."},{"key":"ref_105","unstructured":"(2021, November 10). Ofelia Scheduler. Available online: https:\/\/github.com\/mcuadros\/ofelia."},{"key":"ref_106","first-page":"170","article-title":"A Survey on Performance Analysis of DES; AES and RSA Algorithm along with LSB Substitution Technique","volume":"2","author":"Padmavathi","year":"2013","journal-title":"Int. J. Sci. Res. (IJSR)"},{"key":"ref_107","unstructured":"Nadeem, A., and Javed, M. (2005, January 27-28). A Performance Comparison of Data Encryption Algorithms. Proceedings of the 2005 International Conference on Information and Communication Technologies, Karachi, Pakistan."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.future.2020.03.029","article-title":"CCoDaMiC: A framework for Coherent Coordination of Data Migration and Computation platforms","volume":"109","author":"Dehury","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Kakkar, A., and Farshori, A. (2020). Server-Less Cloud Computing\u2014An Economical Solution for Business Operations. Innovations in Computer Science and Engineering, Springer.","DOI":"10.1007\/978-981-15-2043-3_18"},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Chung, M.T., Quang-Hung, N., Nguyen, M.T., and Thoai, N. (2016, January 27\u201329). Using Docker in high performance computing applications. Proceedings of the 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE), Ha-Long, Vietnam.","DOI":"10.1109\/CCE.2016.7562612"},{"key":"ref_111","unstructured":"(2021, November 01). Kubernetespods. Available online: https:\/\/kubernetes.io\/docs\/concepts\/workloads\/pods\/."},{"key":"ref_112","unstructured":"(2022, January 02). Horizontal Pod Autoscaling. Available online: https:\/\/kubernetes.io\/docs\/tasks\/run-application\/horizontal-pod-autoscale\/."},{"key":"ref_113","unstructured":"(2021, December 11). Locust. Available online: https:\/\/locust.io."},{"key":"ref_114","unstructured":"Data Protection Commissioner (2021, October 06). Self-Assessment Checklist GDPR Readiness Checklist Tools. Available online: https:\/\/www.dataprotection.ie\/en\/organisations\/resources-organisations\/self-assessment-checklist."},{"key":"ref_115","unstructured":"(2021, December 05). Uniitest. Available online: https:\/\/docs.python.org\/3\/library\/unittest.html."},{"key":"ref_116","unstructured":"(2022, January 12). GDPR Compliance Tool. Available online: https:\/\/github.com\/tekrajchhetri\/GDPR_compliance_tool."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/7\/2763\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:49:24Z","timestamp":1760136564000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/7\/2763"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,3]]},"references-count":116,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2022,4]]}},"alternative-id":["s22072763"],"URL":"https:\/\/doi.org\/10.3390\/s22072763","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,3]]}}}