569 research outputs found
Middleware Technologies for Cloud of Things - a survey
The next wave of communication and applications rely on the new services
provided by Internet of Things which is becoming an important aspect in human
and machines future. The IoT services are a key solution for providing smart
environments in homes, buildings and cities. In the era of a massive number of
connected things and objects with a high grow rate, several challenges have
been raised such as management, aggregation and storage for big produced data.
In order to tackle some of these issues, cloud computing emerged to IoT as
Cloud of Things (CoT) which provides virtually unlimited cloud services to
enhance the large scale IoT platforms. There are several factors to be
considered in design and implementation of a CoT platform. One of the most
important and challenging problems is the heterogeneity of different objects.
This problem can be addressed by deploying suitable "Middleware". Middleware
sits between things and applications that make a reliable platform for
communication among things with different interfaces, operating systems, and
architectures. The main aim of this paper is to study the middleware
technologies for CoT. Toward this end, we first present the main features and
characteristics of middlewares. Next we study different architecture styles and
service domains. Then we presents several middlewares that are suitable for CoT
based platforms and lastly a list of current challenges and issues in design of
CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268,
Digital Communications and Networks, Elsevier (2017
Middleware Technologies for Cloud of Things - a survey
The next wave of communication and applications rely on the new services
provided by Internet of Things which is becoming an important aspect in human
and machines future. The IoT services are a key solution for providing smart
environments in homes, buildings and cities. In the era of a massive number of
connected things and objects with a high grow rate, several challenges have
been raised such as management, aggregation and storage for big produced data.
In order to tackle some of these issues, cloud computing emerged to IoT as
Cloud of Things (CoT) which provides virtually unlimited cloud services to
enhance the large scale IoT platforms. There are several factors to be
considered in design and implementation of a CoT platform. One of the most
important and challenging problems is the heterogeneity of different objects.
This problem can be addressed by deploying suitable "Middleware". Middleware
sits between things and applications that make a reliable platform for
communication among things with different interfaces, operating systems, and
architectures. The main aim of this paper is to study the middleware
technologies for CoT. Toward this end, we first present the main features and
characteristics of middlewares. Next we study different architecture styles and
service domains. Then we presents several middlewares that are suitable for CoT
based platforms and lastly a list of current challenges and issues in design of
CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268,
Digital Communications and Networks, Elsevier (2017
EDGE-CoT: next generation cloud computing and its impact on business
Purpose – The main objective of this paper is to analyze the potential impact of future cloud
computing trends on business, from the perspective of specialists in the area.
Design/ methodology/ approach - Qualitative approach that includes literature review and
nine semi-structured interviews with proclaimed influencers and global thought leaders in
cloud computing, highlighting Jeff Barr, Vice President of Amazon Web Services.
Findings -5G networks will enable the emergence of the Edge-CoT architecture, that will
consequently drive the increased application of Artificial Intelligence/ Machine Learning
(AI/ML) and Robotics. The combination of Edge-CoT, Robotics and AI/ML triggers the
development of Smart Cities and Industry 4.0. Simultaneously, Cloud alone will benefit of
increased connectivity and will be the preferred business architecture comparing to EdgeCoT. New industries and businesses will result from the Edge-CoT, and the existing
companies will benefit mainly from an improved customer experience. Major business
challenges triggered by Edge-CoT include workforce re-skilling, promotion of the agile
approach and a cultural shift towards risk-taking.
Research limitations/implications - The research study was limited to the analysis of a
selected set of cloud computing trends. Moreover, the data collection process was limited to
9 cloud experts, hindering a possible generalization.
Originality/value – This study uses a qualitative approach to listen to market experts and
cross with the theoretical findings to date, consequently bringing theory and practice closer
together.Objetivo - O objetivo deste estudo consiste em analisar o potencial impacto das tendências
futuras de cloud computing na gestão das empresas, a partir da visão de especialistas da área.
Metodologia- Abordagem qualitativa que engloba revisão de literatura e nove entrevistas
semiestruturadas com proclamados influencers e lideres globais em cloud computing,
destacando-se Jeff Barr, o Vice-presidente da Amazon Web Services.
Resultado - As redes 5G possibilitarão o surgimento da arquitetura Edge-CoT, que
consequentemente impulsionará o aumento da aplicação de Inteligência Artificial (AI) e
robótica. A combinação de Edge-CoT, Robótica e AI desencadeia o desenvolvimento de
Smart Cities e Industry 4.0. Simultaneamente, a Cloud sozinha beneficiará do aumento da
conectividade e será a arquitetura preferida comparativamente a Edge-CoT. Novos setores e
negócios resultarão do Edge-CoT, e as empresas existentes beneficiarão principalmente de
uma melhor experiência do cliente. Os principais desafios organizacionais desencadeados
pelo Edge-CoT incluem a requalificação da força de trabalho, a adoção da abordagem agile
e uma mudança cultural que estimule experimentos tecnológicos.
Restrição da pesquisa - O processo de recolha de dados foi limitado a 9 especialistas em
cloud computing, dificultando assim uma possÃvel generalização.
Originalidade/ Valor - Este estudo utiliza uma abordagem qualitativa para ouvir os
especialistas do mercado e cruzar com os resultados teóricos até o momento, aproximando
assim a teoria da prática
A New Trust Framework for E-Government in Cloud of Things
The concept of Cloud of Things becomes important for each e-government, facilitating its way of work, increasing its productivity and all that leading to cost savings. It will likely have a significant impact on the e-governments in the future. E-government diversity goals face many challenges. Trust is a major challenge when deploying Cloud of Things in e-government. In this paper, a new trust framework is proposed that supports trust between Internet of Things devices interconnected to the Cloud in order to support e-government services to be delivered in trusted manner. The proposed framework has been applied to a use case study to ensure the trustworthiness of the proposed framework in a real mission. The results show that the proposed trust framework is useful to ensuring a trust environment for Cloud of Things in order to continue providing and gathering data needed to provide services to users through the E-government services
Key Management Scheme for Smart Grid
A Smart Grid (SG) is a modern electricity supply system. It uses information and communication technology (ICT) to run, monitor and control data between the generation source and the end user. It comprises a set of technologies that uses sensing, embedded processing and digital communications to intelligently control and monitor an electricity grid with improved reliability, security, and efficiency. SGs are classified as Critical Infrastructures. In the recent past, there have been cyber-attacks on SGs causing substantial damage and loss of services. A recent cyber-attack on Ukraine's SG caused over 2.3 million homes to be without power for around six hours. Apart from the loss of services, some portions of the SG are yet to be operational, due to the damage caused. SGs also face security challenges such as confidentiality, availability, fault tolerance, privacy, and other security issues. Communication and networking technologies integrated into the SG require new and existing security vulnerabilities to be thoroughly investigated. Key management is one of the most important security requirements to achieve data confidentiality and integrity in a SG system. It is not practical to design a single key management scheme/framework for all systems, actors and segments in the smart grid, since the security requirements of various sub-systems in the SG vary. We address two specific sub-systems categorised by the network connectivity layer – the Home Area Network (HAN) and the Neighbourhood Area Network (NAN). Currently, several security schemes and key management solutions for SGs have been proposed. However, these solutions lack better security for preventing common cyber-attacks such as node capture attack, replay attack and Sybil attack. We propose a cryptographic key management scheme that takes into account the differences in the HAN and NAN segments of the SG with respect to topology, authentication and forwarding of data. The scheme complies with the overall performance requirements of the smart grid. The proposed scheme uses group key management and group authentication in order to address end-to-end security for the HAN and NAN scenarios in a smart grid, which fulfils data confidentiality, integrity and scalability requirements. The security scheme is implemented in a multi-hop sensor network using TelosB motes and ZigBee OPNET simulation model. In addition, replay attack, Sybil attack and node capture attack scenarios have been implemented and evaluated in a NAN scenario. Evaluation results show that the scheme is resilient against node capture attacks and replay attacks. Smart Meters in a NAN are able to authenticate themselves in a group rather than authenticating one at a time. This significant improvement over existing schemes is discussed with comparisons with other security schemes
- …