569 research outputs found

    Middleware Technologies for Cloud of Things - a survey

    Get PDF
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017

    Middleware Technologies for Cloud of Things - a survey

    Full text link
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017

    EDGE-CoT: next generation cloud computing and its impact on business

    Get PDF
    Purpose – The main objective of this paper is to analyze the potential impact of future cloud computing trends on business, from the perspective of specialists in the area. Design/ methodology/ approach - Qualitative approach that includes literature review and nine semi-structured interviews with proclaimed influencers and global thought leaders in cloud computing, highlighting Jeff Barr, Vice President of Amazon Web Services. Findings -5G networks will enable the emergence of the Edge-CoT architecture, that will consequently drive the increased application of Artificial Intelligence/ Machine Learning (AI/ML) and Robotics. The combination of Edge-CoT, Robotics and AI/ML triggers the development of Smart Cities and Industry 4.0. Simultaneously, Cloud alone will benefit of increased connectivity and will be the preferred business architecture comparing to EdgeCoT. New industries and businesses will result from the Edge-CoT, and the existing companies will benefit mainly from an improved customer experience. Major business challenges triggered by Edge-CoT include workforce re-skilling, promotion of the agile approach and a cultural shift towards risk-taking. Research limitations/implications - The research study was limited to the analysis of a selected set of cloud computing trends. Moreover, the data collection process was limited to 9 cloud experts, hindering a possible generalization. Originality/value – This study uses a qualitative approach to listen to market experts and cross with the theoretical findings to date, consequently bringing theory and practice closer together.Objetivo - O objetivo deste estudo consiste em analisar o potencial impacto das tendências futuras de cloud computing na gestão das empresas, a partir da visão de especialistas da área. Metodologia- Abordagem qualitativa que engloba revisão de literatura e nove entrevistas semiestruturadas com proclamados influencers e lideres globais em cloud computing, destacando-se Jeff Barr, o Vice-presidente da Amazon Web Services. Resultado - As redes 5G possibilitarão o surgimento da arquitetura Edge-CoT, que consequentemente impulsionará o aumento da aplicação de Inteligência Artificial (AI) e robótica. A combinação de Edge-CoT, Robótica e AI desencadeia o desenvolvimento de Smart Cities e Industry 4.0. Simultaneamente, a Cloud sozinha beneficiará do aumento da conectividade e será a arquitetura preferida comparativamente a Edge-CoT. Novos setores e negócios resultarão do Edge-CoT, e as empresas existentes beneficiarão principalmente de uma melhor experiência do cliente. Os principais desafios organizacionais desencadeados pelo Edge-CoT incluem a requalificação da força de trabalho, a adoção da abordagem agile e uma mudança cultural que estimule experimentos tecnológicos. Restrição da pesquisa - O processo de recolha de dados foi limitado a 9 especialistas em cloud computing, dificultando assim uma possível generalização. Originalidade/ Valor - Este estudo utiliza uma abordagem qualitativa para ouvir os especialistas do mercado e cruzar com os resultados teóricos até o momento, aproximando assim a teoria da prática

    A New Trust Framework for E-Government in Cloud of Things

    Get PDF
    The concept of Cloud of Things becomes important for each e-government, facilitating its way of work, increasing its productivity and all that leading to cost savings. It will likely have a significant impact on the e-governments in the future. E-government diversity goals face many challenges. Trust is a major challenge when deploying Cloud of Things in e-government. In this paper, a new trust framework is proposed that supports trust between Internet of Things devices interconnected to the Cloud in order to support e-government services to be delivered in trusted manner. The proposed framework has been applied to a use case study to ensure the trustworthiness of the proposed framework in a real mission. The results show that the proposed trust framework is useful to ensuring a trust environment for Cloud of Things in order to continue providing and gathering data needed to provide services to users through the E-government services

    Key Management Scheme for Smart Grid

    Get PDF
    A Smart Grid (SG) is a modern electricity supply system. It uses information and communication technology (ICT) to run, monitor and control data between the generation source and the end user. It comprises a set of technologies that uses sensing, embedded processing and digital communications to intelligently control and monitor an electricity grid with improved reliability, security, and efficiency. SGs are classified as Critical Infrastructures. In the recent past, there have been cyber-attacks on SGs causing substantial damage and loss of services. A recent cyber-attack on Ukraine's SG caused over 2.3 million homes to be without power for around six hours. Apart from the loss of services, some portions of the SG are yet to be operational, due to the damage caused. SGs also face security challenges such as confidentiality, availability, fault tolerance, privacy, and other security issues. Communication and networking technologies integrated into the SG require new and existing security vulnerabilities to be thoroughly investigated. Key management is one of the most important security requirements to achieve data confidentiality and integrity in a SG system. It is not practical to design a single key management scheme/framework for all systems, actors and segments in the smart grid, since the security requirements of various sub-systems in the SG vary. We address two specific sub-systems categorised by the network connectivity layer – the Home Area Network (HAN) and the Neighbourhood Area Network (NAN). Currently, several security schemes and key management solutions for SGs have been proposed. However, these solutions lack better security for preventing common cyber-attacks such as node capture attack, replay attack and Sybil attack. We propose a cryptographic key management scheme that takes into account the differences in the HAN and NAN segments of the SG with respect to topology, authentication and forwarding of data. The scheme complies with the overall performance requirements of the smart grid. The proposed scheme uses group key management and group authentication in order to address end-to-end security for the HAN and NAN scenarios in a smart grid, which fulfils data confidentiality, integrity and scalability requirements. The security scheme is implemented in a multi-hop sensor network using TelosB motes and ZigBee OPNET simulation model. In addition, replay attack, Sybil attack and node capture attack scenarios have been implemented and evaluated in a NAN scenario. Evaluation results show that the scheme is resilient against node capture attacks and replay attacks. Smart Meters in a NAN are able to authenticate themselves in a group rather than authenticating one at a time. This significant improvement over existing schemes is discussed with comparisons with other security schemes
    • …
    corecore