5,145 research outputs found
Microservice-based Reference Architecture for Semantics-aware Measurement Systems
Cloud technologies have become more important than ever with the rising need for scalable
and distributed software systems. A pattern that is used in many such systems is a
microservice-based architecture (MSA). MSAs have become a blueprint for many large
companies and big software systems. In many scientific fields like energy and environmental
informatics, efficient and scalable software systems with a primary focus on measurement
data are a core requirement. Nowadays, there are many ways to solve research questions
using data-driven approaches. Most of them have a need for large amounts of measurement
data and according metadata. However, many measurement systems still follow deprecated
guidelines such as monolithic architectures, classic relational database principles and are
missing semantic awareness and interpretation of data. These problems and the resulting
requirements are tackled by the introduction of a reference architecture with a focus on
measurement systems that utilizes the principles of microservices.
The thesis first presents the systematic design of the reference architecture by using the
principles of Domain-driven Design (DDD). This process ensures that the reference architecture
is defined in a modular and sustainable way in contrast to complex monolithic
software systems. An extensive scientific analysis leads to the core parts of the concept
consisting of the data management and semantics for measurement systems. Different data
services define a concept for managing measurement data, according meta data and master
data describing the business objects of the application implemented by using the reference
architecture. Further concepts allow the reference architecture to define a way for the system
to understand and interpret the data using semantic information. Lastly, the introduction of
a frontend framework for dashboard applications represents an example for visualizing the
data managed by the microservices
Attribute-Based Encryption and Sticky Policies for Data Access Control in a Smart Home Scenario: a Comparison on Networked Smart Object Middleware
Regulating the access to the Internet of Things (IoT) network's resources is a complex-prone task, which requires to pay a great attention on how policies are defined, shared, and enforced. The present paper considers the specific context of a smart home, which represents one of the main IoT application domains, and it focuses on two solutions proposed in the literature to cope with the aforementioned issues. On the one side, approaches based on Attribute-Based Encryption (ABE) allow one to encrypt data for multiple recipients, in such a way that only those recipients whose attributes satisfy a given access policy can decrypt afterwards. ABE guarantees a high level of customization due to the variety of attributes which can be defined, and it is also flexible enough to be adapted to different kinds of scenarios. On the other side, approaches based on sticky policies allow to attach an access policy directly to the data itself, and to employ a trusted authority to evaluate and enforce the policy itself. Sticky policies also guarantee a highly distributed and customizable enforcement of access control rules. In this paper, we compare the advantages and the drawbacks in terms of performance and robustness of such two techniques by means of their integration within the prototype of an IoT middleware, named NetwOrked Smart object (NOS). Hence, the effectiveness of the presented solutions is validated by means of a real test-bed in the smart home scenario, in terms of storage occupancy, CPU load, and data retrieval delay. The final goal is to reveal the best approach to be used depending on the application's requirements
Quality assessment technique for ubiquitous software and middleware
The new paradigm of computing or information systems is ubiquitous computing systems. The technology-oriented issues of ubiquitous computing systems have made researchers pay much attention to the feasibility study of the technologies rather than building quality assurance indices or guidelines. In this context, measuring quality is the key to developing high-quality ubiquitous computing products. For this reason, various quality models have been defined, adopted and enhanced over the years, for example, the need for one recognised standard quality model (ISO/IEC 9126) is the result of a consensus for a software quality model on three levels: characteristics, sub-characteristics, and metrics. However, it is very much unlikely that this scheme will be directly applicable to ubiquitous computing environments which are considerably different to conventional software, trailing a big concern which is being given to reformulate existing methods, and especially to elaborate new assessment techniques for ubiquitous computing environments. This paper selects appropriate quality characteristics for the ubiquitous computing environment, which can be used as the quality target for both ubiquitous computing product evaluation processes ad development processes. Further, each of the quality characteristics has been expanded with evaluation questions and metrics, in some cases with measures. In addition, this quality model has been applied to the industrial setting of the ubiquitous computing environment. These have revealed that while the approach was sound, there are some parts to be more developed in the future
Generic Patterns for Intrusion Detection Systems in Service-Oriented Automotive and Medical Architectures
To implement new software functions and more flexible updates in the future as well as to provide cloud-based functionality, the service-oriented architecture (SOA) paradigm is increasingly being integrated into automotive electrical and electronic architecture (E/E architectures). In addition to the automotive industry, the medical industry is also researching SOA-based solutions to increase the interoperability of devices (vendor-independent). The resulting service-oriented communication is no longer fully specified during design time, which affects information security measures. In this paper, we compare different SOA protocols for the automotive and medical fields. Furthermore, we explain the underlying communication patterns and derive features for the development of an SOA-based Intrusion Detection System (IDS)
System architectures for Industrie 4.0 applications
Industrie 4.0 principles demand increasing flexibility and modularity for automated production systems. Current system architectures provide an isolated view of specific applications and use cases, but lack a global, more generic approach. Based on the specific architectures of two EU projects and one German Industrie 4.0 project, a generic system architecture is proposed. This system architecture features the strengths of the three isolated proposals, such as cross-enterprise data sharing, service orchestration, and real-time capabilities, and can be applied to a wide field of applications. Future research should be directed towards considering the applicability of the architecture to other equal applications.info:eu-repo/semantics/publishedVersio
Access control technologies for Big Data management systems: literature review and future trends
Abstract Data security and privacy issues are magnified by the volume, the variety, and the velocity of Big Data and by the lack, up to now, of a reference data model and related data manipulation languages. In this paper, we focus on one of the key data security services, that is, access control, by highlighting the differences with traditional data management systems and describing a set of requirements that any access control solution for Big Data platforms may fulfill. We then describe the state of the art and discuss open research issues
- …