8 research outputs found

    RESTful framework for collaborative internet of things based on IEC 61850

    Get PDF
    El contenido de los cap铆tulos 2 y 3 est谩 sujeto a confidencialidad 161 p.En 1991, Mark Weiser formul贸 el paradigma de Computaci贸n Ubicua definiendo el concepto de Entorno Inteligente como un espacio f铆sico repleto de dispositivos, muy integrados en el entorno, y con capacidades de identificaci贸n, sensorizaci贸n y actuaci贸n. Internet de las Cosas (IoT) expande el 谩mbito de localizaci贸n de estos dispositivos y servicios ubicuos, representados como cosas, de un entorno local a internet como red global. Para la implementaci贸n de estos escenarios de aplicaci贸n, la colaboraci贸n entre las cosas es uno de los principales retos de investigaci贸n. El objetivo de esta colaboraci贸n es ser capaces de satisfacer necesidades globales mediante la combinaci贸n de servicios individuales. Esta Tesis propone una arquitectura colaborativa entre las cosas desplegadas en internet.Las tecnolog铆as alrededor de los Servicios Web SOAP/XML, adecuadas para IoT, soportan aspectos claves para un sistema colaborativo como la publicaci贸n, descubrimiento, control y gesti贸n de eventos de los dispositivos. Como alternativa, REST ha ganado terreno en este 谩mbito por ser considerada una opci贸n m谩s ligera, sencilla y natural para la comunicaci贸n en internet. Sin embargo, no existen protocolos para descubrimiento y gesti贸n de eventos para recursos REST. Esta Tesis aborda dicha carencia proponiendo una especificaci贸n de estos protocolos para arquitecturas REST. Otro aspecto importante es la representaci贸n, a nivel de aplicaci贸n, de las cosas distribuidas. Entre las propuestas para la estandarizaci贸n de los modelos de informaci贸n y comunicaci贸n en este dominio que podr铆an aplicarse, de manera similar, a IoT, destaca el est谩ndar IEC 61850. Sin embargo, los protocolos de comunicaci贸n definidos por el est谩ndar no son adecuados para IoT. Esta Tesis analiza la idoneidad del IEC 61850 para escenarios IoT y propone un protocolo de comunicaci贸n REST para sus servicios.Por 煤ltimo, se trata la problem谩tica asociada a la confiabilidad que debe proporcionar una arquitectura IoT para dominios de aplicaci贸n relacionados con la salud o sistemas de seguridad funcional (Safety)

    RESTful framework for collaborative internet of things based on IEC 61850

    Get PDF
    El contenido de los cap铆tulos 2 y 3 est谩 sujeto a confidencialidad 161 p.En 1991, Mark Weiser formul贸 el paradigma de Computaci贸n Ubicua definiendo el concepto de Entorno Inteligente como un espacio f铆sico repleto de dispositivos, muy integrados en el entorno, y con capacidades de identificaci贸n, sensorizaci贸n y actuaci贸n. Internet de las Cosas (IoT) expande el 谩mbito de localizaci贸n de estos dispositivos y servicios ubicuos, representados como cosas, de un entorno local a internet como red global. Para la implementaci贸n de estos escenarios de aplicaci贸n, la colaboraci贸n entre las cosas es uno de los principales retos de investigaci贸n. El objetivo de esta colaboraci贸n es ser capaces de satisfacer necesidades globales mediante la combinaci贸n de servicios individuales. Esta Tesis propone una arquitectura colaborativa entre las cosas desplegadas en internet.Las tecnolog铆as alrededor de los Servicios Web SOAP/XML, adecuadas para IoT, soportan aspectos claves para un sistema colaborativo como la publicaci贸n, descubrimiento, control y gesti贸n de eventos de los dispositivos. Como alternativa, REST ha ganado terreno en este 谩mbito por ser considerada una opci贸n m谩s ligera, sencilla y natural para la comunicaci贸n en internet. Sin embargo, no existen protocolos para descubrimiento y gesti贸n de eventos para recursos REST. Esta Tesis aborda dicha carencia proponiendo una especificaci贸n de estos protocolos para arquitecturas REST. Otro aspecto importante es la representaci贸n, a nivel de aplicaci贸n, de las cosas distribuidas. Entre las propuestas para la estandarizaci贸n de los modelos de informaci贸n y comunicaci贸n en este dominio que podr铆an aplicarse, de manera similar, a IoT, destaca el est谩ndar IEC 61850. Sin embargo, los protocolos de comunicaci贸n definidos por el est谩ndar no son adecuados para IoT. Esta Tesis analiza la idoneidad del IEC 61850 para escenarios IoT y propone un protocolo de comunicaci贸n REST para sus servicios.Por 煤ltimo, se trata la problem谩tica asociada a la confiabilidad que debe proporcionar una arquitectura IoT para dominios de aplicaci贸n relacionados con la salud o sistemas de seguridad funcional (Safety)

    Digital twins: a survey on enabling technologies, challenges, trends and future prospects

    Get PDF
    Digital Twin (DT) is an emerging technology surrounded by many promises, and potentials to reshape the future of industries and society overall. A DT is a system-of-systems which goes far beyond the traditional computer-based simulations and analysis. It is a replication of all the elements, processes, dynamics, and firmware of a physical system into a digital counterpart. The two systems (physical and digital) exist side by side, sharing all the inputs and operations using real-time data communications and information transfer. With the incorporation of Internet of Things (IoT), Artificial Intelligence (AI), 3D models, next generation mobile communications (5G/6G), Augmented Reality (AR), Virtual Reality (VR), distributed computing, Transfer Learning (TL), and electronic sensors, the digital/virtual counterpart of the real-world system is able to provide seamless monitoring, analysis, evaluation and predictions. The DT offers a platform for the testing and analysing of complex systems, which would be impossible in traditional simulations and modular evaluations. However, the development of this technology faces many challenges including the complexities in effective communication and data accumulation, data unavailability to train Machine Learning (ML) models, lack of processing power to support high fidelity twins, the high need for interdisciplinary collaboration, and the absence of standardized development methodologies and validation measures. Being in the early stages of development, DTs lack sufficient documentation. In this context, this survey paper aims to cover the important aspects in realization of the technology. The key enabling technologies, challenges and prospects of DTs are highlighted. The paper provides a deep insight into the technology, lists design goals and objectives, highlights design challenges and limitations across industries, discusses research and commercial developments, provides its applications and use cases, offers case studies in industry, infrastructure and healthcare, lists main service providers and stakeholders, and covers developments to date, as well as viable research dimensions for future developments in DTs

    Evidence-based Accountability Audits for Cloud Computing

    Get PDF
    Cloud computing is known for its on-demand service provisioning and has now become mainstream. Many businesses as well as individuals are using cloud services on a daily basis. There is a big variety of services that ranges from the provision of computing resources to services such as productivity suites and social networks. The nature of these services varies heavily in terms of what kind of information is being out-sourced to the cloud provider. Often, that data is sensitive, for instance when PII is being shared by an individual. Also, businesses that move (parts of) their processes to the cloud are actively participating in a major paradigm shift from having data on-premise to transfering data to a third-party provider. However, many new challenges come along with this trend, which are closely tied to the loss of control over data. When moving to the cloud, direct control over geographical storage location, who has access to it and how it is shared and processed is given up. Because of this loss of control, cloud customers have to trust cloud providers that they treat their data in an appropriate and responsible way. Cloud audits can be used to check how data has been processed in the cloud (i.e., by whom, for what purpose) and whether or not this happened in compliance with what has been defined in agreed-upon privacy and data storage, usage and maintenance (i.e., data handling) policies. This way, a cloud customer can regain some of the control he has given up by moving to the cloud. In this thesis, accountability audits are presented as a way to strengthen trust in cloud computing by providing assurance about the processing of data in the cloud according to data handling and privacy policies. In cloud accountability audits, various distributed evidence sources need to be considered. The research presented in this thesis discusses the use of various heterogeous evidence sources on all cloud layers. This way, a complete picture of the actual data handling practices that is based on hard facts can be presented to the cloud consumer. Furthermore, this strengthens transparency of data processing in the cloud, which can lead to improved trust in cloud providers, if they choose to adopt these mechanisms in order to assure their customers that their data is being handled according to their expectations. The system presented in this thesis enables continuous auditing of a cloud provider's adherence to data handling policies in an automated way that shortens audit intervals and that is based on evidence that is produced by cloud subsystems. An important aspect of many cloud offerings is the combination of multiple distinct cloud services that are offered by independent providers. Data is thereby freuqently exchanged between the cloud providers. This also includes trans-border flows of data, where one provider may be required to adhere to more strict data protection requirements than the others. The system presented in this thesis addresses such scenarios by enabling the collection of evidence at providers and evaluating it during audits. Securing evidence quickly becomes a challenge in the system design, when information that is needed for the audit is deemed sensitive or confidential. This means that securing the evidence at-rest as well as in-transit is of utmost importance, in order not to introduce a new liability by building an insecure data heap. This research presents the identification of security and privacy protection requirements alongside proposed solutions that enable the development of an architecture for secure, automated, policy-driven and evidence-based accountability audits

    EBook proceedings of the ESERA 2011 conference : science learning and citizenship

    Get PDF
    This ebook contains fourteen parts according to the strands of the ESERA 2011 conference. Each part is co-edited by one or two persons, most of them were strand chairs. All papers in this ebook correspond to accepted communications during the ESERA conference that were reviewed by two referees. Moreover the co-editors carried out a global reviewing of the papers.ESERA - European Science Education Research Associatio
    corecore