3,302 research outputs found
BlendMAS: A BLockchain-ENabled Decentralized Microservices Architecture for Smart Public Safety
Thanks to rapid technological advances in the Internet of Things (IoT), a
smart public safety (SPS) system has become feasible by integrating
heterogeneous computing devices to collaboratively provide public protection
services. While a service oriented architecture (SOA) has been adopted by IoT
and cyber-physical systems (CPS), it is difficult for a monolithic architecture
to provide scalable and extensible services for a distributed IoT based SPS
system. Furthermore, traditional security solutions rely on a centralized
authority, which can be a performance bottleneck or single point failure.
Inspired by microservices architecture and blockchain technology, this paper
proposes a BLockchain-ENabled Decentralized Microservices Architecture for
Smart public safety (BlendMAS). Within a permissioned blockchain network, a
microservices based security mechanism is introduced to secure data access
control in an SPS system. The functionality of security services are decoupled
into separate containerized microservices that are built using a smart
contract, and deployed on edge and fog computing nodes. An extensive
experimental study verified that the proposed BlendMAS is able to offer a
decentralized, scalable and secured data sharing and access control to
distributed IoT based SPS system.Comment: Submitted to the 2019 IEEE International Conference on Blockchain
(Blockchain-2019
All One Needs to Know about Fog Computing and Related Edge Computing Paradigms: A Complete Survey
With the Internet of Things (IoT) becoming part of our daily life and our
environment, we expect rapid growth in the number of connected devices. IoT is
expected to connect billions of devices and humans to bring promising
advantages for us. With this growth, fog computing, along with its related edge
computing paradigms, such as multi-access edge computing (MEC) and cloudlet,
are seen as promising solutions for handling the large volume of
security-critical and time-sensitive data that is being produced by the IoT. In
this paper, we first provide a tutorial on fog computing and its related
computing paradigms, including their similarities and differences. Next, we
provide a taxonomy of research topics in fog computing, and through a
comprehensive survey, we summarize and categorize the efforts on fog computing
and its related computing paradigms. Finally, we provide challenges and future
directions for research in fog computing.Comment: 48 pages, 7 tables, 11 figures, 450 references. The data (categories
and features/objectives of the papers) of this survey are now available
publicly. Accepted by Elsevier Journal of Systems Architectur
A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications
As the explosive growth of smart devices and the advent of many new
applications, traffic volume has been growing exponentially. The traditional
centralized network architecture cannot accommodate such user demands due to
heavy burden on the backhaul links and long latency. Therefore, new
architectures which bring network functions and contents to the network edge
are proposed, i.e., mobile edge computing and caching. Mobile edge networks
provide cloud computing and caching capabilities at the edge of cellular
networks. In this survey, we make an exhaustive review on the state-of-the-art
research efforts on mobile edge networks. We first give an overview of mobile
edge networks including definition, architecture and advantages. Next, a
comprehensive survey of issues on computing, caching and communication
techniques at the network edge is presented respectively. The applications and
use cases of mobile edge networks are discussed. Subsequently, the key enablers
of mobile edge networks such as cloud technology, SDN/NFV and smart devices are
discussed. Finally, open research challenges and future directions are
presented as well
Delay-aware Resource Allocation in Fog-assisted IoT Networks Through Reinforcement Learning
Fog nodes in the vicinity of IoT devices are promising to provision low
latency services by offloading tasks from IoT devices to them. Mobile IoT is
composed by mobile IoT devices such as vehicles, wearable devices and
smartphones. Owing to the time-varying channel conditions, traffic loads and
computing loads, it is challenging to improve the quality of service (QoS) of
mobile IoT devices. As task delay consists of both the transmission delay and
computing delay, we investigate the resource allocation (i.e., including both
radio resource and computation resource) in both the wireless channel and fog
node to minimize the delay of all tasks while their QoS constraints are
satisfied. We formulate the resource allocation problem into an integer
non-linear problem, where both the radio resource and computation resource are
taken into account. As IoT tasks are dynamic, the resource allocation for
different tasks are coupled with each other and the future information is
impractical to be obtained. Therefore, we design an on-line reinforcement
learning algorithm to make the sub-optimal decision in real time based on the
system's experience replay data. The performance of the designed algorithm has
been demonstrated by extensive simulation results
Fog Computing in IoT Aided Smart Grid Transition- Requirements, Prospects, Status Quos and Challenges
Due to unfolded developments in both the IT sectors viz. Intelligent
Transportation and Information Technology contemporary Smart Grid (SG) systems
are leveraged with smart devices and entities. Such infrastructures when
bestowed with the Internet of Things (IoT) and sensor network make a universe
of objects active and online. The traditional cloud deployment succumbs to meet
the analytics and computational exigencies decentralized, dynamic cum
resource-time critical SG ecosystems. This paper synoptically inspects to what
extent the cloud computing utilities can satisfy the mission-critical
requirements of SG ecosystems and which subdomains and services call for fog
based computing archetypes. The objective of this work is to comprehend the
applicability of fog computing algorithms to interplay with the core centered
cloud computing support, thus enabling to come up with a new breed of real-time
and latency free SG services. The work also highlights the opportunities
brought by fog based SG deployments. Correspondingly, we also highlight the
challenges and research thrusts elucidated towards the viability of fog
computing for successful SG Transition.Comment: 13 Pages, 1 table, 1 Figur
Mobile Cloud Business Process Management System for the Internet of Things: A Survey
The Internet of Things (IoT) represents a comprehensive environment that
consists of a large number of smart devices interconnecting heterogeneous
physical objects to the Internet. Many domains such as logistics,
manufacturing, agriculture, urban computing, home automation, ambient assisted
living and various ubiquitous computing applications have utilised IoT
technologies. Meanwhile, Business Process Management Systems (BPMS) have become
a successful and efficient solution for coordinated management and optimised
utilisation of resources/entities. However, past BPMS have not considered many
issues they will face in managing large scale connected heterogeneous IoT
entities. Without fully understanding the behaviour, capability and state of
the IoT entities, the BPMS can fail to manage the IoT integrated information
systems. In this paper, we analyse existing BPMS for IoT and identify the
limitations and their drawbacks based on Mobile Cloud Computing perspective.
Later, we discuss a number of open challenges in BPMS for IoT.Comment: 56 pages, 10 figures, 5 table
Differential Privacy Techniques for Cyber Physical Systems: A Survey
Modern cyber physical systems (CPSs) has widely being used in our daily lives
because of development of information and communication technologies (ICT).With
the provision of CPSs, the security and privacy threats associated to these
systems are also increasing. Passive attacks are being used by intruders to get
access to private information of CPSs. In order to make CPSs data more secure,
certain privacy preservation strategies such as encryption, and k-anonymity
have been presented in the past. However, with the advances in CPSs
architecture, these techniques also needs certain modifications. Meanwhile,
differential privacy emerged as an efficient technique to protect CPSs data
privacy. In this paper, we present a comprehensive survey of differential
privacy techniques for CPSs. In particular, we survey the application and
implementation of differential privacy in four major applications of CPSs named
as energy systems, transportation systems, healthcare and medical systems, and
industrial Internet of things (IIoT). Furthermore, we present open issues,
challenges, and future research direction for differential privacy techniques
for CPSs. This survey can serve as basis for the development of modern
differential privacy techniques to address various problems and data privacy
scenarios of CPSs.Comment: 46 pages, 12 figure
Semantically Enhanced Time Series Databases in IoT-Edge-Cloud Infrastructure
Many IoT systems are data intensive and are for the purpose of monitoring for
fault detection and diagnosis of critical systems. A large volume of data
steadily come out of a large number of sensors in the monitoring system. Thus,
we need to consider how to store and manage these data. Existing time series
databases (TSDBs) can be used for monitoring data storage, but they do not have
good models for describing the data streams stored in the database. In this
paper, we develop a semantic model for the specification of the monitoring data
streams (time series data) in terms of which sensor generated the data stream,
which metric of which entity the sensor is monitoring, what is the relation of
the entity to other entities in the system, which measurement unit is used for
the data stream, etc. We have also developed a tool suite, SE-TSDB, that can
run on top of existing TSDBs to help establish semantic specifications for data
streams and enable semantic-based data retrievals. With our semantic model for
monitoring data and our SE-TSDB tool suite, users can retrieve non-existing
data streams that can be automatically derived from the semantics. Users can
also retrieve data streams without knowing where they are. Semantic based
retrieval is especially important in a large-scale integrated IoT-Edge-Cloud
system, because of its sheer quantity of data, its huge number of computing and
IoT devices that may store the data, and the dynamics in data migration and
evolution. With better data semantics, data streams can be more effectively
tracked and flexibly retrieved to help with timely data analysis and control
decision making anywhere and anytime
Management and Orchestration of Network Slices in 5G, Fog, Edge and Clouds
Network slicing allows network operators to build multiple isolated virtual
networks on a shared physical network to accommodate a wide variety of services
and applications. With network slicing, service providers can provide a
cost-efficient solution towards meeting diverse performance requirements of
deployed applications and services. Despite slicing benefits, End-to-End
orchestration and management of network slices is a challenging and complicated
task. In this chapter, we intend to survey all the relevant aspects of network
slicing, with the focus on networking technologies such as Software-defined
networking (SDN) and Network Function Virtualization (NFV) in 5G, Fog/Edge and
Cloud Computing platforms. To build the required background, this chapter
begins with a brief overview of 5G, Fog/Edge and Cloud computing, and their
interplay. Then we cover the 5G vision for network slicing and extend it to the
Fog and Cloud computing through surveying the state-of-the-art slicing
approaches in these platforms. We conclude the chapter by discussing future
directions, analyzing gaps and trends towards the network slicing realization.Comment: 31 pages, 4 figures, Fog and Edge Computing: Principles and
Paradigms, Wiley Press, New York, USA, 201
A Review on the Application of Blockchain for the Next Generation of Cybersecure Industry 4.0 Smart Factories
Industry 4.0 is a concept devised for improving the way modern factories
operate through the use of some of the latest technologies, like the ones used
for creating Industrial Internet of Things (IIoT), robotics or Big Data
applications. One of such technologies is blockchain, which is able to add
trust, security and decentralization to different industrial fields. This
article focuses on analyzing the benefits and challenges that arise when using
blockchain and smart contracts to develop Industry 4.0 applications. In
addition, this paper presents a thorough review on the most relevant
blockchain-based applications for Industry 4.0 technologies. Thus, its aim is
to provide a detailed guide for future Industry 4.0 developers that allows for
determining how blockchain can enhance the next generation of cybersecure
industrial applications
- …