269 research outputs found
Middleware Technologies for Cloud of Things - a survey
The next wave of communication and applications rely on the new services
provided by Internet of Things which is becoming an important aspect in human
and machines future. The IoT services are a key solution for providing smart
environments in homes, buildings and cities. In the era of a massive number of
connected things and objects with a high grow rate, several challenges have
been raised such as management, aggregation and storage for big produced data.
In order to tackle some of these issues, cloud computing emerged to IoT as
Cloud of Things (CoT) which provides virtually unlimited cloud services to
enhance the large scale IoT platforms. There are several factors to be
considered in design and implementation of a CoT platform. One of the most
important and challenging problems is the heterogeneity of different objects.
This problem can be addressed by deploying suitable "Middleware". Middleware
sits between things and applications that make a reliable platform for
communication among things with different interfaces, operating systems, and
architectures. The main aim of this paper is to study the middleware
technologies for CoT. Toward this end, we first present the main features and
characteristics of middlewares. Next we study different architecture styles and
service domains. Then we presents several middlewares that are suitable for CoT
based platforms and lastly a list of current challenges and issues in design of
CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268,
Digital Communications and Networks, Elsevier (2017
Middleware Technologies for Cloud of Things - a survey
The next wave of communication and applications rely on the new services
provided by Internet of Things which is becoming an important aspect in human
and machines future. The IoT services are a key solution for providing smart
environments in homes, buildings and cities. In the era of a massive number of
connected things and objects with a high grow rate, several challenges have
been raised such as management, aggregation and storage for big produced data.
In order to tackle some of these issues, cloud computing emerged to IoT as
Cloud of Things (CoT) which provides virtually unlimited cloud services to
enhance the large scale IoT platforms. There are several factors to be
considered in design and implementation of a CoT platform. One of the most
important and challenging problems is the heterogeneity of different objects.
This problem can be addressed by deploying suitable "Middleware". Middleware
sits between things and applications that make a reliable platform for
communication among things with different interfaces, operating systems, and
architectures. The main aim of this paper is to study the middleware
technologies for CoT. Toward this end, we first present the main features and
characteristics of middlewares. Next we study different architecture styles and
service domains. Then we presents several middlewares that are suitable for CoT
based platforms and lastly a list of current challenges and issues in design of
CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268,
Digital Communications and Networks, Elsevier (2017
A Service Discovery Solution for Edge Choreography-Based Distributed Embedded Systems
[EN] This paper presents a solution to support service discovery for edge choreography based distributed embedded systems. The Internet of Things (IoT) edge architectural layer is composed of Raspberry Pi machines. Each machine hosts different services organized based on the choreography collaborative paradigm. The solution adds to the choreography middleware three messages passing models to be coherent and compatible with current IoT messaging protocols. It is aimed to support blind hot plugging of new machines and help with service load balance. The discovery mechanism is implemented as a broker service and supports regular expressions (Regex) in message scope to discern both publishing patterns offered by data providers and client services necessities. Results compare Control Process Unit (CPU) usage in a requestÂżresponse and datacentric configuration and analyze both regex interpreter latency times compared with a traditional message structure as well as its impact on CPU and memory consumption.The choreography engine was developed and supported by the SABIEN research group of the Universitat Politecnica de Valencia (http://www.sabien.upv.es/en/).Blanc Clavero, S.; Bayo-Monton, JL.; Palanca-Barrio, S.; Arreaga-Alvarado, NX. (2021). A Service Discovery Solution for Edge Choreography-Based Distributed Embedded Systems. Sensors. 21(2):1-19. https://doi.org/10.3390/s21020672S11921
Unified Theory of Acceptance and Use of Technology (UTAUT) for Market Analysis of FP7 CHOReOS Products
AbstractThe European 7th Framework FP7-ICT-2009-5 project CHOReOS No. 257178 (2010-2013) “Large Scale Choreographies for the Future Internet (IP)” is aimed to elaborate on new methods and tools related to Future Internet ultra-large-scale (ULS) solution development based on the use of choreographies. The purpose of this research is to identify exploitable CHOReOS products and approaches and business market trends that may exploit them. The aim is to collect and assess early market inputs, thereby ensuring that market needs are addressed properly by the CHOReOS project. The market acceptance assessment is done using the Unified Theory of Acceptance and Use of Technology (UTAUT), but the credibility of results is assessed using Cronbach's Alpha, Split-Half Reliability and Spearman–Brown testing methods
Towards a Smart Society through Personal Assistants Employing Executable Choreographies
With the increased use of Internet, governments and large companies store and share massive amounts of personal data in such a way that leaves no space for transparency. Large organizations and institutions are known to be ineffective in data safeguarding, so they can be stolen. The analysis of executable choreographies and their implementation in the real systems led us to the conclusion that it is possible to increase data privacy by using a different kind of automation made possible by the personal assistant of the future. A possible approach may be employing software systems integrated on a large scale, while the data control may be made by data owners. As it is very laborious to control this access manually, we argue in this paper that these assistants can become the real representatives of the people and the institutions that have legal access to private data management
Towards Run-Time Verification of Compositions in the Web of Things using Complex Event Processing
Following the vision of the Internet of Things, physical world entities are integrated into virtual world things. Things are expected to become active participants in business and social processes. Then, the Internet of Things could benefit from the Web Service architecture like today’s Web does, so Future ser-vice-oriented Internet things will offer their functionality via service-enabled in-terfaces. In previous work, we demonstrated the need of considering the behav-iour of things to develop applications in a more rigorous way, and we proposed a lightweight model for representing such behaviour. Our methodology relies on the service-oriented paradigm and extends the DPWS profile to specify the order with which things can receive messages. We also proposed a static verifi-cation technique to check whether a mashup of things respects the behaviour, specified at design-time, of the composed things. However, a change in the be-haviour of a thing may cause that some compositions do not fulfill its behaviour anymore. Moreover, given that a thing can receive requests from instances of different mashups at run-time, these requests could violate the behaviour of that thing, even though each mashup fulfills such behaviour, due to the change of state of the thing. To address these issues, we present a proposal based on me-diation techniques and complex event processing to detect and inhibit invalid invocations, so things only receive requests compatible with their behaviour.Work partially supported by projects TIN2008-05932, TIN2012-35669, CSD2007-0004 funded by Spanish Ministry MINECO and FEDER; P11-TIC-7659 funded by Andalusian Government; and Universidad de Málaga, Campus de Excelencia Internacional AndalucĂa Tec
- …