269 research outputs found

    Middleware Technologies for Cloud of Things - a survey

    Get PDF
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017

    Middleware Technologies for Cloud of Things - a survey

    Full text link
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017

    A Service Discovery Solution for Edge Choreography-Based Distributed Embedded Systems

    Full text link
    [EN] This paper presents a solution to support service discovery for edge choreography based distributed embedded systems. The Internet of Things (IoT) edge architectural layer is composed of Raspberry Pi machines. Each machine hosts different services organized based on the choreography collaborative paradigm. The solution adds to the choreography middleware three messages passing models to be coherent and compatible with current IoT messaging protocols. It is aimed to support blind hot plugging of new machines and help with service load balance. The discovery mechanism is implemented as a broker service and supports regular expressions (Regex) in message scope to discern both publishing patterns offered by data providers and client services necessities. Results compare Control Process Unit (CPU) usage in a requestÂżresponse and datacentric configuration and analyze both regex interpreter latency times compared with a traditional message structure as well as its impact on CPU and memory consumption.The choreography engine was developed and supported by the SABIEN research group of the Universitat Politecnica de Valencia (http://www.sabien.upv.es/en/).Blanc Clavero, S.; Bayo-Monton, JL.; Palanca-Barrio, S.; Arreaga-Alvarado, NX. (2021). A Service Discovery Solution for Edge Choreography-Based Distributed Embedded Systems. Sensors. 21(2):1-19. https://doi.org/10.3390/s21020672S11921

    Orchestration vs. Choreography Functional Association for Future Automation Systems

    Get PDF

    Unified Theory of Acceptance and Use of Technology (UTAUT) for Market Analysis of FP7 CHOReOS Products

    Get PDF
    AbstractThe European 7th Framework FP7-ICT-2009-5 project CHOReOS No. 257178 (2010-2013) “Large Scale Choreographies for the Future Internet (IP)” is aimed to elaborate on new methods and tools related to Future Internet ultra-large-scale (ULS) solution development based on the use of choreographies. The purpose of this research is to identify exploitable CHOReOS products and approaches and business market trends that may exploit them. The aim is to collect and assess early market inputs, thereby ensuring that market needs are addressed properly by the CHOReOS project. The market acceptance assessment is done using the Unified Theory of Acceptance and Use of Technology (UTAUT), but the credibility of results is assessed using Cronbach's Alpha, Split-Half Reliability and Spearman–Brown testing methods

    Towards a Smart Society through Personal Assistants Employing Executable Choreographies

    Get PDF
    With the increased use of Internet, governments and large companies store and share massive amounts of personal data in such a way that leaves no space for transparency. Large organizations and institutions are known to be ineffective in data safeguarding, so they can be stolen. The analysis of executable choreographies and their implementation in the real systems led us to the conclusion that it is possible to increase data privacy by using a different kind of automation made possible by the personal assistant of the future. A possible approach may be employing software systems integrated on a large scale, while the data control may be made by data owners. As it is very laborious to control this access manually, we argue in this paper that these assistants can become the real representatives of the people and the institutions that have legal access to private data management

    Towards Run-Time Verification of Compositions in the Web of Things using Complex Event Processing

    Get PDF
    Following the vision of the Internet of Things, physical world entities are integrated into virtual world things. Things are expected to become active participants in business and social processes. Then, the Internet of Things could benefit from the Web Service architecture like today’s Web does, so Future ser-vice-oriented Internet things will offer their functionality via service-enabled in-terfaces. In previous work, we demonstrated the need of considering the behav-iour of things to develop applications in a more rigorous way, and we proposed a lightweight model for representing such behaviour. Our methodology relies on the service-oriented paradigm and extends the DPWS profile to specify the order with which things can receive messages. We also proposed a static verifi-cation technique to check whether a mashup of things respects the behaviour, specified at design-time, of the composed things. However, a change in the be-haviour of a thing may cause that some compositions do not fulfill its behaviour anymore. Moreover, given that a thing can receive requests from instances of different mashups at run-time, these requests could violate the behaviour of that thing, even though each mashup fulfills such behaviour, due to the change of state of the thing. To address these issues, we present a proposal based on me-diation techniques and complex event processing to detect and inhibit invalid invocations, so things only receive requests compatible with their behaviour.Work partially supported by projects TIN2008-05932, TIN2012-35669, CSD2007-0004 funded by Spanish Ministry MINECO and FEDER; P11-TIC-7659 funded by Andalusian Government; and Universidad de Málaga, Campus de Excelencia Internacional Andalucía Tec
    • …
    corecore