132 research outputs found

    BIG DATA IN SMART CITIES: A SYSTEMATIC MAPPING REVIEW

    Get PDF
    Big data is an emerging area of research and its prospective applications in smart cities are extensively recognized. In this study, we provide a breadth-first review of the domain “Big Data in Smart Cities” by applying the formal research method of systematic mapping. We investigated the primary sources of publication, research growth, maturity level of the research area, prominent research themes, type of analytics applied, and the areas of smart cities where big data research is produced. Consequently, we identified that empirical research in the domain has been progressing since 2013. The IEEE Access journal and IEEE Smart Cities Conference are the leading sources of literature containing 10.34% and 13.88% of the publications, respectively. The current state of the research is semi-matured where research type of 46.15% of the publications is solution and experience, and contribution type of 60% of the publications is architecture, platform, and framework. Prescriptive is least whereas predictive is the most applied type of analytics in smart cities as it has been stated in 43.08% of the publications. Overall, 33.85%, 21.54%, 13.85%, 12.31%, 7.69%, 6.15%, and 4.61% of the research produced in the domain focused on smart transportation, smart environment, smart governance, smart healthcare, smart energy, smart education, and smart safety, respectively. Besides the requirement for producing validation and evaluation research in the areas of smart transportation and smart environment, there is a need for more research efforts in the areas of smart healthcare, smart governance, smart safety, smart education, and smart energy. Furthermore, the potential of prescriptive analytics in smart cities is also an area of research that needs to be explored

    Internal interface diversification as a security measure in sensor networks

    Get PDF
    More actuator and sensor devices are connected to the Internet of Things (IoT) every day, and the network keeps growing, while software security of the devices is often incomplete. Sensor networks and the IoT in general currently cover a large number of devices with an identical internal interface structure. By diversifying the internal interfaces, the interfaces on each node of the network are made unique, and it is possible to break the software monoculture of easily exploitable identical systems. This paper proposes internal interface diversification as a security measure for sensor networks. We conduct a study on diversifiable internal interfaces in 20 IoT operating systems. We also present two proof-of-concept implementations and perform experiments to gauge the feasibility in the IoT environment. Internal interface diversification has practical limitations, and not all IoT operating systems have that many diversifiable interfaces. However, because of low resource requirements, compatibility with other security measures and wide applicability to several interfaces, we believe internal interface diversification is a promising and effective approach for securing nodes in sensor networks.</p

    A Systematic Mapping Study of Cloud Resources Management and Scalability in Brokering, Scheduling, Capacity Planning and Elasticity

    Get PDF
    Cloud computing allows for resource management through various means. Some of these include brokering, scheduling, elasticity and capacity planning and these processes helps in facilitating service utilization. Determining a particular research area especially in terms of resources management and scalability in the cloud is usually a cumbersome process for a researcher, hence the need for reviews and paper surveys in identifying potential research gaps. The objective of this work was to carry out a systematic mapping study of resources management and scalability in the cloud. A systematic mapping study offers a summarized overview of studies that have been carried out in a particular area of interest. It then presents the results of such overviews graphically using a map. Although, the systematic mapping process requires less effort, the results are more coarse-grained. In this study, analysis of publications were done based on their topics, research type and contribution facets. These publications were on research works which focused on resource management, scheduling, capacity planning, scalability and elasticity. This study classified publications into research facets viz., evaluation, validation, solution, philosophical, option and experience and contribution facets based on metrics, tools, processes, models and methods used. Obtained results showed that 31.3% of the considered publications focused on evaluation based research, 19.85% on validation and 32% on processes. About 2.4% focused on metric for capacity planning, 5.6% focused on tools relating to resource management, while 5.6 and 8% of the publications were on model for capacity planning and scheduling method, respectively. Research works focusing on validating capacity planning and elasticity were the least at 2.29 and 0.76%, respectively. This study clearly identified gaps in the field of resources management and scalability in the cloud which should stimulate interest for further studies by both researchers and industry practitioners

    Characterising resource management performance in Kubernetes

    Get PDF
    A key challenge for supporting elastic behaviour in cloud systems is to achieve a good performance in automated (de-)provisioning and scheduling of computing resources. One of the key aspects that can be significant is the overheads associated with deploying, terminating and maintaining resources. Therefore, due to their lower start up and termination overhead, containers are rapidly replacing Virtual Machines (VMs) in many cloud deployments, as the computation instance of choice. In this paper, we analyse the performance of Kubernetes achieved through a Petri net-based performance model. Kubernetes is a container management system for a distributed cluster environment. Our model can be characterised using data from a Kubernetes deployment, and can be exploited for supporting capacity planning and designing Kubernetes-based elastic applications

    CACHE MANAGEMENT SCHEMES FOR USER EQUIPMENT CONTEXTS IN 5TH GENERATION CLOUD RADIO ACCESS NETWORKS

    Get PDF
    Advances in cellular network technology continue to develop to address increasing demands from the growing number of devices resulting from the Internet of Things, or IoT. IoT has brought forth countless new equipment competing for service on cellular networks. The latest in cellular technology is 5th Generation Cloud Radio Access Networks, or 5G C-RAN, which consists of an architectural design created specifically to meet novel and necessary requirements for better performance, reduced latency of service, and scalability. As part of this design is the inclusion of a virtual cache, there is a necessity for useful cache management schemes and protocols, which ultimately will provide users better performance on the cellular network. This paper explores a few different cache management schemes, and analyzes their performance in comparison to each other. They include a probability based scoring scheme for cache elements; a hierarchical, or tiered, approach aimed at separating the cache into different levels or sections; and enhancements to previously existing approaches including reverse random marking as well as a scheme based on an exponential decay model. These schemes aim to offer better hit ratios, reduced latency of request service, preferential treatment based on users’ service levels and mobility, and a reduction in network traffic compared to other traditional and classic caching mechanisms

    Security and trust in cloud computing and IoT through applying obfuscation, diversification, and trusted computing technologies

    Get PDF
    Cloud computing and Internet of Things (IoT) are very widely spread and commonly used technologies nowadays. The advanced services offered by cloud computing have made it a highly demanded technology. Enterprises and businesses are more and more relying on the cloud to deliver services to their customers. The prevalent use of cloud means that more data is stored outside the organization’s premises, which raises concerns about the security and privacy of the stored and processed data. This highlights the significance of effective security practices to secure the cloud infrastructure. The number of IoT devices is growing rapidly and the technology is being employed in a wide range of sectors including smart healthcare, industry automation, and smart environments. These devices collect and exchange a great deal of information, some of which may contain critical and personal data of the users of the device. Hence, it is highly significant to protect the collected and shared data over the network; notwithstanding, the studies signify that attacks on these devices are increasing, while a high percentage of IoT devices lack proper security measures to protect the devices, the data, and the privacy of the users. In this dissertation, we study the security of cloud computing and IoT and propose software-based security approaches supported by the hardware-based technologies to provide robust measures for enhancing the security of these environments. To achieve this goal, we use obfuscation and diversification as the potential software security techniques. Code obfuscation protects the software from malicious reverse engineering and diversification mitigates the risk of large-scale exploits. We study trusted computing and Trusted Execution Environments (TEE) as the hardware-based security solutions. Trusted Platform Module (TPM) provides security and trust through a hardware root of trust, and assures the integrity of a platform. We also study Intel SGX which is a TEE solution that guarantees the integrity and confidentiality of the code and data loaded onto its protected container, enclave. More precisely, through obfuscation and diversification of the operating systems and APIs of the IoT devices, we secure them at the application level, and by obfuscation and diversification of the communication protocols, we protect the communication of data between them at the network level. For securing the cloud computing, we employ obfuscation and diversification techniques for securing the cloud computing software at the client-side. For an enhanced level of security, we employ hardware-based security solutions, TPM and SGX. These solutions, in addition to security, ensure layered trust in various layers from hardware to the application. As the result of this PhD research, this dissertation addresses a number of security risks targeting IoT and cloud computing through the delivered publications and presents a brief outlook on the future research directions.Pilvilaskenta ja esineiden internet ovat nykyään hyvin tavallisia ja laajasti sovellettuja tekniikkoja. Pilvilaskennan pitkälle kehittyneet palvelut ovat tehneet siitä hyvin kysytyn teknologian. Yritykset enenevässä määrin nojaavat pilviteknologiaan toteuttaessaan palveluita asiakkailleen. Vallitsevassa pilviteknologian soveltamistilanteessa yritykset ulkoistavat tietojensa käsittelyä yrityksen ulkopuolelle, minkä voidaan nähdä nostavan esiin huolia taltioitavan ja käsiteltävän tiedon turvallisuudesta ja yksityisyydestä. Tämä korostaa tehokkaiden turvallisuusratkaisujen merkitystä osana pilvi-infrastruktuurin turvaamista. Esineiden internet -laitteiden lukumäärä on nopeasti kasvanut. Teknologiana sitä sovelletaan laajasti monilla sektoreilla, kuten älykkäässä terveydenhuollossa, teollisuusautomaatiossa ja älytiloissa. Sellaiset laitteet keräävät ja välittävät suuria määriä informaatiota, joka voi sisältää laitteiden käyttäjien kannalta kriittistä ja yksityistä tietoa. Tästä syystä johtuen on erittäin merkityksellistä suojata verkon yli kerättävää ja jaettavaa tietoa. Monet tutkimukset osoittavat esineiden internet -laitteisiin kohdistuvien tietoturvahyökkäysten määrän olevan nousussa, ja samaan aikaan suuri osuus näistä laitteista ei omaa kunnollisia teknisiä ominaisuuksia itse laitteiden tai niiden käyttäjien yksityisen tiedon suojaamiseksi. Tässä väitöskirjassa tutkitaan pilvilaskennan sekä esineiden internetin tietoturvaa ja esitetään ohjelmistopohjaisia tietoturvalähestymistapoja turvautumalla osittain laitteistopohjaisiin teknologioihin. Esitetyt lähestymistavat tarjoavat vankkoja keinoja tietoturvallisuuden kohentamiseksi näissä konteksteissa. Tämän saavuttamiseksi työssä sovelletaan obfuskaatiota ja diversifiointia potentiaalisiana ohjelmistopohjaisina tietoturvatekniikkoina. Suoritettavan koodin obfuskointi suojaa pahantahtoiselta ohjelmiston takaisinmallinnukselta ja diversifiointi torjuu tietoturva-aukkojen laaja-alaisen hyödyntämisen riskiä. Väitöskirjatyössä tutkitaan luotettua laskentaa ja luotettavan laskennan suoritusalustoja laitteistopohjaisina tietoturvaratkaisuina. TPM (Trusted Platform Module) tarjoaa turvallisuutta ja luottamuksellisuutta rakentuen laitteistopohjaiseen luottamukseen. Pyrkimyksenä on taata suoritusalustan eheys. Työssä tutkitaan myös Intel SGX:ää yhtenä luotettavan suorituksen suoritusalustana, joka takaa suoritettavan koodin ja datan eheyden sekä luottamuksellisuuden pohjautuen suojatun säiliön, saarekkeen, tekniseen toteutukseen. Tarkemmin ilmaistuna työssä turvataan käyttöjärjestelmä- ja sovellusrajapintatasojen obfuskaation ja diversifioinnin kautta esineiden internet -laitteiden ohjelmistokerrosta. Soveltamalla samoja tekniikoita protokollakerrokseen, työssä suojataan laitteiden välistä tiedonvaihtoa verkkotasolla. Pilvilaskennan turvaamiseksi työssä sovelletaan obfuskaatio ja diversifiointitekniikoita asiakaspuolen ohjelmistoratkaisuihin. Vankemman tietoturvallisuuden saavuttamiseksi työssä hyödynnetään laitteistopohjaisia TPM- ja SGX-ratkaisuja. Tietoturvallisuuden lisäksi nämä ratkaisut tarjoavat monikerroksisen luottamuksen rakentuen laitteistotasolta ohjelmistokerrokseen asti. Tämän väitöskirjatutkimustyön tuloksena, osajulkaisuiden kautta, vastataan moniin esineiden internet -laitteisiin ja pilvilaskentaan kohdistuviin tietoturvauhkiin. Työssä esitetään myös näkemyksiä jatkotutkimusaiheista

    Непрерывное обучение в качестве инструмента для развития умных городов: технологии, способствующие обучению

    Full text link
    This paper considers the ubiquity of technology as an enabler for lifelong learning in modern society and the impact this dependence on technology has on the strategic design of learning systems. The role of lifelong learning in modern economies and the diversity of activities associated with lifelong learning requires targeted resourcing and understanding of the meaning of lifelong learning. The dominance of technology enhanced learning in modern education is accepted as a de-facto component in the design of any learning programme. The literature on the technology enhanced learning – smart city nexus explores the technology in depth with a strong focus on learning analytics and big data applications. Evidence of the pedagogical paradigm requirements is not quite so visible and this lack of understanding of the complete model creates tensions in the design of lifelong learning systems. The agency of active learning is considered in the sense of the triune of human, education and economic, systems for the sustainable growth of a knowledge economy. Structured approaches to learning are demonstrated and comparison is drawn with smart city projects in Ireland and the United Kingdom.В статье рассматривается повсеместное распространение технологий в качестве инструмента для непрерывного обучения в современном обществе, а также влияние их связи на технологии для стратегического проектирования систем обучения. Роль непрерывного обучения в современной экономике и разнообразие видов деятельности, связанных с ним, требуют целенаправленного выделения ресурсов и понимания смысла непрерывного обучения. Доминирование технологии улучшенного обучения в современном образовании признается де-факто компонентом в разработке любой учебной программы. Литература о технологиях, развивающих взаимосвязь между обучением и умным городом, подробно исследует эту технологию, уделяя особое внимание обучающей аналитике и приложениям для работы с большими данными. Доказательства требований педагогической парадигмы не так очевидны, и это непонимание полной модели создает напряженность в разработке систем непрерывного обучения. Учреждение активного обучения рассматривается в смысле триединства человека, образования и экономики, систем устойчивого роста экономики знаний. Показаны структурированные подходы к обучению и проведено сравнение с проектами «умный город» в Ирландии и Великобритании.The authors would like to express their deepest gratitude to the Russian Foundation for Basic Research (RFBR) for the support of the research within the project No. 17-22-07001 The Complex Algorithm of Culture-Based Regeneration of Minor Industrial Cities in the Context of Agglomeration Processes in Russia and Europe.Авторы выражают глубокую благодарность Российскому фонду фундаментальных исследований (РФФИ) за поддержку исследований в рамках проекта № 17-22-07001 «Комплексный алгоритм культурной регенерации малых промышленных городов в контексте агломерационных процессов в России и Европе»

    Power Modeling and Resource Optimization in Virtualized Environments

    Get PDF
    The provisioning of on-demand cloud services has revolutionized the IT industry. This emerging paradigm has drastically increased the growth of data centers (DCs) worldwide. Consequently, this rising number of DCs is contributing to a large amount of world total power consumption. This has directed the attention of researchers and service providers to investigate a power-aware solution for the deployment and management of these systems and networks. However, these solutions could be bene\ufb01cial only if derived from a precisely estimated power consumption at run-time. Accuracy in power estimation is a challenge in virtualized environments due to the lack of certainty of actual resources consumed by virtualized entities and of their impact on applications\u2019 performance. The heterogeneous cloud, composed of multi-tenancy architecture, has also raised several management challenges for both service providers and their clients. Task scheduling and resource allocation in such a system are considered as an NP-hard problem. The inappropriate allocation of resources causes the under-utilization of servers, hence reducing throughput and energy e\ufb03ciency. In this context, the cloud framework needs an e\ufb00ective management solution to maximize the use of available resources and capacity, and also to reduce the impact of their carbon footprint on the environment with reduced power consumption. This thesis addresses the issues of power measurement and resource utilization in virtualized environments as two primary objectives. At \ufb01rst, a survey on prior work of server power modeling and methods in virtualization architectures is carried out. This helps investigate the key challenges that elude the precision of power estimation when dealing with virtualized entities. A di\ufb00erent systematic approach is then presented to improve the prediction accuracy in these networks, considering the resource abstraction at di\ufb00erent architectural levels. Resource usage monitoring at the host and guest helps in identifying the di\ufb00erence in performance between the two. Using virtual Performance Monitoring Counters (vPMCs) at a guest level provides detailed information that helps in improving the prediction accuracy and can be further used for resource optimization, consolidation and load balancing. Later, the research also targets the critical issue of optimal resource utilization in cloud computing. This study seeks a generic, robust but simple approach to deal with resource allocation in cloud computing and networking. The inappropriate scheduling in the cloud causes under- and over- utilization of resources which in turn increases the power consumption and also degrades the system performance. This work \ufb01rst addresses some of the major challenges related to task scheduling in heterogeneous systems. After a critical analysis of existing approaches, this thesis presents a rather simple scheduling scheme based on the combination of heuristic solutions. Improved resource utilization with reduced processing time can be achieved using the proposed energy-e\ufb03cient scheduling algorithm
    corecore