16,552 research outputs found
Differential Privacy Techniques for Cyber Physical Systems: A Survey
Modern cyber physical systems (CPSs) has widely being used in our daily lives
because of development of information and communication technologies (ICT).With
the provision of CPSs, the security and privacy threats associated to these
systems are also increasing. Passive attacks are being used by intruders to get
access to private information of CPSs. In order to make CPSs data more secure,
certain privacy preservation strategies such as encryption, and k-anonymity
have been presented in the past. However, with the advances in CPSs
architecture, these techniques also needs certain modifications. Meanwhile,
differential privacy emerged as an efficient technique to protect CPSs data
privacy. In this paper, we present a comprehensive survey of differential
privacy techniques for CPSs. In particular, we survey the application and
implementation of differential privacy in four major applications of CPSs named
as energy systems, transportation systems, healthcare and medical systems, and
industrial Internet of things (IIoT). Furthermore, we present open issues,
challenges, and future research direction for differential privacy techniques
for CPSs. This survey can serve as basis for the development of modern
differential privacy techniques to address various problems and data privacy
scenarios of CPSs.Comment: 46 pages, 12 figure
Internet of Things (IoT) and Cloud Computing Enabled Disaster Management
Disaster management demands a near real-time information dissemina-tion so
that the emergency services can be provided to the right people at the right
time. Recent advances in information and communication technologies enable
collection of real-time information from various sources. For example, sensors
deployed in the fields collect data about the environment. Similarly, social
networks like Twitter and Facebook can help to collect data from people in the
disaster zone. On one hand, inadequate situation awareness in disasters has
been identified as one of the primary factors in human errors with grave
consequences such as loss of lives and destruction of critical infrastructure.
On the other hand, the growing ubiquity of social media and mobile devices, and
pervasive nature of the Internet-of-Things means that there are more sources of
outbound traffic, which ultimately results in the creation of a data deluge,
beginning shortly after the onset of disaster events, leading to the problem of
information tsunami. In addition, security and privacy has crucial role to
overcome the misuse of the system for either intrusions into data or overcome
the misuse of the information that was meant for a specified purpose. .... In
this chapter, we provide such a situation aware application to support disaster
management data lifecycle, i.e. from data ingestion and processing to alert
dissemination. We utilize cloud computing, Internet of Things and social
computing technologies to achieve a scalable, effi-cient, and usable
situation-aware application called Cloud4BigData.Comment: Submitted for the book titled "Integration of Cyber-Physical Systems,
Cloud, and Internet of Things
Smart Buildings Enabled by 6G Communications
Smart building (SB), a promising solution to fast-paced and continuous
urbanization around the world, includes the integration of a wide range of
systems and services and involves the construction of multiple layers. SB is
capable of sensing, acquiring, and processing a very large amount of data as
well as performing appropriate actions and adaptation. Rapid increases in the
number of connected nodes and thereby the data transmission demand of SB have
led to conventional transmission and processing techniques becoming
insufficient to provide satisfactory services. In order to enhance the
intelligence of SBs and achieve efficient monitoring and control, sixth
generation (6G) communication technologies, particularly indoor visible light
communications (VLC) and machine learning (ML), are required to be incorporated
in SBs. Herein, we envision a novel SB framework featuring a reliable data
transmission network, powerful data processing, and reasoning abilities, all of
which are enabled by 6G communications. Primary simulation results support the
promising visions of the proposed SB framework
Internet of Cloud: Security and Privacy issues
The synergy between the cloud and the IoT has emerged largely due to the
cloud having attributes which directly benefit the IoT and enable its continued
growth. IoT adopting Cloud services has brought new security challenges. In
this book chapter, we pursue two main goals: 1) to analyse the different
components of Cloud computing and the IoT and 2) to present security and
privacy problems that these systems face. We thoroughly investigate current
security and privacy preservation solutions that exist in this area, with an
eye on the Industrial Internet of Things, discuss open issues and propose
future directionsComment: 27 pages, 4 figure
A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications
As the explosive growth of smart devices and the advent of many new
applications, traffic volume has been growing exponentially. The traditional
centralized network architecture cannot accommodate such user demands due to
heavy burden on the backhaul links and long latency. Therefore, new
architectures which bring network functions and contents to the network edge
are proposed, i.e., mobile edge computing and caching. Mobile edge networks
provide cloud computing and caching capabilities at the edge of cellular
networks. In this survey, we make an exhaustive review on the state-of-the-art
research efforts on mobile edge networks. We first give an overview of mobile
edge networks including definition, architecture and advantages. Next, a
comprehensive survey of issues on computing, caching and communication
techniques at the network edge is presented respectively. The applications and
use cases of mobile edge networks are discussed. Subsequently, the key enablers
of mobile edge networks such as cloud technology, SDN/NFV and smart devices are
discussed. Finally, open research challenges and future directions are
presented as well
A Fog Robotics Approach to Deep Robot Learning: Application to Object Recognition and Grasp Planning in Surface Decluttering
The growing demand of industrial, automotive and service robots presents a
challenge to the centralized Cloud Robotics model in terms of privacy,
security, latency, bandwidth, and reliability. In this paper, we present a `Fog
Robotics' approach to deep robot learning that distributes compute, storage and
networking resources between the Cloud and the Edge in a federated manner. Deep
models are trained on non-private (public) synthetic images in the Cloud; the
models are adapted to the private real images of the environment at the Edge
within a trusted network and subsequently, deployed as a service for
low-latency and secure inference/prediction for other robots in the network. We
apply this approach to surface decluttering, where a mobile robot picks and
sorts objects from a cluttered floor by learning a deep object recognition and
a grasp planning model. Experiments suggest that Fog Robotics can improve
performance by sim-to-real domain adaptation in comparison to exclusively using
Cloud or Edge resources, while reducing the inference cycle time by 4\times to
successfully declutter 86% of objects over 213 attempts.Comment: IEEE International Conference on Robotics and Automation, ICRA, 201
A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems
The Internet of Things (IoT) is a ubiquitous system connecting many different
devices - the things - which can be accessed from the distance. The
cyber-physical systems (CPS) monitor and control the things from the distance.
As a result, the concepts of dependability and security get deeply intertwined.
The increasing level of dynamicity, heterogeneity, and complexity adds to the
system's vulnerability, and challenges its ability to react to faults. This
paper summarizes state-of-the-art of existing work on anomaly detection,
fault-tolerance and self-healing, and adds a number of other methods applicable
to achieve resilience in an IoT. We particularly focus on non-intrusive methods
ensuring data integrity in the network. Furthermore, this paper presents the
main challenges in building a resilient IoT for CPS which is crucial in the era
of smart CPS with enhanced connectivity (an excellent example of such a system
is connected autonomous vehicles). It further summarizes our solutions,
work-in-progress and future work to this topic to enable "Trustworthy IoT for
CPS". Finally, this framework is illustrated on a selected use case: A smart
sensor infrastructure in the transport domain.Comment: preprint (2018-10-29
The ISTI Rapid Response on Exploring Cloud Computing 2018
This report describes eighteen projects that explored how commercial cloud
computing services can be utilized for scientific computation at national
laboratories. These demonstrations ranged from deploying proprietary software
in a cloud environment to leveraging established cloud-based analytics
workflows for processing scientific datasets. By and large, the projects were
successful and collectively they suggest that cloud computing can be a valuable
computational resource for scientific computation at national laboratories
All One Needs to Know about Fog Computing and Related Edge Computing Paradigms: A Complete Survey
With the Internet of Things (IoT) becoming part of our daily life and our
environment, we expect rapid growth in the number of connected devices. IoT is
expected to connect billions of devices and humans to bring promising
advantages for us. With this growth, fog computing, along with its related edge
computing paradigms, such as multi-access edge computing (MEC) and cloudlet,
are seen as promising solutions for handling the large volume of
security-critical and time-sensitive data that is being produced by the IoT. In
this paper, we first provide a tutorial on fog computing and its related
computing paradigms, including their similarities and differences. Next, we
provide a taxonomy of research topics in fog computing, and through a
comprehensive survey, we summarize and categorize the efforts on fog computing
and its related computing paradigms. Finally, we provide challenges and future
directions for research in fog computing.Comment: 48 pages, 7 tables, 11 figures, 450 references. The data (categories
and features/objectives of the papers) of this survey are now available
publicly. Accepted by Elsevier Journal of Systems Architectur
A Dynamic Service-Migration Mechanism in Edge Cognitive Computing
Driven by the vision of edge computing and the success of rich cognitive
services based on artificial intelligence, a new computing paradigm, edge
cognitive computing (ECC), is a promising approach that applies cognitive
computing at the edge of the network. ECC has the potential to provide the
cognition of users and network environmental information, and further to
provide elastic cognitive computing services to achieve a higher energy
efficiency and a higher Quality of Experience (QoE) compared to edge computing.
This paper firstly introduces our architecture of the ECC and then describes
its design issues in detail. Moreover, we propose an ECC-based dynamic service
migration mechanism to provide an insight into how cognitive computing is
combined with edge computing. In order to evaluate the proposed mechanism, a
practical platform for dynamic service migration is built up, where the
services are migrated based on the behavioral cognition of a mobile user. The
experimental results show that the proposed ECC architecture has ultra-low
latency and a high user experience, while providing better service to the user,
saving computing resources, and achieving a high energy efficiency
- …