1,120 research outputs found
FORTIFYING SECURITY AND INTEGRITY IN CLOUD
Data integrity and security are the main concerns in cloud. In this paper we propose an adequate and impressive scheme by using dynamic data support to ensure that the data in cloud is correct and error less. The new scheme proposed in this paper supports modification, deletion and updating the data blocks present in the cloud server. The main problem is the efficiency and security to verify that the storage server is storing the client’s outsourced data. The necessary security and efficiency has to be provided to the server which can be small computing device with limite
Interoperability in IoT
Interoperability refers to the ability of IoT systems and components to communicate and share information among them. This crucial feature is key to unlock all of the IoT paradigm´s potential, including immense technological, economic, and social benefits. Interoperability is currently a major challenge in IoT, mainly due to the lack of a reference standard and the vast heterogeneity of IoT systems. IoT interoperability has also a significant importance in big data analytics because it substantively eases data processing. This chapter analyzes the critical importance of IoT interoperability, its different types, challenges to face, diverse use cases, and prospective interoperability solutions. Given that it is a complex concept that involves multiple aspects and elements of IoT, for a deeper insight, interoperability is studied across different levels of IoT systems. Furthermore, interoperability is also re-examined from a global approach among platforms and systems.González-Usach, R.; Yacchirema-Vargas, DC.; Julián-SeguĂ, M.; Palau Salvador, CE. (2019). Interoperability in IoT. Handbook of Research on Big Data and the IoT. 149-173. http://hdl.handle.net/10251/150250S14917
View on 5G Architecture: Version 2.0
The 5G Architecture Working Group as part of the 5GPPP Initiative is looking at capturing novel trends and key technological enablers for the realization of the 5G architecture. It also targets at presenting in a harmonized way the architectural concepts developed in various projects and initiatives (not limited to 5GPPP projects only) so as to provide a consolidated view on the technical directions for the architecture design in the 5G era. The first version of the white paper was released in July 2016, which captured novel trends and key technological enablers for the realization of the 5G architecture vision along with harmonized architectural concepts from 5GPPP Phase 1 projects and initiatives. Capitalizing on the architectural vision and framework set by the first version of the white paper, this Version 2.0 of the white paper presents the latest findings and analyses with a particular focus on the concept evaluations, and accordingly it presents the consolidated overall architecture design
Facing the Giant: a Grounded Theory Study of Decision-Making in Microservices Migrations
Background: Microservices migrations are challenging and expensive projects
with many decisions that need to be made in a multitude of dimensions. Existing
research tends to focus on technical issues and decisions (e.g., how to split
services). Equally important organizational or business issues and their
relations with technical aspects often remain out of scope or on a high level
of abstraction. Aims: In this study, we aim to holistically chart the
decision-making that happens on all dimensions of a migration project towards
microservices (including, but not limited to, the technical dimension). Method:
We investigate 16 different migration cases in a grounded theory interview
study, with 19 participants that recently migrated towards microservices. This
study strongly focuses on the human aspects of a migration, through
stakeholders and their decisions. Results: We identify 3 decision-making
processes consisting of 22decision-points and their alternative options. The
decision-points are related to creating stakeholder engagement and assessing
feasibility, technical implementation, and organizational restructuring.
Conclusions: Our study provides an initial theory of decision-making in
migrations to microservices. It also outfits practitioners with a roadmap of
which decisions they should be prepared to make and at which point in the
migration.Comment: 11 pages, 7 figure
Optimizing compilation with preservation of structural code coverage metrics to support software testing
Code-coverage-based testing is a widely-used testing strategy with the aim of providing a meaningful decision criterion for the adequacy of a test suite. Code-coverage-based testing is also mandated for the development of safety-critical applications; for example, the DO178b document requires the application of the modified condition/decision coverage. One critical issue of code-coverage testing is that structural code coverage criteria are typically applied to source code whereas the generated machine code may result in a different code structure because of code optimizations performed by a compiler. In this work, we present the automatic calculation of coverage profiles describing which structural code-coverage criteria are preserved by which code optimization, independently of the concrete test suite. These coverage profiles allow to easily extend compilers with the feature of preserving any given code-coverage criteria by enabling only those code optimizations that preserve it. Furthermore, we describe the integration of these coverage profile into the compiler GCC. With these coverage profiles, we answer the question of how much code optimization is possible without compromising the error-detection likelihood of a given test suite. Experimental results conclude that the performance cost to achieve preservation of structural code coverage in GCC is rather low.Peer reviewedSubmitted Versio
A Survey of Green Networking Research
Reduction of unnecessary energy consumption is becoming a major concern in
wired networking, because of the potential economical benefits and of its
expected environmental impact. These issues, usually referred to as "green
networking", relate to embedding energy-awareness in the design, in the devices
and in the protocols of networks. In this work, we first formulate a more
precise definition of the "green" attribute. We furthermore identify a few
paradigms that are the key enablers of energy-aware networking research. We
then overview the current state of the art and provide a taxonomy of the
relevant work, with a special focus on wired networking. At a high level, we
identify four branches of green networking research that stem from different
observations on the root causes of energy waste, namely (i) Adaptive Link Rate,
(ii) Interface proxying, (iii) Energy-aware infrastructures and (iv)
Energy-aware applications. In this work, we do not only explore specific
proposals pertaining to each of the above branches, but also offer a
perspective for research.Comment: Index Terms: Green Networking; Wired Networks; Adaptive Link Rate;
Interface Proxying; Energy-aware Infrastructures; Energy-aware Applications.
18 pages, 6 figures, 2 table
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms
Adaptive Parallel Iterative Deepening Search
Many of the artificial intelligence techniques developed to date rely on
heuristic search through large spaces. Unfortunately, the size of these spaces
and the corresponding computational effort reduce the applicability of
otherwise novel and effective algorithms. A number of parallel and distributed
approaches to search have considerably improved the performance of the search
process. Our goal is to develop an architecture that automatically selects
parallel search strategies for optimal performance on a variety of search
problems. In this paper we describe one such architecture realized in the
Eureka system, which combines the benefits of many different approaches to
parallel heuristic search. Through empirical and theoretical analyses we
observe that features of the problem space directly affect the choice of
optimal parallel search strategy. We then employ machine learning techniques to
select the optimal parallel search strategy for a given problem space. When a
new search task is input to the system, Eureka uses features describing the
search space and the chosen architecture to automatically select the
appropriate search strategy. Eureka has been tested on a MIMD parallel
processor, a distributed network of workstations, and a single workstation
using multithreading. Results generated from fifteen puzzle problems, robot arm
motion problems, artificial search spaces, and planning problems indicate that
Eureka outperforms any of the tested strategies used exclusively for all
problem instances and is able to greatly reduce the search time for these
applications
Integrated Project Support Study Group : findings
The challenges of the LHC project have lead CERN to produce a comprehensive set of project management tools covering engineering data management, project scheduling and costing, event management and document management. Each of these tools represents a significant and world-recognised advance in their respective domains. Reviewing the offering on the eve of LHC commissioning one can identify three major challenges: 1. How to integrate the tools to provide a uniform and integrated full-product lifecycle solution 2. How to evolve the functionality in certain areas to address weaknesses identified with our experience in constructing the LHC and integrate emerging industry best practices 3. How to coherently package the offering not just for future projects in CERN, but moreover in the context of providing a centre of excellence for worldwide collaboration in future HEP projects
- …