286 research outputs found

    Investigating IoT Middleware Platforms for Smart Application Development

    Full text link
    With the growing number of Internet of Things (IoT) devices, the data generated through these devices is also increasing. By 2030, it is been predicted that the number of IoT devices will exceed the number of human beings on earth. This gives rise to the requirement of middleware platform that can manage IoT devices, intelligently store and process gigantic data generated for building smart applications such as Smart Cities, Smart Healthcare, Smart Industry, and others. At present, market is overwhelming with the number of IoT middleware platforms with specific features. This raises one of the most serious and least discussed challenge for application developer to choose suitable platform for their application development. Across the literature, very little attempt is done in classifying or comparing IoT middleware platforms for the applications. This paper categorizes IoT platforms into four categories namely-publicly traded, open source, developer friendly and end-to-end connectivity. Some of the popular middleware platforms in each category are investigated based on general IoT architecture. Comparison of IoT middleware platforms in each category, based on basic, sensing, communication and application development features is presented. This study can be useful for IoT application developers to select the most appropriate platform according to their application requirement

    Internet of Things: Current Challenges in the Quality Assurance and Testing Methods

    Full text link
    Contemporary development of the Internet of Things (IoT) technology brings a number of challenges in the Quality Assurance area. Current issues related to security, user's privacy, the reliability of the service, interoperability, and integration are discussed. All these create a demand for specific Quality Assurance methodology for the IoT solutions. In the paper, we present the state of the art of this domain and we discuss particular areas of system testing discipline, which is not covered by related work sufficiently so far. This analysis is supported by results of a recent survey we performed among ten IoT solutions providers, covering various areas of IoT applications.Comment: 10 pages Internet of Things (IoT

    Softwarization of Internet of Things Infrastructure for Secure and Smart Healthcare

    Full text link
    We propose an agile softwarized infrastructure for flexible, cost effective, secure and privacy preserving deployment of Internet of Things (IoT) for smart healthcare applications and services. It integrates state-of-the-art networking and virtualization techniques across IoT, fog and cloud domains, employing Blockchain, Tor and message brokers to provide security and privacy for patients and healthcare providers. We propose a novel platform using Machine-to-Machine (M2M) messaging and rule-based beacons for seamless data management and discuss the role of data and decision fusion in the cloud and the fog, respectively, for smart healthcare applications and services.Comment: 9 pages, 3 figure

    Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security.

    Get PDF
    With the advances in machine learning (ML) and deep learning (DL) techniques, and the potency of cloud computing in offering services efficiently and cost-effectively, Machine Learning as a Service (MLaaS) cloud platforms have become popular. In addition, there is increasing adoption of third-party cloud services for outsourcing training of DL models, which requires substantial costly computational resources (e.g., high-performance graphics processing units (GPUs)). Such widespread usage of cloud-hosted ML/DL services opens a wide range of attack surfaces for adversaries to exploit the ML/DL system to achieve malicious goals. In this article, we conduct a systematic evaluation of literature of cloud-hosted ML/DL models along both the important dimensions-attacks and defenses-related to their security. Our systematic review identified a total of 31 related articles out of which 19 focused on attack, six focused on defense, and six focused on both attack and defense. Our evaluation reveals that there is an increasing interest from the research community on the perspective of attacking and defending different attacks on Machine Learning as a Service platforms. In addition, we identify the limitations and pitfalls of the analyzed articles and highlight open research issues that require further investigation

    Fair Selection of Edge Nodes to Participate in Clustered Federated Multitask Learning

    Full text link
    Clustered federated Multitask learning is introduced as an efficient technique when data is unbalanced and distributed amongst clients in a non-independent and identically distributed manner. While a similarity metric can provide client groups with specialized models according to their data distribution, this process can be time-consuming because the server needs to capture all data distribution first from all clients to perform the correct clustering. Due to resource and time constraints at the network edge, only a fraction of devices {is} selected every round, necessitating the need for an efficient scheduling technique to address these issues. Thus, this paper introduces a two-phased client selection and scheduling approach to improve the convergence speed while capturing all data distributions. This approach ensures correct clustering and fairness between clients by leveraging bandwidth reuse for participants spent a longer time training their models and exploiting the heterogeneity in the devices to schedule the participants according to their delay. The server then performs the clustering depending on predetermined thresholds and stopping criteria. When a specified cluster approximates a stopping point, the server employs a greedy selection for that cluster by picking the devices with lower delay and better resources. The convergence analysis is provided, showing the relationship between the proposed scheduling approach and the convergence rate of the specialized models to obtain convergence bounds under non-i.i.d. data distribution. We carry out extensive simulations, and the results demonstrate that the proposed algorithms reduce training time and improve the convergence speed while equipping every user with a customized model tailored to its data distribution.Comment: To appear in IEEE Transactions on Network and Service Management, Special issue on Federated Learning for the Management of Networked System

    Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally

    Get PDF
    Deep neural networks (DNNs) have been the driving force behind many of the recent advances in machine learning. However, research has shown that DNNs are vulnerable to adversarial examples - input samples that have been perturbed to force DNN-based models to make errors. As a result, adversarial machine learning (AdvML) has gained a lot of attention, and researchers have investigated these vulnerabilities in various settings and modalities. In addition, DNNs have also been found to incorporate embedded bias and often produce unexplainable predictions, which can result in antisocial AI applications. The emergence of new AI technologies that leverage large language models (LLMs), such as ChatGPT and GPT-4, increases the risk of producing antisocial applications at scale. AdvML for social good (AdvML4G) is an emerging field that repurposes the AdvML bug to invent prosocial applications. Regulators, practitioners, and researchers should collaborate to encourage the development of prosocial applications and hinder the development of antisocial ones. In this work, we provide the first comprehensive review of the emerging field of AdvML4G. This paper encompasses a taxonomy that highlights the emergence of AdvML4G, a discussion of the differences and similarities between AdvML4G and AdvML, a taxonomy covering social good-related concepts and aspects, an exploration of the motivations behind the emergence of AdvML4G at the intersection of ML4G and AdvML, and an extensive summary of the works that utilize AdvML4G as an auxiliary tool for innovating prosocial applications. Finally, we elaborate upon various challenges and open research issues that require significant attention from the research community

    Securing combined Fog-to-Cloud systems: challenges and directions

    Get PDF
    Nowadays, fog computing is emerged for providing computational power closer to the users. Fog computing brings real-time processing, lowlatency, geo-distributed and etc. Although, fog computing do not come to compete cloud computing, it comes to collaborate. Recently, Fog-To-Cloud (F2C) continuum system is introduced to provide hierarchical computing system and facilitates fog-cloud collaboration. This F2C continuum system might encounter security issues and challenges due to their hierarchical and distributed nature. In this paper, we analyze attacks in different layer of F2C system and identify most potential security requirements and challenges for the F2C continuum system. Finally, we introduce the most remarkable efforts and trends for bringing secure F2C system.This work is supported by the H2020 projects mF2C (730929). It is also supported by the Spanish Ministry of Economy and Competitiveness and the European Regional Development Fund both under contract RTI2018-094532-B-100.Peer ReviewedPostprint (author's final draft
    corecore