96 research outputs found
Investigating IoT Middleware Platforms for Smart Application Development
With the growing number of Internet of Things (IoT) devices, the data
generated through these devices is also increasing. By 2030, it is been
predicted that the number of IoT devices will exceed the number of human beings
on earth. This gives rise to the requirement of middleware platform that can
manage IoT devices, intelligently store and process gigantic data generated for
building smart applications such as Smart Cities, Smart Healthcare, Smart
Industry, and others. At present, market is overwhelming with the number of IoT
middleware platforms with specific features. This raises one of the most
serious and least discussed challenge for application developer to choose
suitable platform for their application development. Across the literature,
very little attempt is done in classifying or comparing IoT middleware
platforms for the applications. This paper categorizes IoT platforms into four
categories namely-publicly traded, open source, developer friendly and
end-to-end connectivity. Some of the popular middleware platforms in each
category are investigated based on general IoT architecture. Comparison of IoT
middleware platforms in each category, based on basic, sensing, communication
and application development features is presented. This study can be useful for
IoT application developers to select the most appropriate platform according to
their application requirement
Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security.
With the advances in machine learning (ML) and deep learning (DL) techniques, and the potency of cloud computing in offering services efficiently and cost-effectively, Machine Learning as a Service (MLaaS) cloud platforms have become popular. In addition, there is increasing adoption of third-party cloud services for outsourcing training of DL models, which requires substantial costly computational resources (e.g., high-performance graphics processing units (GPUs)). Such widespread usage of cloud-hosted ML/DL services opens a wide range of attack surfaces for adversaries to exploit the ML/DL system to achieve malicious goals. In this article, we conduct a systematic evaluation of literature of cloud-hosted ML/DL models along both the important dimensions-attacks and defenses-related to their security. Our systematic review identified a total of 31 related articles out of which 19 focused on attack, six focused on defense, and six focused on both attack and defense. Our evaluation reveals that there is an increasing interest from the research community on the perspective of attacking and defending different attacks on Machine Learning as a Service platforms. In addition, we identify the limitations and pitfalls of the analyzed articles and highlight open research issues that require further investigation
Fair Selection of Edge Nodes to Participate in Clustered Federated Multitask Learning
Clustered federated Multitask learning is introduced as an efficient
technique when data is unbalanced and distributed amongst clients in a
non-independent and identically distributed manner. While a similarity metric
can provide client groups with specialized models according to their data
distribution, this process can be time-consuming because the server needs to
capture all data distribution first from all clients to perform the correct
clustering. Due to resource and time constraints at the network edge, only a
fraction of devices {is} selected every round, necessitating the need for an
efficient scheduling technique to address these issues. Thus, this paper
introduces a two-phased client selection and scheduling approach to improve the
convergence speed while capturing all data distributions. This approach ensures
correct clustering and fairness between clients by leveraging bandwidth reuse
for participants spent a longer time training their models and exploiting the
heterogeneity in the devices to schedule the participants according to their
delay. The server then performs the clustering depending on predetermined
thresholds and stopping criteria. When a specified cluster approximates a
stopping point, the server employs a greedy selection for that cluster by
picking the devices with lower delay and better resources. The convergence
analysis is provided, showing the relationship between the proposed scheduling
approach and the convergence rate of the specialized models to obtain
convergence bounds under non-i.i.d. data distribution. We carry out extensive
simulations, and the results demonstrate that the proposed algorithms reduce
training time and improve the convergence speed while equipping every user with
a customized model tailored to its data distribution.Comment: To appear in IEEE Transactions on Network and Service Management,
Special issue on Federated Learning for the Management of Networked System
Securing combined Fog-to-Cloud systems: challenges and directions
Nowadays, fog computing is emerged for providing computational power closer to the users. Fog computing brings real-time processing, lowlatency, geo-distributed and etc. Although, fog computing do not come to compete cloud computing, it comes to collaborate. Recently, Fog-To-Cloud (F2C) continuum system is introduced to provide hierarchical computing system and facilitates fog-cloud collaboration. This F2C continuum system might encounter security issues and challenges due to their hierarchical and distributed nature. In this paper, we analyze attacks in different layer of F2C system and identify most potential security requirements and challenges for the F2C continuum system. Finally, we introduce the most remarkable efforts and trends for bringing secure F2C system.This work is supported by the H2020 projects mF2C (730929). It is also supported by the Spanish Ministry of Economy and Competitiveness and the European Regional Development Fund both under contract RTI2018-094532-B-100.Peer ReviewedPostprint (author's final draft
From mechatronics to the Cloud
At its conception mechatronics was viewed purely in terms of the ability to integrate the technologies of mechanical and electrical engineering with computer science to transfer functionality, and hence complexity, from the mechanical domain to the software domain. However, as technologies, and in particular computing technologies, have evolved so the nature of mechatronics has changed from being purely associated with essentially stand-alone systems such as robots to providing the smart objects and systems which are the building blocks for Cyber-Physical Systems, and hence for Internet of Things and Cloud-based systems. With the possible advent of a 4th Industrial Revolution structured around these systems level concepts, mechatronics must again adapt its world view, if not its underlying technologies, to meet this new challenge
- …