42 research outputs found

    Pruning Edge Research with Latency Shears

    Get PDF
    Edge computing has gained attention from both academia and industry by pursuing two significant challenges: 1) moving latency critical services closer to the users, 2) saving network bandwidth by aggregating large flows before sending them to the cloud. While the rationale appeared sound at its inception almost a decade ago, several current trends are impacting it. Clouds have spread geographically reducing end-user latency, mobile phones? computing capabilities are improving, and network bandwidth at the core keeps increasing. In this paper, we scrutinize edge computing, examining its outlook and future in the context of these trends. We perform extensive client-to-cloud measurements using RIPE Atlas, and show that latency reduction as motivation for edge is not as persuasive as once believed; for most applications the cloud is already 'close enough' for majority of the world's population. This implies that edge computing may only be applicable for certain application niches, as opposed to a general-purpose solution.Peer reviewe

    IoT Expunge: Implementing Verifiable Retention of IoT Data

    Full text link
    The growing deployment of Internet of Things (IoT) systems aims to ease the daily life of end-users by providing several value-added services. However, IoT systems may capture and store sensitive, personal data about individuals in the cloud, thereby jeopardizing user-privacy. Emerging legislation, such as California's CalOPPA and GDPR in Europe, support strong privacy laws to protect an individual's data in the cloud. One such law relates to strict enforcement of data retention policies. This paper proposes a framework, entitled IoT Expunge that allows sensor data providers to store the data in cloud platforms that will ensure enforcement of retention policies. Additionally, the cloud provider produces verifiable proofs of its adherence to the retention policies. Experimental results on a real-world smart building testbed show that IoT Expunge imposes minimal overheads to the user to verify the data against data retention policies.Comment: This paper has been accepted in 10th ACM Conference on Data and Application Security and Privacy (CODASPY), 202

    A haystack full of needles: scalable detection of IoT devices in the wild

    Get PDF
    Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich and diverse functionalities, from voice assistants to home appliances. These functionalities often come with significant privacy and security risks, with notable recent large scale coordinated global attacks disrupting large service providers. Thus, an important first step to address these risks is to know what IoT devices are where in a network. While some limited solutions exist, a key question is whether device discovery can be done by Internet service providers that only see sampled flow statistics. In particular, it is challenging for an ISP to efficiently and effectively track and trace activity from IoT devices deployed by its millions of subscribers --all with sampled network data. In this paper, we develop and evaluate a scalable methodology to accurately detect and monitor IoT devices at subscriber lines with limited, highly sampled data in-the-wild. Our findings indicate that millions of IoT devices are detectable and identifiable within hours, both at a major ISP as well as an IXP, using passive, sparsely sampled network flow headers. Our methodology is able to detect devices from more than 77% of the studied IoT manufacturers, including popular devices such as smart speakers. While our methodology is effective for providing network analytics, it also highlights significant privacy consequences

    Biotechnology and the Politics of Truth : From the Green Revolution to an Evergreen Revolution

    Get PDF
    This paper investigates why and how issues around the diffusion of GM technologies and products to developing countries have become so central to a debate which has shifted away from technical issues of cost-benefit optimisation in a context of uniform mass production and consumption in the North, to the moral case for GM crops to feed the hungry and aid ‘development’ in the South. Using comparison between agricultural biotechnology and the ‘Green Revolution’ as a cross cutting theme, the contributions of this paper are threefold. Firstly, by analysing biotechnology as a set of overlapping frames within a discursive formation, four frames are identified which summarise key challenges presented by biotechnology era. Secondly, the use of Foucault's concept of bio-power to synthesise key themes from the frame analysis illuminates the ‘revolutionary’ nature of the biotech revolution. Thirdly, the potential of actor-network theory to provide a tools for the empirical study of processes of (re)negotiation of nature/society relations in the context of agricultural biotechnology controversies is explored

    Women, literacy and health: comparing health and education sectoral approaches in Nepal

    Get PDF
    Functional adult literacy interventions have been regarded for many decades by policy makers as an effective way of imparting health knowledge. Supported by research on the statistical relationships between women’s literacy rates and health indicators, this dominant policy discourse is based on assumptions that non-literate women lack understanding and confidence, and that formal programmes and institutions constitute the main sites of learning. Proposing a broader conceptualisation of literacy as a social practice and of health as connected with social justice, this article draws on policy analysis and the authors’ earlier research in Nepal to re-examine the relationship between gender, literacy and health. By comparing health and literacy approaches used within the education and health sectors and taking account of new and indigenous informal learning practices, the article points to ways of investigating the complex interaction of factors that influence inequalities in gender and health at community level

    Chronic and structural poverty in South Africa: Challenges for action and research

    Get PDF
    Ten years after liberation, the persistence of poverty is one of the most important and urgent problems facing South Africa. This paper reflects on some of the findings based on research undertaken as part of the participation of the Programme for Land and Agrarian Studies (PLAAS) at the University of the Western Cape in the work of the Chronic Poverty Research Centre (CPRC), situates it within the broader literature on poverty in South Africa, and considers some emergent challenges. Although PLAAS’s survey, being only the first wave of a panel study, does not yet cast light on short term poverty dynamics, it illuminates key aspects of the structural conditions that underpin long-term poverty: the close interactions between asset poverty, employment-vulnerability and subjection to unequal social power relations. Coming to grips with these dynamics requires going beyond the limitations of conventional ‘sustainable livelihoods’ analyses; and functionalist analyses of South African labour markets. The paper argues for a re-engagement with the traditions of critical sociology, anthropology and the theoretical conventions that allow a closer exploration of the political economy of chronic poverty at micro and macro level

    Sieve

    No full text
    corecore