In public video surveillance, there is an inherent conflict between public safety goals and privacy needs of citizens. Generally, societies tend to decide on middleground solutions that sacrifice neither safety nor privacy goals completely. In this paper, we propose an alternative to existing approaches that rely on cloud-based video analysis. Our approach leverages the inherent geo-distribution of fog computing to preserve privacy of citizens while still supporting camera-based digital manhunts of law enforcement agencies.
{"title":"Public Video Surveillance: Using the Fog to Increase Privacy","authors":"M. Grambow, Jonathan Hasenburg, David Bermbach","doi":"10.1145/3286719.3286722","DOIUrl":"https://doi.org/10.1145/3286719.3286722","url":null,"abstract":"In public video surveillance, there is an inherent conflict between public safety goals and privacy needs of citizens. Generally, societies tend to decide on middleground solutions that sacrifice neither safety nor privacy goals completely. In this paper, we propose an alternative to existing approaches that rely on cloud-based video analysis. Our approach leverages the inherent geo-distribution of fog computing to preserve privacy of citizens while still supporting camera-based digital manhunts of law enforcement agencies.","PeriodicalId":159597,"journal":{"name":"Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things","volume":"394 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116380998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jonathan Hasenburg, Sebastian Werner, David Bermbach
Fog application design is complex as it comprises not only the application architecture, but also the runtime infrastructure, and the deployment mapping from application modules to infrastructure machines. For each of these aspects, there is a variety of design options that all affect quality of service and cost of the resulting application. In this paper, we propose an approach for evaluating fog-based IoT applications already during an early design phase. Our approach relies on modeling and simulation to provide estimates for quality of service and cost so that developers can interactively choose a good application design.
{"title":"Supporting the Evaluation of Fog-based IoT Applications During the Design Phase","authors":"Jonathan Hasenburg, Sebastian Werner, David Bermbach","doi":"10.1145/3286719.3286720","DOIUrl":"https://doi.org/10.1145/3286719.3286720","url":null,"abstract":"Fog application design is complex as it comprises not only the application architecture, but also the runtime infrastructure, and the deployment mapping from application modules to infrastructure machines. For each of these aspects, there is a variety of design options that all affect quality of service and cost of the resulting application. In this paper, we propose an approach for evaluating fog-based IoT applications already during an early design phase. Our approach relies on modeling and simulation to provide estimates for quality of service and cost so that developers can interactively choose a good application design.","PeriodicalId":159597,"journal":{"name":"Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things","volume":"259 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115879339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The deployment of Internet of Things (IoT) devices is accelerating across a wide range of applications. The majority of today's IoT devices are powered by batteries that can operate for a maximum of a few years, after which they need to be replaced. This introduces two problems. First, the effort that is required to manually replace batteries cannot economically scale to support the next billion IoT devices. Secondly, treating billions of toxic batteries as disposable is not environmentally friendly. Together, these problems form a critical road-block in deploying IoT solutions. The biggest problem facing the designers of IoT applications is ensuring that their application software is energy efficient enough to operate within the strict power envelope that is provided by batteries or energy harvesting hardware. In this paper, we tackle this problem through the introduction of a distributed benchmarking middleware that rapidly and accurately quantifies the power consumption of different software configurations. Critically, our middleware operates in real-time across a distributed network of devices, allowing developers to experiment with code changes at runtime. This makes it significantly easier for developers to write applications that operate within the power constraints of batteries or energy harvesting systems. We evaluate our approach on a real world energy harvesting testbed and demonstrate that benchmarking results are accurate, with limited overhead for developers.
{"title":"Real-time Distributed In-Situ Benchmarking of Energy Harvesting IoT Devices","authors":"A. Thangarajan, F. Yang, W. Joosen, D. Hughes","doi":"10.1145/3286719.3286724","DOIUrl":"https://doi.org/10.1145/3286719.3286724","url":null,"abstract":"The deployment of Internet of Things (IoT) devices is accelerating across a wide range of applications. The majority of today's IoT devices are powered by batteries that can operate for a maximum of a few years, after which they need to be replaced. This introduces two problems. First, the effort that is required to manually replace batteries cannot economically scale to support the next billion IoT devices. Secondly, treating billions of toxic batteries as disposable is not environmentally friendly. Together, these problems form a critical road-block in deploying IoT solutions. The biggest problem facing the designers of IoT applications is ensuring that their application software is energy efficient enough to operate within the strict power envelope that is provided by batteries or energy harvesting hardware. In this paper, we tackle this problem through the introduction of a distributed benchmarking middleware that rapidly and accurately quantifies the power consumption of different software configurations. Critically, our middleware operates in real-time across a distributed network of devices, allowing developers to experiment with code changes at runtime. This makes it significantly easier for developers to write applications that operate within the power constraints of batteries or energy harvesting systems. We evaluate our approach on a real world energy harvesting testbed and demonstrate that benchmarking results are accurate, with limited overhead for developers.","PeriodicalId":159597,"journal":{"name":"Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130372497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Walid Younes, Sylvie Trouilhet, F. Adreit, J. Arcangeli
Ambient and mobile systems consist of networked devices and software components surrounding human users and providing services. From the services present in the environment, other services can be composed opportunistically and automatically by an intelligent system and proposed to the user. This article first presents an illustrative use case, then explores the requirements and formulates related research questions. Next, it describes our approach aimed at answering the requirements, based on distributed artificial intelligence and multi-agent systems. It reports on the development of a prototype solution, and analyzes the current status of our work towards the different research questions that we have identified.
{"title":"Towards an Intelligent User-Oriented Middleware for Opportunistic Composition of Services in Ambient Spaces","authors":"Walid Younes, Sylvie Trouilhet, F. Adreit, J. Arcangeli","doi":"10.1145/3286719.3286725","DOIUrl":"https://doi.org/10.1145/3286719.3286725","url":null,"abstract":"Ambient and mobile systems consist of networked devices and software components surrounding human users and providing services. From the services present in the environment, other services can be composed opportunistically and automatically by an intelligent system and proposed to the user. This article first presents an illustrative use case, then explores the requirements and formulates related research questions. Next, it describes our approach aimed at answering the requirements, based on distributed artificial intelligence and multi-agent systems. It reports on the development of a prototype solution, and analyzes the current status of our work towards the different research questions that we have identified.","PeriodicalId":159597,"journal":{"name":"Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124098018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Costa, N. Georgantas, R. Gomes, R. Rocha, Georgios Bouloukakis
Resource allocation for distributed systems is a well-known approach to deal with quality of service requirements. However, existing approaches do not consider the effects of resource allocation at the different levels of a system, especially when considering the end-to-end behavior of distributed compositions such as service choreographies. Based on our previous research on the optimized and QoS-aware resource allocation for service choreographies and publish-subscribe brokers, we outline a novel approach that integrates the treatment of resource allocation at both levels in order to yield a more precise control over end-to-end QoS. The paper presents an early architecture and discusses some of the main challenges towards realizing the approach.
{"title":"Cross-layer QoS-Aware Resource Allocation for IoT-Enabled Service Choreographies","authors":"F. Costa, N. Georgantas, R. Gomes, R. Rocha, Georgios Bouloukakis","doi":"10.1145/3286719.3286726","DOIUrl":"https://doi.org/10.1145/3286719.3286726","url":null,"abstract":"Resource allocation for distributed systems is a well-known approach to deal with quality of service requirements. However, existing approaches do not consider the effects of resource allocation at the different levels of a system, especially when considering the end-to-end behavior of distributed compositions such as service choreographies. Based on our previous research on the optimized and QoS-aware resource allocation for service choreographies and publish-subscribe brokers, we outline a novel approach that integrates the treatment of resource allocation at both levels in order to yield a more precise control over end-to-end QoS. The paper presents an early architecture and discusses some of the main challenges towards realizing the approach.","PeriodicalId":159597,"journal":{"name":"Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117093005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Milan Markovic, Waqar Asif, D. Corsar, Naomi Jacobs, P. Edwards, M. Rajarajan, C. Cottrill
Internet of Things (IoT) systems can often pose risk to users' privacy via disclosure of personal information to third parties. In this paper, we argue that to assess privacy risks associated with IoT systems, an automated solution is required due to the increasing pervasiveness and complexity of deployed IoT systems. We propose requirements for an automated privacy risk assessment service and outline our future plans for realising such a solution.
{"title":"Towards automated privacy risk assessments in IoT systems","authors":"Milan Markovic, Waqar Asif, D. Corsar, Naomi Jacobs, P. Edwards, M. Rajarajan, C. Cottrill","doi":"10.1145/3286719.3286723","DOIUrl":"https://doi.org/10.1145/3286719.3286723","url":null,"abstract":"Internet of Things (IoT) systems can often pose risk to users' privacy via disclosure of personal information to third parties. In this paper, we argue that to assess privacy risks associated with IoT systems, an automated solution is required due to the increasing pervasiveness and complexity of deployed IoT systems. We propose requirements for an automated privacy risk assessment service and outline our future plans for realising such a solution.","PeriodicalId":159597,"journal":{"name":"Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127339528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stevan Coroller, S. Chabridon, M. Laurent-Maknavicius, D. Conan, J. Leneutre
The Internet of Things paradigm lacks end-to-end privacy solutions to consider its full adoption in real life scenarios in the near future. The recent enactment of the EU General Data Protection Regulation (GDPR) indeed emphasises the need for stronger security and privacy measures for personal data processing and free movement, including consent management and accountability by the data controller and processor. In this paper, we suggest an architecture to enforce end-to-end data usage control in Distributed Event-Based Systems (DEBS), from data producers to consumer services, taking into account some of the GDPR requirements concerning consent management and data processing transparency. Our architecture proposal is based on UCONABC usage control models, which we overlap with a distributed hash table overlay for scalability and fault-tolerance concerns, and across and within systems data usage control. Our proposal highlights the benefits of combining both DEBS and end-user usage control architectures. To complete our approach, we quickly survey existing encryption models that ensure data confidentiality in topic-based Publish/Subscribe systems and highlight the remaining obstacles to transpose them to content-based DEBS with an overlay of brokers.
{"title":"Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things","authors":"Stevan Coroller, S. Chabridon, M. Laurent-Maknavicius, D. Conan, J. Leneutre","doi":"10.1145/3286719.3286727","DOIUrl":"https://doi.org/10.1145/3286719.3286727","url":null,"abstract":"The Internet of Things paradigm lacks end-to-end privacy solutions to consider its full adoption in real life scenarios in the near future. The recent enactment of the EU General Data Protection Regulation (GDPR) indeed emphasises the need for stronger security and privacy measures for personal data processing and free movement, including consent management and accountability by the data controller and processor. In this paper, we suggest an architecture to enforce end-to-end data usage control in Distributed Event-Based Systems (DEBS), from data producers to consumer services, taking into account some of the GDPR requirements concerning consent management and data processing transparency. Our architecture proposal is based on UCONABC usage control models, which we overlap with a distributed hash table overlay for scalability and fault-tolerance concerns, and across and within systems data usage control. Our proposal highlights the benefits of combining both DEBS and end-user usage control architectures. To complete our approach, we quickly survey existing encryption models that ensure data confidentiality in topic-based Publish/Subscribe systems and highlight the remaining obstacles to transpose them to content-based DEBS with an overlay of brokers.","PeriodicalId":159597,"journal":{"name":"Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134054786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
César Batista, Pedro Victor Silva, Everton Cavalcante, T. Batista, Tiago Barros, C. Takahashi, Thiago Cardoso, João Alexandre Neto, Ramon Ribeiro
With the rising popularity of IoT, several platforms have been proposed for supporting the development of IoT applications. KNoT and FIWARE are examples of open-source platforms with a complementary purpose. While KNoT is a gateway-based middleware to embed connectivity into devices and route messages between them and applications, FIWARE provides a rich ecosystem with standardized APIs for developing IoT applications. Aiming at combining the KNoT capability of integrating a plethora of devices with the high-level abstractions provided by the FIWARE platform, this paper presents the KNoT-FI environment. It integrates KNoT and FIWARE towards easing the development of IoT applications and seamlessly using capabilities of devices with or without native Internet connection through the FIWARE advanced interfaces. This paper also presents a validation of KNoT-FI in the development of a real-world application that automatically manages lighting, temperature, and ambient sound in smart buildings.
{"title":"A Middleware Environment for Developing Internet of Things Applications","authors":"César Batista, Pedro Victor Silva, Everton Cavalcante, T. Batista, Tiago Barros, C. Takahashi, Thiago Cardoso, João Alexandre Neto, Ramon Ribeiro","doi":"10.1145/3286719.3286728","DOIUrl":"https://doi.org/10.1145/3286719.3286728","url":null,"abstract":"With the rising popularity of IoT, several platforms have been proposed for supporting the development of IoT applications. KNoT and FIWARE are examples of open-source platforms with a complementary purpose. While KNoT is a gateway-based middleware to embed connectivity into devices and route messages between them and applications, FIWARE provides a rich ecosystem with standardized APIs for developing IoT applications. Aiming at combining the KNoT capability of integrating a plethora of devices with the high-level abstractions provided by the FIWARE platform, this paper presents the KNoT-FI environment. It integrates KNoT and FIWARE towards easing the development of IoT applications and seamlessly using capabilities of devices with or without native Internet connection through the FIWARE advanced interfaces. This paper also presents a validation of KNoT-FI in the development of a real-world application that automatically manages lighting, temperature, and ambient sound in smart buildings.","PeriodicalId":159597,"journal":{"name":"Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127300827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet of Things platforms are used increasingly to connect devices, applications, and users. Internal and external events, such as updates and calamities, may alter the policies that are actively enforced to meet quality and functional requirements. While many of the events resulting in policy change can be anticipated, exceptional situations such as a terrorist attack urge the need for rapid dynamic installation and activation of response policies. In this paper, we classify events based on expectedness of time of occurrence and of response measures. Furthermore, we examine the requirements of a policy system that enforces qualities and behaviour in an IoT platform based on adaptive policies for expected and unexpected events. We evaluate the impact of these expectedness levels on a hierarchical conceptual policy system model.
{"title":"Expect the unexpected: Towards a middleware for policy adaptation in IoT platforms","authors":"D. Jonckers, B. Lagaisse, W. Joosen","doi":"10.1145/3286719.3286721","DOIUrl":"https://doi.org/10.1145/3286719.3286721","url":null,"abstract":"Internet of Things platforms are used increasingly to connect devices, applications, and users. Internal and external events, such as updates and calamities, may alter the policies that are actively enforced to meet quality and functional requirements. While many of the events resulting in policy change can be anticipated, exceptional situations such as a terrorist attack urge the need for rapid dynamic installation and activation of response policies. In this paper, we classify events based on expectedness of time of occurrence and of response measures. Furthermore, we examine the requirements of a policy system that enforces qualities and behaviour in an IoT platform based on adaptive policies for expected and unexpected events. We evaluate the impact of these expectedness levels on a hierarchical conceptual policy system model.","PeriodicalId":159597,"journal":{"name":"Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116814817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Batista, Stéphane Delbruel, David Bermbach, D. Eyers, D. Hughes, C. Taconet, Erik Wittern
{"title":"Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things","authors":"T. Batista, Stéphane Delbruel, David Bermbach, D. Eyers, D. Hughes, C. Taconet, Erik Wittern","doi":"10.1145/3286719","DOIUrl":"https://doi.org/10.1145/3286719","url":null,"abstract":"","PeriodicalId":159597,"journal":{"name":"Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115441366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}