Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.38
N. Miloslavskaya, A. Makhmudova
Today the information security (IS) of data mining is the crucial and comprehensive issue for organizations of the different spheres and size. The main challenges of Big Data IT are management of large amounts of heterogeneous information and providing its availability. Big Data protection against unauthorized access and corruption (keeping its confidentiality and integrity) as well as availability maintenance form the key research priorities in this field. The issues related to providing these Big Data features are considered in the paper. The existing approaches to their solution are analyzed. Some concepts for their improvement while designing the secure Big Data mining algorithm are formulated in accordance to IS properties.
{"title":"Survey of Big Data Information Security","authors":"N. Miloslavskaya, A. Makhmudova","doi":"10.1109/W-FiCloud.2016.38","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.38","url":null,"abstract":"Today the information security (IS) of data mining is the crucial and comprehensive issue for organizations of the different spheres and size. The main challenges of Big Data IT are management of large amounts of heterogeneous information and providing its availability. Big Data protection against unauthorized access and corruption (keeping its confidentiality and integrity) as well as availability maintenance form the key research priorities in this field. The issues related to providing these Big Data features are considered in the paper. The existing approaches to their solution are analyzed. Some concepts for their improvement while designing the secure Big Data mining algorithm are formulated in accordance to IS properties.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129243471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.25
W. F. Elsadek, M. Mikhail
The tremendous evolution in IoT real time services that requires continuous connectivity to enterprise, residential, and private cloud services stimulates operators and enterprises to rethink of their current adopted mobility solutions for wider service accessibility. Proxy Mobile IPv6 (PMIPv6) is widely adopted in 4G Long Term Evolution (LTE) and WiFi Hotspots for its wide area coverage while Control And Provisioning of Wireless Access Points (CAPWAP) protocol is preferred in enterprise's Wireless LAN Controller (WLCs) for its unified access for both wired and wireless networks. Both protocols struggle when offering mobility solutions between enterprises with different administration to ensure optimized WAN usage with minimum latency and guaranteed QoS while satisfying the unified access, and the privacy compliance requirements. LTE provides a partial solution for inter-domain mobility crossing enterprises which is even hard for WiFi service provider to offer. This paper proposes am inter-domain mobility framework based on Software defined Network (SDN) that overcomes previous protocols' challenges. The proposed framework is LTE independent thus it can be adopted cross enterprises or smart cities or through WiFi or LTE service provider. The Enterprise wired network can be a full migrated SDN network or a standard switched network. The framework uses SDN mobility overlay to transparently detect mobile node's (MN) registration and make selective break out based on the MN's subscription profiles while providing simultaneous access to the registered services as home, intranet, and internet. The framework is an initiative toward smooth migration of existing infrastructures to the next generation SDN service platform where mobility is provided as a service. A prototype is created to support the proposed framework. The experimental results show that MNs are successfully identified and their mobility profiles are activated in almost 1.3~3 seconds while standard MN's packets are wire speed forwarded with almost zero latency.
物联网实时服务的巨大发展需要持续连接到企业、住宅和私有云服务,这促使运营商和企业重新考虑他们目前采用的移动解决方案,以获得更广泛的服务可访问性。代理移动IPv6 (Proxy Mobile IPv6, PMIPv6)因其广域覆盖被广泛应用于4G LTE (Long Term Evolution)和WiFi热点,而CAPWAP (Control and Provisioning of Wireless Access Points)协议因其对有线和无线网络的统一接入而被企业无线局域网控制器(Wireless LAN Controller, wlc)首选。在提供具有不同管理的企业之间的移动解决方案时,这两个协议都在努力确保以最小延迟和有保证的QoS优化WAN使用,同时满足统一访问和隐私遵从性需求。LTE为跨企业的跨域移动提供了部分解决方案,这是WiFi服务提供商难以提供的。本文提出了一种基于软件定义网络(SDN)的域间移动框架,克服了现有协议存在的问题。该框架与LTE无关,因此可以跨企业或智慧城市采用,也可以通过WiFi或LTE服务提供商采用。企业有线网络可以是完全迁移的SDN网络,也可以是标准的交换网络。该框架使用SDN移动性覆盖透明地检测移动节点(MN)的注册,并根据MN的订阅配置文件进行选择性中断,同时提供对家庭、内部网和互联网注册服务的同时访问。该框架旨在将现有基础设施顺利迁移到下一代SDN业务平台,从而将移动性作为一种服务提供。创建一个原型来支持提议的框架。实验结果表明,该方法可以在1.3~3秒内成功地识别出MN,激活其移动特性,而标准MN的数据包以线速转发,延迟几乎为零。
{"title":"Inter-domain Mobility Management Using SDN for Residential/Enterprise Real Time Services","authors":"W. F. Elsadek, M. Mikhail","doi":"10.1109/W-FiCloud.2016.25","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.25","url":null,"abstract":"The tremendous evolution in IoT real time services that requires continuous connectivity to enterprise, residential, and private cloud services stimulates operators and enterprises to rethink of their current adopted mobility solutions for wider service accessibility. Proxy Mobile IPv6 (PMIPv6) is widely adopted in 4G Long Term Evolution (LTE) and WiFi Hotspots for its wide area coverage while Control And Provisioning of Wireless Access Points (CAPWAP) protocol is preferred in enterprise's Wireless LAN Controller (WLCs) for its unified access for both wired and wireless networks. Both protocols struggle when offering mobility solutions between enterprises with different administration to ensure optimized WAN usage with minimum latency and guaranteed QoS while satisfying the unified access, and the privacy compliance requirements. LTE provides a partial solution for inter-domain mobility crossing enterprises which is even hard for WiFi service provider to offer. This paper proposes am inter-domain mobility framework based on Software defined Network (SDN) that overcomes previous protocols' challenges. The proposed framework is LTE independent thus it can be adopted cross enterprises or smart cities or through WiFi or LTE service provider. The Enterprise wired network can be a full migrated SDN network or a standard switched network. The framework uses SDN mobility overlay to transparently detect mobile node's (MN) registration and make selective break out based on the MN's subscription profiles while providing simultaneous access to the registered services as home, intranet, and internet. The framework is an initiative toward smooth migration of existing infrastructures to the next generation SDN service platform where mobility is provided as a service. A prototype is created to support the proposed framework. The experimental results show that MNs are successfully identified and their mobility profiles are activated in almost 1.3~3 seconds while standard MN's packets are wire speed forwarded with almost zero latency.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127339051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.80
Darijo Raca, A. Zahran, C. Sreenan
HTTP Adaptive video Streaming (HAS) is the dominant traffic type on the Internet. When multiple video clients share a bottleneck link many problems arise, notably bandwidth underutilisation, unfairness and instability. Key findings from previous papers show that the "ON-OFF" behaviour of adaptive video clients is the main culprit. In this paper we focus on the network, and specifically the effects of network queue size when multiple video clients share network resources. We conducted experiments using the Mininet virtual network environment streaming real video content to open-source GPAC video clients. We explored how different network buffer sizes, ranging from 1xBDP to 30xBDP (bandwidth-delay-product), affect clients sharing a bottleneck link. Within GPAC, we implemented the published state-of-the-art adaptive video algorithms FESTIVE and BBA-2. We also evaluated impact of web cross-traffic. Our main findings indicate that the "rule-of-thumb" 1xBDP for network buffer sizing causes bandwidth underutilisation, limiting available bandwidth to 70% for all video clients across different round-trip-times (RTT). Interaction between web and HAS clients depends on multiple factors, including adaptation algorithm, bitrate distribution and offered web traffic load. Additionally, operating in an environment with heterogeneous RTTs causes unfairness among ompeting HAS clients. Based on our experimental results, we propose 2xBDP as a default network queue size in environments when multiple users share network resources with homogeneous RTTs. With heterogeneous RTTs, a BDP value based on the average RTTs for all clients improves fairness among competing clients by 60%.
HTTP自适应视频流(HAS, Adaptive video Streaming)是目前Internet上占主导地位的流量类型。当多个视频客户端共享一个瓶颈链路时,会出现许多问题,特别是带宽利用率不足、不公平和不稳定。先前论文的主要发现表明,自适应视频客户端的“开-关”行为是罪魁祸首。在本文中,我们关注的是网络,特别是当多个视频客户端共享网络资源时,网络队列大小的影响。我们使用Mininet虚拟网络环境进行实验,将真实视频内容流式传输到开源GPAC视频客户端。我们探讨了不同的网络缓冲区大小(从1xBDP到30xBDP(带宽延迟产品))如何影响共享瓶颈链路的客户机。在GPAC中,我们实现了已发布的最先进的自适应视频算法节日和BBA-2。我们还评估了网络交叉流量的影响。我们的主要研究结果表明,网络缓冲区大小的“经验法则”1xBDP导致带宽利用率不足,将不同往返时间(RTT)的所有视频客户端的可用带宽限制为70%。web和HAS客户端之间的交互取决于多种因素,包括自适应算法、比特率分布和提供的web流量负载。此外,在具有异构rtt的环境中操作会导致竞争的HAS客户机之间的不公平。基于我们的实验结果,我们建议将2xBDP作为多用户与同质rtt共享网络资源的环境中的默认网络队列大小。对于异构rtt,基于所有客户机的平均rtt的BDP值可以将竞争客户机之间的公平性提高60%。
{"title":"Sizing Network Buffers: An HTTP Adaptive Streaming Perspective","authors":"Darijo Raca, A. Zahran, C. Sreenan","doi":"10.1109/W-FiCloud.2016.80","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.80","url":null,"abstract":"HTTP Adaptive video Streaming (HAS) is the dominant traffic type on the Internet. When multiple video clients share a bottleneck link many problems arise, notably bandwidth underutilisation, unfairness and instability. Key findings from previous papers show that the \"ON-OFF\" behaviour of adaptive video clients is the main culprit. In this paper we focus on the network, and specifically the effects of network queue size when multiple video clients share network resources. We conducted experiments using the Mininet virtual network environment streaming real video content to open-source GPAC video clients. We explored how different network buffer sizes, ranging from 1xBDP to 30xBDP (bandwidth-delay-product), affect clients sharing a bottleneck link. Within GPAC, we implemented the published state-of-the-art adaptive video algorithms FESTIVE and BBA-2. We also evaluated impact of web cross-traffic. Our main findings indicate that the \"rule-of-thumb\" 1xBDP for network buffer sizing causes bandwidth underutilisation, limiting available bandwidth to 70% for all video clients across different round-trip-times (RTT). Interaction between web and HAS clients depends on multiple factors, including adaptation algorithm, bitrate distribution and offered web traffic load. Additionally, operating in an environment with heterogeneous RTTs causes unfairness among ompeting HAS clients. Based on our experimental results, we propose 2xBDP as a default network queue size in environments when multiple users share network resources with homogeneous RTTs. With heterogeneous RTTs, a BDP value based on the average RTTs for all clients improves fairness among competing clients by 60%.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123209576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.22
Rana Adnan Rihan, K. Khan
This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform computation such as comparison on images without knowing the actual images. The proposed technique is expected to ensure confidentiality of images. In order to achieve this, we propose a block cipher-based approach that requires less overhead from servers but images are not disclosed to servers during processing. In this work, we are experimenting how to obfuscate images, and send them to cloud servers for processing such as comparing two images in terms of their similarity. Cloud servers can process images without 'seeing and knowing' the actual images. The approach reveals no meaningful information about images to servers.
{"title":"Using Block Cipher for Confidentiality of Images in Cloud-Based Systems","authors":"Rana Adnan Rihan, K. Khan","doi":"10.1109/W-FiCloud.2016.22","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.22","url":null,"abstract":"This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform computation such as comparison on images without knowing the actual images. The proposed technique is expected to ensure confidentiality of images. In order to achieve this, we propose a block cipher-based approach that requires less overhead from servers but images are not disclosed to servers during processing. In this work, we are experimenting how to obfuscate images, and send them to cloud servers for processing such as comparing two images in terms of their similarity. Cloud servers can process images without 'seeing and knowing' the actual images. The approach reveals no meaningful information about images to servers.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121676452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.55
Alisa Sotsenko, M. Jansen, M. Milrad, Juwel Rana
In this paper we present an approach for contextual big data analytics in social networks, particularly in Twitter. The combination of a Rich Context Model (RCM) with machine learning is used in order to improve the quality of the data mining techniques. We propose the algorithm and architecture of our approach for real-time contextual analysis of tweets. The proposed approach can be used to enrich and empower the predictive analytics or to provide relevant context-aware recommendations.
{"title":"Using a Rich Context Model for Real-Time Big Data Analytics in Twitter","authors":"Alisa Sotsenko, M. Jansen, M. Milrad, Juwel Rana","doi":"10.1109/W-FiCloud.2016.55","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.55","url":null,"abstract":"In this paper we present an approach for contextual big data analytics in social networks, particularly in Twitter. The combination of a Rich Context Model (RCM) with machine learning is used in order to improve the quality of the data mining techniques. We propose the algorithm and architecture of our approach for real-time contextual analysis of tweets. The proposed approach can be used to enrich and empower the predictive analytics or to provide relevant context-aware recommendations.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125433455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FICLOUD.2016.21
T. Pflanzner, A. Kertész, Bart Spinnewyn, Steven Latré
Currently a growing number of powerful devices join the Internet composing a world of smart devices, or things in the Internet of Things (IoT) perspective, significantly impacting the global traffic. There are also more and more cloud providers offering IoT-specific services, since cloud computing has the potential to satisfy IoT needs such as hiding data generation, processing and visualization tasks. Using the capabilities of smartphones, many things can be simulated simultaneously supporting most types of IoT devices. In this paper, we discuss the design and development of a mobile IoT simulator called MobIoTSim that helps researchers to learn IoT device handling without buying real sensors, and to test and demonstrate IoT applications utilizing multiple devices. We also show how to develop a gateway service in a cloud that can be connected to MobIoTSim to manage the simulated devices and to send back notifications by responding to critical sensor values. By using this tool, developers can examine the behaviour of IoT systems, and develop and evaluate IoT cloud applications more efficiently.
{"title":"MobIoTSim: Towards a Mobile IoT Device Simulator","authors":"T. Pflanzner, A. Kertész, Bart Spinnewyn, Steven Latré","doi":"10.1109/W-FICLOUD.2016.21","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2016.21","url":null,"abstract":"Currently a growing number of powerful devices join the Internet composing a world of smart devices, or things in the Internet of Things (IoT) perspective, significantly impacting the global traffic. There are also more and more cloud providers offering IoT-specific services, since cloud computing has the potential to satisfy IoT needs such as hiding data generation, processing and visualization tasks. Using the capabilities of smartphones, many things can be simulated simultaneously supporting most types of IoT devices. In this paper, we discuss the design and development of a mobile IoT simulator called MobIoTSim that helps researchers to learn IoT device handling without buying real sensors, and to test and demonstrate IoT applications utilizing multiple devices. We also show how to develop a gateway service in a cloud that can be connected to MobIoTSim to manage the simulated devices and to send back notifications by responding to critical sensor values. By using this tool, developers can examine the behaviour of IoT systems, and develop and evaluate IoT cloud applications more efficiently.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126003978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.51
Jisun An, Hoyoun Cho, Haewoon Kwak, M. Hassen, B. Jansen
The use of personas is an interactive design technique with considerable potential for product and content development. However, personas have typically been viewed as fairly static. In this research, we implement an approach for creating personas in real time, based on automated analysis of actual social media data, integrating data from Facebook, Twitter, and YouTube channels for a large commercial organization. From Twitter, we gather user insights representing interests and viewpoints, leveraging approximately 195,000 follower profiles. From YouTube, we gather demographic data and topical interests, leveraging more than 188,000 subscriber profiles and millions of user interactions. From Facebook, we collect instances of hundreds of thousands of link sharing by more than 54,000 social media followers, specifically examining the domains these users share. We integrate the social media data from all three platforms in order to demonstrating that this data can be used to develop personas in real-time. The research results provide insights into competitive marketing, topical interests, and preferred system features for the users of the online news medium. Research implications are that personas can be generated in real-time, instead of being the result of a laborious, time-consuming development process.
{"title":"Towards Automatic Persona Generation Using Social Media","authors":"Jisun An, Hoyoun Cho, Haewoon Kwak, M. Hassen, B. Jansen","doi":"10.1109/W-FiCloud.2016.51","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.51","url":null,"abstract":"The use of personas is an interactive design technique with considerable potential for product and content development. However, personas have typically been viewed as fairly static. In this research, we implement an approach for creating personas in real time, based on automated analysis of actual social media data, integrating data from Facebook, Twitter, and YouTube channels for a large commercial organization. From Twitter, we gather user insights representing interests and viewpoints, leveraging approximately 195,000 follower profiles. From YouTube, we gather demographic data and topical interests, leveraging more than 188,000 subscriber profiles and millions of user interactions. From Facebook, we collect instances of hundreds of thousands of link sharing by more than 54,000 social media followers, specifically examining the domains these users share. We integrate the social media data from all three platforms in order to demonstrating that this data can be used to develop personas in real-time. The research results provide insights into competitive marketing, topical interests, and preferred system features for the users of the online news medium. Research implications are that personas can be generated in real-time, instead of being the result of a laborious, time-consuming development process.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130222133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.40
A. Gradvohl
Despite companies' demand for data streams processing systems to handle large volumes of flowing data, we did not find many software to assess these sort of systems. In fact, up to date, there are few papers proposing metrics to evaluate these systems or describing software for benchmarks. Most of the papers focus on metrics such as throughput, latency and memory consumption. However, there are other metrics, which system administrators and users should consider, such as information latency, the correctness of results, adaptability on different workloads and others. Therefore, in this paper, we summarized some key metrics used to assess systems for processing online data streams. In addition, we discuss three benchmark tools found in the literature to assess this type of system. At the end of this paper, we propose a new benchmark tool for complex event processing distributed systems called B2-4CEP, which incorporate the metrics described in this paper.
{"title":"Investigating Metrics to Build a Benchmark Tool for Complex Event Processing Systems","authors":"A. Gradvohl","doi":"10.1109/W-FiCloud.2016.40","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.40","url":null,"abstract":"Despite companies' demand for data streams processing systems to handle large volumes of flowing data, we did not find many software to assess these sort of systems. In fact, up to date, there are few papers proposing metrics to evaluate these systems or describing software for benchmarks. Most of the papers focus on metrics such as throughput, latency and memory consumption. However, there are other metrics, which system administrators and users should consider, such as information latency, the correctness of results, adaptability on different workloads and others. Therefore, in this paper, we summarized some key metrics used to assess systems for processing online data streams. In addition, we discuss three benchmark tools found in the literature to assess this type of system. At the end of this paper, we propose a new benchmark tool for complex event processing distributed systems called B2-4CEP, which incorporate the metrics described in this paper.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114344218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.19
S. Aldawood, Frank Fowley, C. Pahl, D. Taibi, Xiaodong Liu
With an increasing number of service providers in the cloud market, the competition between these is also increasing. Each provider attempts to attract customers by providing a high quality service with lowest possible cost and at the same time trying to make profit. Often, cloud resources are advertised and brokered in a spot market style, i.e., traded for immediate delivery. This paper proposes an architecture for a brokerage model specifically for multi-cloud resource spot markets that integrates the resource brokerage function across several cloud providers. We use a tuple space architecture to facilitate coordination. This architecture supports specifically multiple cloud providers selling unused resources in the spot market. To support the matching process by finding the best match between customer requirements and providers, offers are matched with regard the lowest possible cost available for the customer in the market at the time of the request. The key role of this architecture is to provide the coordination techniques built on a tuple space, adapted to the cloud spot market.
{"title":"A Coordination-Based Brokerage Architecture for Multi-cloud Resource Markets","authors":"S. Aldawood, Frank Fowley, C. Pahl, D. Taibi, Xiaodong Liu","doi":"10.1109/W-FiCloud.2016.19","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.19","url":null,"abstract":"With an increasing number of service providers in the cloud market, the competition between these is also increasing. Each provider attempts to attract customers by providing a high quality service with lowest possible cost and at the same time trying to make profit. Often, cloud resources are advertised and brokered in a spot market style, i.e., traded for immediate delivery. This paper proposes an architecture for a brokerage model specifically for multi-cloud resource spot markets that integrates the resource brokerage function across several cloud providers. We use a tuple space architecture to facilitate coordination. This architecture supports specifically multiple cloud providers selling unused resources in the spot market. To support the matching process by finding the best match between customer requirements and providers, offers are matched with regard the lowest possible cost available for the customer in the market at the time of the request. The key role of this architecture is to provide the coordination techniques built on a tuple space, adapted to the cloud spot market.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121111814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.67
Tasneem M. Yousif, Aysha K. Alharam, W. El-Medany, Abeer A. AlKhalaf, Zainab Fardan
This paper presents a remote monitoring system using web-based/mobile application for detecting explosive gases. ROBODEM (Robot-Detection-Explosive-Materials) system aims to develop a remotely controlled explosive gas detection system handled by a LEGO-Mindstrom-NXT robot. The main controller has been designed using Ardunio-Uno microcontroller with IP camera for live video streaming, GPS for live tracking and gas detection system using MQ6 and MQ5 sensors, and. This robot can be controlled either indoor using Bluetooth or outdoor using the Internet. ROBODEM provides sensors results, daily reports, an alarm and notification emails/SMS. The prototype has been tested experimentally and the results are analyzed and discussed.
{"title":"GPRS-Based Robotic Tracking System with Real Time Video Streaming","authors":"Tasneem M. Yousif, Aysha K. Alharam, W. El-Medany, Abeer A. AlKhalaf, Zainab Fardan","doi":"10.1109/W-FiCloud.2016.67","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.67","url":null,"abstract":"This paper presents a remote monitoring system using web-based/mobile application for detecting explosive gases. ROBODEM (Robot-Detection-Explosive-Materials) system aims to develop a remotely controlled explosive gas detection system handled by a LEGO-Mindstrom-NXT robot. The main controller has been designed using Ardunio-Uno microcontroller with IP camera for live video streaming, GPS for live tracking and gas detection system using MQ6 and MQ5 sensors, and. This robot can be controlled either indoor using Bluetooth or outdoor using the Internet. ROBODEM provides sensors results, daily reports, an alarm and notification emails/SMS. The prototype has been tested experimentally and the results are analyzed and discussed.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123942732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}