scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Internet Computing in 2017"


Journal ArticleDOI
TL;DR: The authors propose a mechanism that employs fog to improve the distribution of certificate revocation information among IoT devices for security enhancement and present potential research directions aimed at using fog computing to enhance the security and privacy issues in IoT environments.
Abstract: The inherent characteristics of Internet of Things (IoT) devices, such as limited storage and computational power, require a new platform to efficiently process data. The concept of fog computing has been introduced as a technology to bridge the gap between remote data centers and IoT devices. Fog computing enables a wide range of benefits, including enhanced security, decreased bandwidth, and reduced latency. These benefits make the fog an appropriate paradigm for many IoT services in various applications such as connected vehicles and smart grids. Nevertheless, fog devices (located at the edge of the Internet) obviously face many security and privacy threats, much the same as those faced by traditional data centers. In this article, the authors discuss the security and privacy issues in IoT environments and propose a mechanism that employs fog to improve the distribution of certificate revocation information among IoT devices for security enhancement. They also present potential research directions aimed at using fog computing to enhance the security and privacy issues in IoT environments.

520 citations


Journal ArticleDOI
TL;DR: This update to their original paper discusses some of the changes as Amazon has grown, which help customers discover items they might otherwise not have found.
Abstract: Amazon is well-known for personalization and recommendations, which help customers discover items they might otherwise not have found. In this update to their original paper, the authors discuss some of the changes as Amazon has grown.

439 citations


Journal ArticleDOI
TL;DR: An overview of the core issues, challenges, and future research directions in fog-enabled orchestration for IoT services is given, demonstrating the feasibility and initial results of using a distributed genetic algorithm in this context.
Abstract: Large-scale Internet of Things (IoT) services such as healthcare, smart cities, and marine monitoring are pervasive in cyber-physical environments strongly supported by Internet technologies and fog computing. Complex IoT services are increasingly composed of sensors, devices, and compute resources within fog computing infrastructures. The orchestration of such applications can be leveraged to alleviate the difficulties of maintenance and enhance data security and system reliability. However, efficiently dealing with dynamic variations and transient operational behavior is a crucial challenge within the context of choreographing complex services. Furthermore, with the rapid increase of the scale of IoT deployments, the heterogeneity, dynamicity, and uncertainty within fog environments and increased computational complexity further aggravate this challenge. This article gives an overview of the core issues, challenges, and future research directions in fog-enabled orchestration for IoT services. Additionally, it presents early experiences of an orchestration scenario, demonstrating the feasibility and initial results of using a distributed genetic algorithm in this context.

269 citations


Journal ArticleDOI
TL;DR: The authors discuss this technology’s background and propose a framework for network slicing for 5G, and discuss remaining challenges and future research directions.
Abstract: Network slicing for 5G provides Network-as-a-Service (NaaS) for different use cases, allowing network operators to build multiple virtual networks on a shared infrastructure. With network slicing, service providers can deploy their applications and services flexibly and quickly to accommodate diverse services’ specific requirements. As an emerging technology with a number of advantages, network slicing has raised many issues for the industry and academia alike. Here, the authors discuss this technology’s background and propose a framework. They also discuss remaining challenges and future research directions.

220 citations


Journal ArticleDOI
TL;DR: A novel approach implements cloud-supported, real-time data analytics in edge-computing applications based on real-life healthcare use case scenarios and discusses the main design requirements and challenges.
Abstract: Contemporary solutions for cloud-supported, edge-data analytics mostly apply analytics techniques in a rigid bottom-up approach, regardless of the data's origin. Typically, data are generated at the edge of the infrastructure and transmitted to the cloud, where traditional data analytics techniques are applied. Currently, developers are forced to resort to ad hoc solutions specifically tailored for the available infrastructure (for example, edge devices) when designing, developing, and operating the data analytics applications. Here, a novel approach implements cloud-supported, real-time data analytics in edge-computing applications. The authors introduce their serverless edge-data analytics platform and application model and discuss their main design requirements and challenges, based on real-life healthcare use case scenarios.

170 citations


Journal ArticleDOI
TL;DR: This article proposes a conceptual framework for thinking about governance for AI, which aims to bridge the information gap between the developers of such systems and consumers and policymakers.
Abstract: AI-based systems are “black boxes,” resulting in massive information asymmetries between the developers of such systems and consumers and policymakers. In order to bridge this information gap, this article proposes a conceptual framework for thinking about governance for AI.

158 citations


Journal ArticleDOI
TL;DR: The authors propose a flexible software architecture, which can incorporate different design choices and user-specified polices in fog environments and present their design of WM-FOG, a computing framework for fog environments that embraces this software architecture.
Abstract: This article presents a detailed description of fog computing (also known as edge computing) and explores its research challenges and problems. Based on the authors' understanding of these challenges and problems, they propose a flexible software architecture, which can incorporate different design choices and user-specified polices. They present their design of WM-FOG, a computing framework for fog environments that embraces this software architecture, and evaluate their prototype system.

148 citations


Journal ArticleDOI
TL;DR: This special issue explores fog computing's opportunities and challenges to form a distributed and virtualized platform, supporting computation-intensive tasks and distributing advanced computing, storage, networking, and management services to the edge of the network.
Abstract: Fog computing could alleviate many of the Internet of Things' unique challenges. This special issue explores fog computing's opportunities and challenges to form a distributed and virtualized platform, supporting computation-intensive tasks and distributing advanced computing, storage, networking, and management services to the edge of the network. From reducing latency to enhancing security, this special issue delivers novel solutions to an exciting frontier.

116 citations


Journal ArticleDOI
TL;DR: The authors analyze why existing privacy notices fail to inform users and tend to leave them helpless, and discuss principles for designing more effective privacy notices and controls.
Abstract: Privacy notice and choice are essential aspects of privacy and data protection regulation worldwide Yet, today's privacy notices and controls are surprisingly ineffective at informing users or allowing them to express choice Here, the authors analyze why existing privacy notices fail to inform users and tend to leave them helpless, and discuss principles for designing more effective privacy notices and controls

110 citations


Journal ArticleDOI
Sandro Pinto1, Tiago Gomes1, Jorge Pereira1, Jorge Cabral1, Adriano Tavares1 
TL;DR: The authors demonstrate why TrustZone is becoming a reference technology for securing IoT edge devices, and how enhanced TEEs can help meet industrial IoT applications real-time requirements.
Abstract: With the advent of the Internet of Things (IoT), security has emerged as a major design goal for smart connected devices. This explosion in connectivity created a larger attack surface area. Software-based approaches have been applied for security purposes; however, these methods must be extended with security-oriented technologies that promote hardware as the root of trust. The ARM TrustZone can enable trusted execution environments (TEEs), but existing solutions disregard real-time needs. Here, the authors demonstrate why TrustZone is becoming a reference technology for securing IoT edge devices, and how enhanced TEEs can help meet industrial IoT applications real-time requirements.

106 citations


Journal ArticleDOI
TL;DR: The authors show how their converged cloud/fog paradigm not only helps solve the QS problem, but also meets the requirements of a growing number of decentralized services -- an area in which traditional cloud models fall short.
Abstract: In this article, the authors dissect the technical challenges that cities face when implementing smart city plans and outlines the design principles and lessons learned after they carried out a flagship initiative on fog computing in Barcelona. In particular, they analyze what they call the Quadruple Silo (QS) problem -- that is, four categories of silos that cities confront after deploying commercially available solutions. Those silo categories are: physical (hardware) silos, data silos, and service management silos, and the implications of the three silos in administrative silos. The authors show how their converged cloud/fog paradigm not only helps solve the QS problem, but also meets the requirements of a growing number of decentralized services -- an area in which traditional cloud models fall short. The article exposes cases in which fog computing is a must, and shows that the reasons for deploying fog are centered much more on operational requirements than on performance issues related to the cloud.

Journal ArticleDOI
TL;DR: Through a number of experiments, the authors showcase the feasibility and readiness of micro-clouds formed by collections of Raspberry Pis to host a range of fog applications, particularly for network-constrained environments.
Abstract: The cloud is scalable and cost-efficient, but it isn't ideal for hosting all applications. Fog computing proposes an alternative of offloading some computation to the edge. Which applications to offload, where to send them, and when this should occur isn't entirely clear yet due to a lack of understanding of potential edge infrastructures. Through a number of experiments, the authors showcase the feasibility and readiness of micro-clouds formed by collections of Raspberry Pis to host a range of fog applications, particularly for network-constrained environments.

Journal ArticleDOI
TL;DR: The key features of QUIC are introduced and the potential challenges that require further consideration are discussed, including the need for more research and development of new transport mechanisms.
Abstract: In today's Internet, there are many challenges such as low-latency support for interactive communication, security and privacy of user data, as well as development and deployment of new transport mechanisms. Quick UDP Internet Connections (QUIC) is a new transport protocol that addresses these challenges, focusing on HTTP/2 transmission as a first use case. The first QUIC working group meeting took place at IETF-97 in November 2016, and it has begun the standardization process. This article introduces the key features of QUIC and discusses the potential challenges that require further consideration.

Journal ArticleDOI
TL;DR: How the end-to-end user experience in mobile mmWave networks could be affected by a suboptimal interaction between the most widely used transport protocol, TCP, and mmWave links is explained.
Abstract: Future 5G networks will likely include mmWave radio access communication links, because of their potential multi-gigabit-per-second capacity. However, these frequencies are characterized by highly dynamic channel conditions, which lead to wide fluctuations in the received signal quality. This article explains how the end-to-end user experience in mobile mmWave networks could be affected by a suboptimal interaction between the most widely used transport protocol, TCP, and mmWave links. It also provides insights on the throughput-latency tradeoff when Multipath TCP (MP-TCP) is used judiciously across various links, such as Long-Term Evolution (LTE) and mmWave.

Journal ArticleDOI
TL;DR: Some challenges and opportunities in developing continuous authentication and authorization approaches for the IoT are discussed while also a case study of a Wi-Fi-based human authentication system called WiFiU is presented.
Abstract: With the dawn of the Internet of Things, small but smart devices have become ubiquitous. Although these devices carry a lot of compute power and enable several interesting applications, they lack conventional interfaces such as keyboards, mice, and touchscreens. As a result, such devices can't authenticate and authorize users in familiar ways. Furthermore, unlike for conventional settings, a one-time authentication at the start of a session usually isn't appropriate for the IoT, because the application scenarios are dynamic and a user might not retain physical control or even awareness of IoT devices quite as readily as with traditional computers. Thus, users need to be continuously authenticated and authorized. Fortunately, the IoT offers interesting potential solutions for meeting these requirements. This article discusses some challenges and opportunities in developing continuous authentication and authorization approaches for the IoT while also presenting a case study of a Wi-Fi-based human authentication system called WiFiU.

Journal ArticleDOI
TL;DR: This issue covers important issues in Internet-related innovations for smart industry, which will lead to a complete new generation of always-connected products.
Abstract: Companies in all fields are facing a new worldwide revolution: integrating Internet-based information and communication technology (ICT) into their complete value chains. This development is often referred to as the industrial Internet of things (IIoT), smart industry (SI), or Industry 4.0. Beyond leading to more efficient and adaptive production and supply-chain processes, it also will lead to a complete new generation of always-connected products. The articles in this issue cover important issues in Internet-related innovations for smart industry.

Journal ArticleDOI
TL;DR: The ramifications of smart contracts, which rely on the code as the contract, are considered by exploring what happened when the Ethereum platform was hacked in the summer of 2016.
Abstract: Increasingly in e-commerce, smart contracts have relied on the code as the contract. But code can be hacked and fail, leaving multiple parties potentially exposed to legal gray areas, great financial loss, and little recourse. Here, Kieron O'Hara considers the ramifications of such contracts by exploring what happened when the Ethereum platform was hacked in the summer of 2016.

Journal ArticleDOI
TL;DR: Cilia, a mediation middleware designed for smart manufacturing, provides dynamic and autonomic features, allowing great flexibility at runtime with minimum human intervention, and is based on service-oriented components.
Abstract: The purpose of the Industry 4.0 initiative is to bring together IT technologies and production processes to enable the emergence of smart, connected manufacturing. Integration is, however, a complex activity that requires rethought in the context of manufacturing. Indeed, new, challenging requirements are emerging, such as dynamicity, heterogeneity, or autonomicity. Here, the authors present Cilia, a mediation middleware designed for smart manufacturing. Cilia is based on service-oriented components. It provides dynamic and autonomic features, allowing great flexibility at runtime with minimum human intervention. The authors also apply a real use case that involves supervision and maintenance of pumping stations.

Journal ArticleDOI
Jimmy Lin1
TL;DR: Whether lambda or kappa, there’s no free lunch!
Abstract: Whether lambda or kappa, there’s no free lunch!

Journal ArticleDOI
TL;DR: If the terabytes of Earth observation data currently stored in archives are published on the web using a linked data paradigm, data discovery, integration with other data sources, and the development of applications will become much easier.
Abstract: If the terabytes of Earth observation data currently stored in archives are published on the web using a linked data paradigm, data discovery, integration with other data sources, and the development of applications will become much easier.

Journal ArticleDOI
TL;DR: PACMAN is a personal assistant agent that recommends personalized access control decisions based on the social context of any information disclosure by incorporating communities generated from the user’s network structure and utilizing information in the user's profile.
Abstract: Given social media users’ plethora of interactions, appropriately controlling access to such information becomes a challenging task for users. Selecting the appropriate audience, even from within their own friend network, can be fraught with difficulties. PACMAN is a potential solution for this dilemma problem. It’s a personal assistant agent that recommends personalized access control decisions based on the social context of any information disclosure by incorporating communities generated from the user’s network structure and utilizing information in the user’s profile. PACMAN provides accurate recommendations while minimizing intrusiveness.

Journal ArticleDOI
TL;DR: SoSharP is proposed, an agent-based approach to help users maintain their own and others’ privacy by guiding a selection of sharing policies in multiuser scenarios that learns incrementally and asks for users’ input only when required, reducing users” effort.
Abstract: Users often share information about others; sometimes this inadvertently violates others’ privacy. Thus, here the authors propose SoSharP, an agent-based approach to help users maintain their own and others’ privacy by guiding a selection of sharing policies in multiuser scenarios. SoSharP learns incrementally and asks for users’ input only when required, reducing users’ effort.

Journal ArticleDOI
TL;DR: The authors classify current academic and industrial IIN services using a multidimensional taxonomy of emerging topics and present the taxonomy as an open, modular, extensible, and scalable architecture, called Anyplace, and discuss open challenges.
Abstract: Smartphone advances are leading to a class of Internet-based Indoor Navigation services. IIN services rely on geolocation databases that store indoor models, comprising floor maps and points of interest, along with wireless, light, and magnetic signals for localizing users. Developing IIN services creates new information management challenges such as crowdsourcing indoor models, acquiring and fusing big data velocity signals, localization algorithms, and custodians' location privacy. Here, the authors classify current academic and industrial IIN services using a multidimensional taxonomy of emerging topics. They present the taxonomy as an open, modular, extensible, and scalable architecture, called Anyplace, and discuss open challenges.

Journal ArticleDOI
TL;DR: The authors explore feeding predictive models by tweets conveying on-the-ground social sensors’ observations, to nowcast the perceived intensity of earthquakes.
Abstract: Messages posted to social media in the aftermath of a natural disaster have value beyond detecting the event itself. Mining such deliberately dropped digital traces allows a precise situational awareness, to help provide a timely estimate of the disaster’s consequences on the population and infrastructures. Yet, to date, the automatic assessment of damage has received little attention. Here, the authors explore feeding predictive models by tweets conveying on-the-ground social sensors’ observations, to nowcast the perceived intensity of earthquakes.

Journal ArticleDOI
TL;DR: A 5G-oriented solution is proposed for proactively detecting and mitigating botnets in a highly dynamic 5G network.
Abstract: Botnets are one of the most powerful cyberthreats affecting continuity and delivery of existing network services. Detecting and mitigating attacks promoted by botnets become a greater challenge with the advent of 5G networks, as the number of connected devices with high mobility capabilities, the volume of exchange data, and the transmission rates increase significantly. Here, a 5G-oriented solution is proposed for proactively detecting and mitigating botnets in a highly dynamic 5G network. 5G subscribers’ mobility requires dynamic network reconfiguration, which is handled by combining software-defined network and network function virtualization techniques.

Journal ArticleDOI
TL;DR: A new industrial wireless monitoring system capable of supporting energy-harvested devices through intelligent sensing and network management is described.
Abstract: Vibration monitoring and analysis techniques are used increasingly for predictive maintenance. While traditional vibration monitoring relies on wired sensor networks, recent industrial technologies such as WirelessHART, ISA100.11a, and IEEE 802.15.4e have brought a paradigm shift in the automation sector by integrating the flexibility of wireless technologies with the versatility of Internet tools. However, these wireless technologies aren't designed to support strict resource constraint devices, and thus are still unable to fulfill the needs of many modern industrial applications. This article describes a new industrial wireless monitoring system capable of supporting energy-harvested devices through intelligent sensing and network management.

Journal ArticleDOI
TL;DR: Two challenges for developing an OBDA system are considered: ontology and mapping engineering, along with a pay-as-you-go methodology that addresses these challenges and enables agility.
Abstract: A successfully repeated use case for Semantic Web technologies is Ontology-Based Data Access for data integration. In this approach, an ontology serves as a uniform conceptual federating model, which is accessible to both IT developers and business users. Here, two challenges for developing an OBDA system are considered: ontology and mapping engineering, along with a pay-as-you-go methodology that addresses these challenges and enables agility.

Journal ArticleDOI
TL;DR: The design and analysis of a state-of-the-art green university data center is described, and several insights into its operational and efficiency characteristics are provided.
Abstract: Data centers are at the heart of the IT-driven economy. Power consumption of a single data center can range from tens to a hundred megawatts, and operational costs can run into millions of dollars a month. Data center operators incorporate careful design and optimizations to reduce large-scale data centers energy consumption. Because data center design and operations are a source of competitive advantage, insight into modern data centers is scarce. This article describes the design and analysis of a state-of-the-art green university data center, and provides several insights into its operational and efficiency characteristics.

Journal ArticleDOI
TL;DR: The authors discuss conceptual and practical challenges around cyberwarfare and its impact on cyberspace governance.
Abstract: Dyn suffered multiple complex DDoS attacks in October 2016, constituting one of the largest cyberattacks of this nature ever documented. With this and other recent events in mind, the authors discuss conceptual and practical challenges around cyberwarfare and its impact on cyberspace governance.

Journal ArticleDOI
TL;DR: By analyzing experimental data collected from public Wi-Fi hotspots, the authors quantify the benefits of this approach for bandwidth usage optimization, latency reduction, and quality of experience enhancement and provide useful insights for future-generation access networks.
Abstract: A novel model of Internet access networks is proposed, based on fog computing. The model hosts applications close to users by relying on virtual machines to dynamically move cloud or Web content to nodes located at the edge of access networks. Then it can perform proactive caching and enforce traffic policies based on the interaction between access infrastructure and external applications. By analyzing experimental data collected from public Wi-Fi hotspots, the authors quantify the benefits of this approach for bandwidth usage optimization, latency reduction, and quality of experience enhancement. Experimental results show that a significant portion (from 28 to 50 percent) of download data could be managed by the fog node. On the basis of these findings, useful insights for future-generation access networks are provided.