{"title":"User Interaction with a Technology Evolution Model to Select Most Viable Enterprise Information Systems","authors":"A. Skulimowski, Inez Badecka","doi":"10.1109/SOCA.2019.00030","DOIUrl":"https://doi.org/10.1109/SOCA.2019.00030","url":null,"abstract":"One of alternative ways to achieve a competitive advantage by an enterprise in the ICT area is to select the most prospective information system (IS) as a seed technology. The latter is defined as a first technology from a given area implemented in an enterprise, that determines or strongly influences the choice of further technologies from the same area. Seed ICT selection is particularly relevant for enterprises whose core business activity relies on online service provision. In this paper we present a user-requirement-based interaction scheme of an application that models the evolution of enterprise ISs, taking into account the production patterns of software releases, the functionalities offered, the users' community growth trends, and other factors. The evolution is modeled by hybrid discrete-time/discrete-event systems, and multi-models built with them. The technology choice is supported by multicriteria ranking algorithms that apply IS innovativeness forecasts. Moreover, this evolution model of enterprise IS can handle different uncertainties and cyber security issues. We present the use cases and scenarios, model management, and the knowledge base that stores time series, IS characteristics and forecasts. The use of this application is illustrated by a real-life example of three popular open-source CMSs. We conclude that an informed choice of the first IS and the corresponding enterprise architecture as a seed technology is particularly relevant for start-ups and SMEs. An extended variant of the above application may also provide decision support to developer teams seeking software evolution models to discover and apply the best-possible technology development and market strategies.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131934043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service-Oriented Architecture for Intelligent Management with Data Analytics and Visualization","authors":"Hsuan-Yu Lin, Yu-Hsuan Chiu, W. Liao, Ray-I Chang","doi":"10.1109/SOCA.2019.00018","DOIUrl":"https://doi.org/10.1109/SOCA.2019.00018","url":null,"abstract":"Future intelligent management systems compose of heterogeneous devices with lots of applications cooperatively to analyze data. Recent advances in Service-Oriented Architecture (SOA) provide opportunities for solving this challenge with reusability, composability, and abstraction. In this paper, we develop an intelligent management platform using cloud computing and SOA. It provides different service modules to collect, store, analyze, and visualize the Internet of Things (IoT) data to fit Cyber-Physical System (CPS), all these functions are wrapped as RESTful APIs so it can be imported to other applications, making the same service can be reused to meet the requirements of different fields. In addition, an editable dynamic dashboard service is proposed to personalize the management demand in a click-and-drag way. Users can analyze and observe data for intelligent management. Finally, we apply these services to build three different applications to validate the power of our service platform.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132937196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of a Personal Authentication System T-Time","authors":"Gi-Chul Yang, H. Oh","doi":"10.1109/SOCA.2019.00019","DOIUrl":"https://doi.org/10.1109/SOCA.2019.00019","url":null,"abstract":"Currently, the most commonly used personal authentication system for digital deveces use text-based passwords. However, long passwords which increse the security are hard to remember and decrease the usability. Nowadays, alternative systems are used such as graphical password systems and biometrics systems. Each of them has its own problem also. Lost password cannot be replaced in case of biometric system and graphical password systems are weak at shoulder-surfing attacks. This paper describes implementation of a new personal authentication scheme called T-TIME. T-TIME uses touch signal generation time information which is cumbersome to identify by watching.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134146861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Step-by-Step Guidelines for Making Smart Contract Smarter","authors":"Ya-wen Jeng, Yung-Chen Hsieh, Ja-Ling Wu","doi":"10.1109/SOCA.2019.00012","DOIUrl":"https://doi.org/10.1109/SOCA.2019.00012","url":null,"abstract":"Different from traditional programs, which run on local machines or in the clouds, smart contracts run mostly on miners' devices; moreover, users of smart contracts have to pay fees (i.e., gases in Ethereum) to miners for executing transactions on the blockchain. Lacking of enough experiences in developing smart contracts makes writing low cost and high efficiency smart contracts becoming a very challenging task. In this work, by collating existing approaches and developing new methods for reducing gas consumption, a set of systematical step-by-step guidelines for developing low cost smart contracts is proposed. To prove its usefulness, ZoKrates verifier, a very complicated and costly contract, is used to demonstrate how our scheme can effectively cut the gas consumption down.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. P. Centelles, Mennan Selimi, Felix Freitag, L. Navarro
{"title":"DIMON: Distributed Monitoring System for Decentralized Edge Clouds in Guifi.net","authors":"R. P. Centelles, Mennan Selimi, Felix Freitag, L. Navarro","doi":"10.1109/SOCA.2019.00009","DOIUrl":"https://doi.org/10.1109/SOCA.2019.00009","url":null,"abstract":"Community-built telecommunication networks such as Guifi.net demonstrate how end users can actively collaborate in the self-provision of network services, for instance by operating a self-organized distributed monitoring system. Network monitoring is performed by many small servers at the users' premises but data are only accessible via a centralized interface. Besides, due to network partitions and churn of the monitoring servers, failures in the monitoring system are frequent, leaving parts of the network unmonitored. Distributed databases are a promising solution for data replication under network partition condition, but they suffer from a trade-off between data consistency and availability. Furthermore, these databases are used in data centers with abundant computing resources, not in light edge networks. In this work we present DIMON, a reliable edge-based, eventually-consistent monitoring system that leverages CRDT-based data structures implemented in AntidoteDB. Conflict-free replicated data types (CRDTs) are able to converge to a consistent state in environments with network partitions as those found in edge networks. Our results give insights on the load of AntidoteDB on edge devices under different scenarios of read and write operations. The experiments carried out in a production network with a real system implemented contribute to the research community's knowledge about the available technologies for a consistent replicated data storage layer to support edge computing clouds.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127599331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Serving Machine Learning Workloads in Resource Constrained Environments: a Serverless Deployment Example","authors":"Angelos Christidis, Roy Davies, S. Moschoyiannis","doi":"10.1109/SOCA.2019.00016","DOIUrl":"https://doi.org/10.1109/SOCA.2019.00016","url":null,"abstract":"Deployed AI platforms typically ship with bulky system architectures which present bottlenecks and a high risk of failure. A serverless deployment can mitigate these factors and provide a cost-effective, automatically scalable (up or down) and elastic real-time on-demand AI solution. However, deploying high complexity production workloads into serverless environments is far from trivial, e.g., due to factors such as minimal allowance for physical codebase size, low amount of runtime memory, lack of GPU support and a maximum runtime before termination via timeout. In this paper we propose a set of optimization techniques and show how these transform a codebase which was previously incompatible with a serverless deployment into one that can be successfully deployed in a serverless environment; without compromising capability or performance. The techniques are illustrated via worked examples that have been deployed live on rail data and realtime predictions on train movements on the UK rail network. The similarities of a serverless environment to other resource constrained environments (IoT, Mobile) means the techniques can be applied to a range of use cases.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115687886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service","authors":"Jehn-Ruey Jiang, Wei-Sheng Chung","doi":"10.1109/SOCA.2019.00029","DOIUrl":"https://doi.org/10.1109/SOCA.2019.00029","url":null,"abstract":"This paper proposes two adaptive Huffman coding hash tree algorithms to construct the hash tree of a file system. The algorithms are used to design the real-time proof of violation (PoV) scheme for the cloud storage service to achieve mutual non-repudiation between the user and the service provider. The PoV scheme can then generate cryptographic proofs once the service-level agreement (SLA) is violated. Based on adaptive Huffman coding, the proposed algorithms add hash tree nodes dynamically when a file is accessed for the first time. Every node keeps a count to reflect the frequency of occurrence of the associated file, and all nodes' counts and the tree structure are adjusted on-the-fly for every file access. This can significantly reduce the memory and computation overheads required by the PoV scheme. The file access patterns of the NCUCCWiki and the SNIA IOTTA datasets are used to evaluate the performance of the proposed algorithms. The algorithms are also compared with a related hash tree construction algorithm used in a PoV scheme, named ERA, to show their superiority in performance.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128897622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}