A. Cuzzocrea, C. Napoli, Agostino Forestiero, D. Laganà, Giovanni Lupi, C. Mastroianni, L. Spataro
{"title":"Business scenarios for hierarchical workload management in data centers","authors":"A. Cuzzocrea, C. Napoli, Agostino Forestiero, D. Laganà, Giovanni Lupi, C. Mastroianni, L. Spataro","doi":"10.1145/3018896.3056799","DOIUrl":"https://doi.org/10.1145/3018896.3056799","url":null,"abstract":"Increasing the efficiency of workload management in data centers is essential to achieve several business and technical goals, such as reduction of costs, energy consumption and carbon emissions. Many solutions are available for workload management in a single data center, but there is still much space for the development of frameworks that are able to manage the workload in a distributed scenario, with multiple sites and data centers. In this paper, we present the main benefits of hierarchical solutions, in which the problem is decomposed into two layers, a lower layer that focuses on the workload management within each single data center, and an upper layer that orchestrates the management of the workload on a multi-site environment. We focus on the main advantages of hierarchical approaches, i.e., autonomous management, scalability and modularity, and illustrate how and to which extent these advantages can be exploited in some emerging business scenarios, i.e., geographical data centers, software data centers and Hybrid Cloud.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128378331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud services implementing security: a case study","authors":"A. Polzonetti, Alessandro Bettacchi","doi":"10.1145/3018896.3025157","DOIUrl":"https://doi.org/10.1145/3018896.3025157","url":null,"abstract":"In this paper we describe the developing of a security framework that implements a centralized access control. The idea of such a framework was born from the need to use a unique login for providing authentication and authorization services to a wide range of Web applications and services deployed in the cloud. To this end, we decided to leverage the Public Digital Identity System (SPID - Sistema Pubblico di Identità Digitale), a security infrastructure that ensures to citizens and enterprises to be uniquely recognized by identifiers issued by certified identity providers. Thus, our framework does not provide users' management, but it authenticates users through the federation, in other words, the framework stands as an interface between the remote Identity Providers SPID compliant, and the Web applications/services provided by several organizations and public administrations. The security framework is made up of two main modules based on the OpenAM platform: the Access Manager, for handling users' authentication and authorization, and the IdP Proxy and Finder, for driving the users to the proper IdP. In addition, the framework provides three different approaches for interacting with and integrating Web applications and services: (i) the Policy Agent, when applications and services are compatible, (ii) the reverse proxy, that is suitable for outdated or not updatable applications and services, (iii) the OAuth2/OpenID Connect protocol, if supported by applications or for implementing the integration according to a recognized standard.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127757148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"\"Need to know\" to defend one's home, or should one buy a wifi enabled thermostat?","authors":"Y. Desmedt","doi":"10.1145/3018896.3152307","DOIUrl":"https://doi.org/10.1145/3018896.3152307","url":null,"abstract":"A recent DDoS attack has shown the limited security of Internet of Things. In this paper we show that Internet of Things are being designed without taking privacy issues into account. We propose the policy \"the Need to Know\" as an approach to tackle the issue.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127888739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamza Aagela, Violeta Holmes, Mahmoud Dhimish, David Wilson
{"title":"Impact of video streaming quality on bandwidth in humanoid robot NAO connected to the cloud","authors":"Hamza Aagela, Violeta Holmes, Mahmoud Dhimish, David Wilson","doi":"10.1145/3018896.3036377","DOIUrl":"https://doi.org/10.1145/3018896.3036377","url":null,"abstract":"This paper investigates the impact of video streaming quality on bandwidth consumption during the transfer of video data from a humanoid robot `NAO' to computing devices, used to perform face recognition tasks, and to the cloud. It presents the results of profiling the network performance of connecting NAO with an edge controller, and discusses the effect of using different qualities of video streaming on the consumed up-link bandwidth. This study considers the limitation of the up-link bandwidth in the Wi-Fi network. It compares the performances of Wi-Fi and Ethernet connections between the NAO robot and a computer. In addition, it examines the accuracy of the face recognition tasks using various streaming scenarios, such as colored video and black & white video. It investigates real-time video streaming using a wide range of frame rates, and video qualities, and their impact on the bandwidth, and accuracy of face identification. The results of our investigations are used to determine the acceptable video quality, frame rate, buffering and bandwidth that would give optimal results in face recognition using NAO robot, and enable efficient data transfer to the cloud.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121336757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Rahmani, Yuhong Li, Karl Eberg, Marcus Stvelind 3rd
{"title":"Mobile blue gateway an application for multicasting data to populations of bluetooth low energy sensors for smart community sensing","authors":"R. Rahmani, Yuhong Li, Karl Eberg, Marcus Stvelind 3rd","doi":"10.1145/3018896.3018972","DOIUrl":"https://doi.org/10.1145/3018896.3018972","url":null,"abstract":"Information distribution and management of large Bluetooth Low Energy Wireless Sensor Networks today, is a time-consuming and tedious task for the user. With the current tools available for public use, sensors have to be updated in a one-by-one basis. Remotely sensors updating through for example remote controls or gateways is not possible. The remote sensors updating concept is becoming more and more realizable due to recent advancements in Internet-enabled technologies. However, this necessitates a blue gateway system that provides services to respond to the remotely sensors updating to enable such Mobile Blue Gateway automation at the edge of today's networks for smart community sensing. To this end, this paper designs and develops a Mobile Blue Gateway which provides a novel way to communicate and distribute information updating through the use of the workload between multiple gateways. It enables the user to remotely update sensors of multiple gateways simultaneously.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117105242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An automatic early risk classification of hard coronary heart diseases using framingham scoring model","authors":"H. Elsayed, Liyakathunisa Syed","doi":"10.1145/3018896.3036384","DOIUrl":"https://doi.org/10.1145/3018896.3036384","url":null,"abstract":"Coronary Heart disease is the global leading cause of death, accounting for 17.3 million deaths per year, and this number is expected to grow to more than 23.6 million by 2030 [20]. In healthcare, coronary artery diseases were found on the top of the healthcare problems, that many countries are facing nowadays. Data mining techniques have been widely used in many governmental sectors including healthcare to mine knowledgeable information from medical data. The current health care organizations use manual heart rate risk scoring models such as Framingham to calculate the early risk of coronary artery diseases. Due to the growing population and increase in the number of patients at health care, the manual process is becoming inefficient to treat the condition which may demand immediate treatment. In this research work, we are proposing an automated system for early risk classification of hard coronary heart diseases using Framingham scoring model. K-Nearest Neighbor and Random Forests algorithms were applied for heart rate risk prediction and the obtained results were compared to the results obtained through the manual process to measure the accuracy level. It was observed that, our proposed automated system for heart rate risk prediction using Framingham model was highly accurate when compared to the manual process. This work attempts to report the effectiveness of using K-Nearest Neighbor and Random Forests for Framingham heart and medical decision support in cardiology field.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121810424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review on smart grid network security issues over 6LoWPAN","authors":"A. Ibhaze, Moses U. Akpabio, S. N. John","doi":"10.1145/3018896.3056797","DOIUrl":"https://doi.org/10.1145/3018896.3056797","url":null,"abstract":"With the evolution of the IoT initiative, data security has become of utmost importance, especially in the area of Smart Metering. The data being transferred across the smart Grid contains sensitive information, which, if not protected from the hands of data thieves would pose a serious security threat. The threat would primarily come in form of informed predictions of the lifestyles of their victims i.e. when they watch TV, when they switch off their loads to go to work and so on. Due to this security threats, the network on which this data transfer is performed will have to be secured. The 6LoWPAN is the network on which the metering devices (which are basically low-power, low-processing devices) will communicate with each other and the Data Analysis Module. Since the 6LoWPAN is the IPv6 for low power devices, it inherits the security and privacy functionalities of the IPv6. This paper will be focused on the techniques of protecting the 6LoWPAN from attacks. It will also talk about the different attacks as well as their methods of protection as regards to the Routing Protocol Layer.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121989195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced, hardware supported in-network processing for the internet of things","authors":"Md. Fasiul Alam, S. Hadjiefthymiades","doi":"10.1145/3018896.3065840","DOIUrl":"https://doi.org/10.1145/3018896.3065840","url":null,"abstract":"We present a novel wireless sensor network (WSN) architecture that relies heavily on the in-network processing of information. The information captured by the WSN nodes is being filtered and transformed by other nodes so that fewer pieces of information of higher semantic value reach the network sink and are fed to the applications. This type of IoT infrastructure assists in the efficient energy management within the network (and the elongation of network lifetime) and the reduction of the processing overhead incurred by the application. The application has to \"confront\" a small volume of data with the very specific focus that it requires. This in-network processing architecture usually involves information filtering/transformation nodes that rely on computationally demanding algorithms. Such nodes are based on accelerated, not conventional hardware that expedites all the advanced processing with a minimum energy overhead. This is imperative for the efficient operation of the WSN as it addresses two important needs: performing demanding tasks at low energy cost, filtering the information to support energy efficiency and render the network sustainable over time.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124127103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT based air quality monitoring system using wireless sensors deployed in public bus services","authors":"D. Saha, M. Shinde, Shail Thadeshwar","doi":"10.1145/3018896.3025135","DOIUrl":"https://doi.org/10.1145/3018896.3025135","url":null,"abstract":"The ambient air quality monitoring network involves the measurement of a number of air pollutants at various locations in the city so as to maintain a sustainable air quality. It is the need of hour to monitor air quality in order to reduce air pollution. Exposure to air pollution can lead to respiratory and cardiovascular diseases, which is estimated to be the cause for 620,000 early deaths in 2010, and the impact on health due to air pollution in India has been calculated at 3 percent of its GDP. In recent years, air pollution has acquired critical dimensions and the air quality in most cities that monitor outdoor air pollution fail to meet WHO guidelines for safe levels. Air pollution is a major environmental change that causes many hazardous effects on human beings which need to be controlled. With the advancements in technology, several innovations have been made in the field of communications that are transitioning to the Internet of Things (IoT). In this domain, Wireless Sensor Networks (WSN) are one of those independent sensing devices to monitor physical and environmental conditions along with thousands of applications in other fields. In this paper, we are proposing the deployment of WSN sensor nodes in public transport buses for the constant monitoring of air pollution. The data regarding the air pollution particles such as emissions, smoke, and other pollutants will be collected via sensors on the public transport bus and the data will be aggregated and transmitted to the nearest sink node. Using the concept of the Internet of Things (IoT) the collected data will be uploaded on the cloud server also called as the IoT cloud where a large amount of the data is stored. This data can then be accessed at any point to analyze and accurate measures can be taken to map the air pollution.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126358747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FRAMSTIM: framework for large scale multimedia content feature extraction based on MPI one-sided communication","authors":"H. Essafi, P. Hède","doi":"10.1145/3018896.3018936","DOIUrl":"https://doi.org/10.1145/3018896.3018936","url":null,"abstract":"Every day a large number of images are made available throw social networks and different IoT embedded sensors. R&D devoted to the development of applications based on visual pattern recognition has attracted a large population of researchers in both side academic and industry. Extraction of relevant features is challenging and known to be one of the key issues in many applications where the visual pattern recognition is applied (object recognition and tracking, image identification, multimedia document categorization, indexing and retrieval, deep learning based visual feature coding, video surveillance, robotic, activity recognition). Furthermore the extraction features from a big volume of image and video data is time and resources consuming. In the context of the ITEA2 project H4H/PerfCloud ( Performance in the Cloud) we have developed parallel OpenMP threads video engine search. To scale the extraction of visual features from a large volume of streaming visual content, we have developed a framework based on OpenMP and MPI one-sided communication where the computation and communication are overlapped thanks to the RDMA approach.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125794541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}