MDS '11Pub Date : 2011-12-12DOI: 10.1145/2093190.2093193
Sara Hachem, Thiago Teixeira, V. Issarny
{"title":"Ontologies for the internet of things","authors":"Sara Hachem, Thiago Teixeira, V. Issarny","doi":"10.1145/2093190.2093193","DOIUrl":"https://doi.org/10.1145/2093190.2093193","url":null,"abstract":"Challenges the Internet of Things (IoT) is facing are directly inherited from today's Internet. However, they are amplified by the anticipated large scale deployments of devices and services, information flow and direct user involvment in the IoT. Challenges are many and we focus on addressing those related to scalability, heterogeneity of IoT components, and the highly dynamic and unknown nature of the network topology. In this paper, we give an overview of a service-oriented middleware solution that addresses those challenges using semantic technologies to provide interoperability and flexibility. We especially focus on modeling a set of ontologies that describe devices and their functionalities and thoroughly model the domain of physics. The physics domain is indeed at the core of the IoT, as it allows the approximation and estimation of functionalities usually provided by things. Those functionalities will be deployed as services on appropriate devices through our middleware.","PeriodicalId":308759,"journal":{"name":"MDS '11","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123079232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MDS '11Pub Date : 2011-12-12DOI: 10.1145/2093190.2093191
Wouter De Borger, B. Lagaisse, W. Joosen
{"title":"Inspection of distributed and composed systems","authors":"Wouter De Borger, B. Lagaisse, W. Joosen","doi":"10.1145/2093190.2093191","DOIUrl":"https://doi.org/10.1145/2093190.2093191","url":null,"abstract":"Middleware enables developers to build more complex applications by shielding them from the complexity of the underlying platform and environment. However, when inspecting software at run-time, the abstractions offered by the middleware are no longer visible.\u0000 To support advanced control of middleware based systems, in a dynamic cloud environment, my goal is to provide the proper tools to enable inspection of complex, composed systems, in terms of the most appropriate abstractions.","PeriodicalId":308759,"journal":{"name":"MDS '11","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116820903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MDS '11Pub Date : 2011-12-12DOI: 10.1145/2093190.2093195
Pankesh Patel, Animesh Pathak, Thiago Teixeira, V. Issarny
{"title":"Towards application development for the internet of things","authors":"Pankesh Patel, Animesh Pathak, Thiago Teixeira, V. Issarny","doi":"10.1145/2093190.2093195","DOIUrl":"https://doi.org/10.1145/2093190.2093195","url":null,"abstract":"The Internet of Things (IoT) integrates the physical world with the existing Internet, and is rapidly gaining popularity, thanks to the increased adoption of smart phones and sensing devices. One of the important challenges in this domain is to enable domain experts to easily specify applications for the IoT. As a first step towards developing a suitable programming abstraction, in this paper we present a domain model for applications in the Internet of Things, based on a survey of recently proposed IoT applications from the real world that represent a wide class of behaviors found in IoT use cases.","PeriodicalId":308759,"journal":{"name":"MDS '11","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114143055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MDS '11Pub Date : 2011-12-12DOI: 10.1145/2093190.2093192
K. Dar, Amirhosein Taherkordi, R. Vitenberg, Romain Rouvoy, F. Eliassen
{"title":"Adaptable service composition for very-large-scale internet of things systems","authors":"K. Dar, Amirhosein Taherkordi, R. Vitenberg, Romain Rouvoy, F. Eliassen","doi":"10.1145/2093190.2093192","DOIUrl":"https://doi.org/10.1145/2093190.2093192","url":null,"abstract":"Internet of Things (IoT) is considered as a future paradigm whose main challenge is to give an IP based transparent access to the huge number of services available as IoT resources. Due to the large number of resource-constrained devices and the dynamic nature of IoT environments, this integration problem becomes more intricate. The current state-of-the-art is mostly focused on the integration of IP enabled smart objects on the basis of Service Oriented Architecture (SOA) and the Representational State Transfer (REST) architectural style. However, beyond these approaches, we intend to address the flexible and adaptive composition of services in Very Large Scale (VLS) IoT systems by exploiting the concepts of service orchestration and choreography. In particular, we present an architectural model that enables efficient integration of services by locally orchestrating distributed web-enabled services in VLS IoT systems and globally choreographing Web-based applications.","PeriodicalId":308759,"journal":{"name":"MDS '11","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114177663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MDS '11Pub Date : 2011-12-12DOI: 10.1145/2093190.2093194
Thomas S. Heinze
{"title":"Elastic complex event processing","authors":"Thomas S. Heinze","doi":"10.1145/2093190.2093194","DOIUrl":"https://doi.org/10.1145/2093190.2093194","url":null,"abstract":"Complex Event Processing (CEP) systems are designed to process large amount of information by simultaneously evaluating multiple queries over event streams. Two main requirements imposed by the users of the CEP systems are: (1) ability to process high throughput event data and (2) ability to answer queries with very low latency. In order to meet above requirements CEP systems are becoming increasingly distributed. Distribution of queries as well as event streams across multiple nodes facilitates increasing the throughput of CEP systems while simultaneously maintaining low response times.\u0000 The widespread adoption of cloud computing and the accompanying pay-as-you-go model has added new dimensions to the problem of complex event processing in a distributed system. Nowadays, it is not only important to be able to scale the processing out to a large number of nodes, it is also equally important to be able to scale the processing down, as soon as the load or user requirements decrease. The ability to scale processing up and down along with the load and user requirements is called elasticity.\u0000 The goal of the thesis described in this paper is to develop a component allowing for elastic scaling of distributed CEP systems in response to variations in the load and contractual obligations regarding the quality of service. To this end, the thesis described in this paper will address following three major topics: (1) multi query optimization, (2) operator placement in distributed environments, and (3) cost efficiency. This paper outlines the state of art for the three aforementioned topics and presents the overall draft of the solution for the problem of the elastic complex event processing.","PeriodicalId":308759,"journal":{"name":"MDS '11","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133495288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MDS '11Pub Date : 2011-12-12DOI: 10.1145/2093190.2093197
G. A. Wilkin, P. Eugster
{"title":"Guarantees for decentralized event correlation","authors":"G. A. Wilkin, P. Eugster","doi":"10.1145/2093190.2093197","DOIUrl":"https://doi.org/10.1145/2093190.2093197","url":null,"abstract":"Many distributed applications rely on forms of event correlation, which result in atomic delivery of multiple events aggregated by following process-specific criteria. Generally, more than one process is aggregating events, implying that events are multicast. While delivery guarantees for multicast scenarios with single event/message delivery are well understood, existing systems and models for aggregated deliveries either consider only unicast, centralized setups, or focus on efficiency thus providing only best-effort guarantees.\u0000 This paper first reviews properties and grammar previously proposed for decentralized event correlation. While these properties compose an essential set for fair correlation of events in a decentralized setting, there are further properties that may be explored. This paper will also discuss these additional properties and describe the challenges and open questions they present.","PeriodicalId":308759,"journal":{"name":"MDS '11","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134281680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MDS '11Pub Date : 2011-12-12DOI: 10.1145/2093190.2093196
Amre Shakimov, Landon P. Cox
{"title":"Privacy challenges in the online social networking era","authors":"Amre Shakimov, Landon P. Cox","doi":"10.1145/2093190.2093196","DOIUrl":"https://doi.org/10.1145/2093190.2093196","url":null,"abstract":"Online Social Networking (OSN) services such as Facebook and Twitter are immensely popular. Their users entrust them with sensitive data such as friends lists, pictures and messages. This data can be directly shared with other users or can be handed to the third-party applications for further processing. Our work focuses on on the many privacy and trust issues that OSNs present. More specifically, we are interested in studying users' privacy in OSNs under various trust and attack models.\u0000 To deal with untrusted service providers, we propose two decentralized frameworks for building privacy-preserving OSN platforms in which access to privacy-sensitive information is limited to (1) user-controlled code hosted by \"infrastructure as a service\" (IaaS) providers such as EC2, and (2) desktop PCs controlled by a user's close friends. We also designed a secure \"platform-as-a-service\" (PaaS) capable of ensuring that hosted third-party applications adhere to users' privacy policies. Finally, we consider designing a secure protocol that uses properties of a social graph for matching mutually distrustful users without undermining their privacy.","PeriodicalId":308759,"journal":{"name":"MDS '11","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116945577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}