CWI/CTIF seminar Oct2011. Integrating context- and content-aware mobile services into the cloud
|
|
|
- Britton McGee
- 10 years ago
- Views:
Transcription
1 Center for Wireless Innovation Norway cwin.no CWI Norway CWI/CTIF seminar Oct2011 Integrating context- and content-aware mobile services into the cloud Josef Noll, Zahid Iqbal, Mohammad M.R. Chowdhury University of Oslo/UNIK Member of CWI Norway
2 Outline Business collaboration for Future Internet From Sensors to Services Security, privacy and dependability in sensor systems Security in heterogeneous systems Sensors & Mobile in the Cloud example: virus protection trust-based privacy - trust the cloud? content- and context-awareness System architecture Identity-based access PID, SID, CID awareness implementation through semantic technologies Conclusions 2
3 Collaborative Enterprise Computing Paradigm Collaborative Enterprise Computing Combination of (i) Cloud Computing (ii) Social Computing (iii) Semantic Web Integrated Operations for Future Services here: service cloud focus: privacy, trust focus: integration, reasoning
4 Need for new & highly scalable technologies Sensors Downhole & onboard facilities Process control systems 40 bill US$ added economic value ( ) Integrated Operations on the NCS - OLF numbers Broadband communication Fiber optic cables & wireless networks source: Kaare Finbak, IBM 4
5 Security Challenges in sensorenabled clouds Security, here security (S) Cloud services privacy (P) dependability (D) across the value chain from sensors to services measurable security? Intelligence Overlay Network Sensors, Embedded Systems challenge: physics challenge: physics System Is made by Components and functionalities Could be SPD Components, SPD functionalities can be composed 5
6 Sensors/Mobile in the cloud Example: service download through secured cloud services (virus-protection) Trust the cloud? Cloud versus SIM 6
7 My phone collects all my security SIM with NFC & PKI 7
8 User-centric representation in the cloud Representation of the user through the mobile - my digital representative Distributed representation in the cloud - virtual mobile Corporate Identity - CID Social Identity - SID Privacy in the mobile (Personal) PID ensures/enables user-centric privacy cloud reasoning PID s User profile, privacy Community Roles, Identities Context, Presence Mobile cloud (virtual mobile) Contacts, Calendar, Context, SMS, ,... security User behaviour Location, Proximity SID CID 8
9 System view Identities (and roles) social identity - SID - (relations,...) corporate identity - CID - (roles,...) personal identity - PID - (sensitive data) Trust relation Context & content-aware SID CID Trust virtual Cloud services Service provider trust-based reasoning s s s PID profile preferences trustempowered context trust-empowered mobile cloud 9
10 Collaboration Framework Collaboration Ensemble Engine Provides information in the cloud Criterion Manager provides trust-based criteria Access Manager semantic attribute-based access Access manager Collaboration Ensemble Engine Criterion Manager
11 Semantic Representation Cloud service representation through semantic integration Overlay Policy-based Core Services Policy Trust Composition System Discovery Desired service Intelligence Overlay Cloud services Suggested service Overlay Embedded Intelligence Network Sensors, Embedded Systems s OWL goals OWL integration Semantic Technologies OWL integration 11
12 User profile ontology User profile ontology individual interests distributed for areas multiple roles Profile access coarse distribution Profile
13 Trust ontology Trust based on direction context topic Trust types direct (announced) Trust reputation history
14 Implementation: OWL Restrictions Through OWL restriction we can specify that the Class A to be a subclass of Class B, then every individual of Class A is also an individual of Class B. Restriction Category - Quantifier Restrictions - Cardinality Restrictions - hasvalue Restrictions OWL restrictions guarantee access to trust-based context data
15 Quantifier & value restrictions There are two quantifier and one value restrictions Existential Restriction Known as somevaluesfrom Existential restrictions describe the set of individuals that have at least one specific kind of relationship to individuals that are members of a specific class. Universal Restriction Known as allvaluesfrom Existential restrictions describe the set of individuals that have at least one specific kind of relationship to individuals that are members of a specific class. hasvalue Restriction describes an anonymous class of individuals that are related to another specific individual along a specified property.
16 Cardinality Restrictions Comes in three flavors Minimum Cardinality: specify the minimum number of relationships that an individual must participate in for a given property Maximum Cardinality: specify the maximum number of relationships that an individual can participate in for a given property Cardinality Restriction: specify the exact number of relationships that an individual must participate in for a given property. properties used for semantic access
17 Idea Ontology (some classes) Definition of idea with OWL Restrictions Definition of ExcellentIdea, helps reasoner to classify any idea as excellent.
18 Conclusions Access manager Future services means business collaboration Collaborative enterprise computing based on Collaboration Ensemble Engine Collaboration Criterion Manager Access Manager Ontologies for user profiles (adapted from WWRF) trust context and content Description Logic for Reasoning Challenges real-world complexity - can we represent? topic specific trust-metrics Intelligence Overlay Cloud services Network Sensors, Embedded Systems Collaboration Ensemble Engine Criterion Manager Collaborative Radio & Operation, the driver for cost-effective future wireless broadband networks 18
INTEGRATED IDENTITY MECHANISM FOR UBIQUITOUS SERVICE ACCESS
INTEGRATED IDENTITY MECHANISM FOR UBIQUITOUS SERVICE ACCESS Mohammad M. R. Chowdhury UniK University Graduate Center P.O. Box 70, N-2007 Kjeller, Norway. [email protected] Josef Noll UniK University Graduate
The ebbits project: from the Internet of Things to Food Traceability
The ebbits project: from the Internet of Things to Food Traceability Smart AgriMatics2014 Contribution to session 5.2 Meat Information Provenance 18-19 June 2014 Paolo Brizzi Istituto Superiore Mario Boella
Comprehensive geospatial network management based on MapInfo. Supporting both physical and logical network resource management
Comprehensive geospatial network management based on MapInfo Supporting both physical and logical network resource management ConnectMaster is an open, integratable, scalable software solution for the
Cisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
Rotary Medlemsmøte, Skedsmo Nord, 11May2015. Livet er trådløs, Mobilen styrer og Internet blir alt
Rotary Medlemsmøte, Skedsmo Nord, 11May2015 Livet er trådløs, Mobilen styrer og Internet blir alt 1 About PPP Penger, Penny,.. Identity? Prestige Publicity 2 ... and the Internet Research and Education
The 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
Challenges. Department of Informatics University of Oslo. Presenter. [email protected]. October 25, 2011
Internet t of Things: Applications and Challenges Presenter Kashif Dar [email protected] INF9910: Cyber Physical Systems Department of Informatics University of Oslo October 25, 2011 Overview Internet
Smart Cities. Photo used under Creative Commons from nigelhowe
Smart Cities Photo used under Creative Commons from nigelhowe Photo used under Creative Commons from tim-166 Cities are for People Citier Smart cities as a web of people, things and services Workshop 2,
Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration
Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Guopeng Zhao 1, 2 and Zhiqi Shen 1 1 Nanyang Technological University, Singapore 639798 2 HP Labs Singapore, Singapore
Seminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
An Open Agent Environment for Context-Aware mcommerce
15 th Bled Electronic Commerce Conference ereality: Constructing the eeconomy Bled, Slovenia, June 17-19, 2002 An Open Agent Environment for Context-Aware mcommerce Norman M. Sadeh School of Computer Science,
INTRODUCTION TO NETWORK VIRTUALIZATION
1 INTRODUCTION TO NETWORK VIRTUALIZATION Wednesday, May 14, 2008 Mosharaf Chowdhury Member, envy Project What is Virtualization? 2 Transparent abstraction of computing platform and resources Multiple logical
Service Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
Data collection architecture for Big Data
Data collection architecture for Big Data a framework for a research agenda (Research in progress - ERP Sense Making of Big Data) Wout Hofman, May 2015, BDEI workshop 2 Big Data succes stories bias our
Horizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: [email protected] Roadmap Introduction Challenges
IEEE JAVA Project 2012
IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing
Context Aware Mobile Network Marketing Services
Context-aware Mobile Multimedia Services in the Cloud Dejan Kovachev, Ralf Klamma Chair for Computer Science 5 (Information Systems), RWTH Aachen University Ahornstr. 55, D-52056, Aachen, Germany {kovachev,
OWL Ontology Translation for the Semantic Web
OWL Ontology Translation for the Semantic Web Luís Mota and Luís Botelho We, the Body and the Mind Research Lab ADETTI/ISCTE Av. das Forças Armadas, 1649-026 Lisboa, Portugal [email protected],[email protected]
IoT-03-2017 R&I on IoT integration and platforms INTERNET OF THINGS FOCUS AREA
HORIZON 2020 WP 2016-17 IoT-03-2017 R&I on IoT integration and platforms INTERNET OF THINGS DG CONNECT European Commission Internet of Things As enabler of a future hyper-connected society, the Internet
IoT Prospects of Worldwide Development and Current Global Circumstances
IoT Prospects of Worldwide Development and Current Global Circumstances Dr. Bilel Jamoussi Chief Study Groups Department Telecommunication Standardization Bureau, ITU www.itu.int/itu-t/go/iot 1 IoT in
Key Challenges in Cloud Computing to Enable Future Internet of Things
The 4th EU-Japan Symposium on New Generation Networks and Future Internet Future Internet of Things over "Clouds Tokyo, Japan, January 19th, 2012 Key Challenges in Cloud Computing to Enable Future Internet
HControl offers you not One, nor Two, or even Three but Four vital home services with our exclusive Smart Home System.
We are proud to announce that Mandarin Lakes is one of only a handful of communities in Florida where every home is served by its own fiber optic cable. You are now able to take advantage of the next generation
Future Networks and Communications (Priority Area A)
PRIORITY AREA A: FUTURE NETWORKS AND COMMUNICATIONS ACTION PLAN Future Networks and (Priority Area A) Context The Internet has become a critical infrastructure that forms a key element of our social and
A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University
A Systems of Systems perspective on The Internet of Things Johan Lukkien Eindhoven University System applications platform In-vehicle network network Local Control Local Control Local Control Reservations,
Big Data & Security. Aljosa Pasic 12/02/2015
Big Data & Security Aljosa Pasic 12/02/2015 Welcome to Madrid!!! Big Data AND security: what is there on our minds? Big Data tools and technologies Big Data T&T chain and security/privacy concern mappings
Master of Science Service Oriented Architecture for Enterprise. Courses description
Master of Science Service Oriented Architecture for Enterprise Courses description SCADA and PLC networks The course aims to consolidate and transfer of extensive knowledge regarding the architecture,
Context Model Based on Ontology in Mobile Cloud Computing
Context Model Based on Ontology in Mobile Cloud Computing Changbok Jang, Euiin Choi * Dept. Of Computer Engineering, Hannam University, Daejeon, Korea [email protected], [email protected] Abstract.
Combining the INTERNET of THINGS and the INTERNET of SERVICES
On RFID Conference and Exhibition LAGOAS PARK, LISBON Combining the INTERNET of THINGS and the INTERNET of SERVICES Dr. Joachim Schaper Vice President SAP Research EMEA, SAP AG Agenda 1 2 3 4 5 The VISION
A COLLABORATIVE PERSPECTIVE OF CRM
A COLLABORATIVE PERSPECTIVE OF CRM Mărginean Nicolae Bogdan-Vodă University, Faculty of Economics, Cluj-Napoca, Spinoasa 14 street, e-mail: [email protected], telef: 0745/318321 Today, companies are
Service management evolution
management evolution Vilho Räisänen 1, Wolfgang Kellerer 2, Pertti Hölttä 3, Olavi Karasti 4 and Seppo Heikkinen 4 Abstract This paper presents an outline for the evolution of service management. The outline
Autonomic computing system for selfmanagement of Machine-to-Machine networks
Self-IoT 2012, September 17th 2012, San Jose, California, USA in conjunction with ICAC 2012 Autonomic computing system for selfmanagement of Machine-to-Machine networks Mahdi BEN ALAYA, Salma MATOUSSI,Thierry
Networking Research: Trends and Issues
1 Networking Research: Trends and Issues Deep Medhi Networking & Telecommunication Research (NeTReL) Computer Science & Electrical Engineering Department School of Computing & Engineering University of
Ten Things You Need to Know About Data Virtualization
White Paper Ten Things You Need to Know About Data Virtualization What is Data Virtualization? Data virtualization is an agile data integration method that simplifies information access. Data virtualization
How To Build A Cloud Based Intelligence System
Semantic Technology and Cloud Computing Applied to Tactical Intelligence Domain Steve Hamby Chief Technology Officer Orbis Technologies, Inc. [email protected] 678.346.6386 1 Abstract The tactical
INTERNET CONNECTIVITY
INTERNET CONNECTIVITY http://www.tutorialspoint.com/internet_technologies/internet_connectivity.htm Copyright tutorialspoint.com Here in this tutorial, we will discuss how to connect to internet i.e. internet
Governance van Mobiele Service Platforms
Governance van Mobiele Service Platforms Trends en ontwikkelingen Dr. ir. Mark de Reuver Section Information and Communication Technology Faculty Technology Policy and Management Delft University of Technology
The HetNet Bible (Small Cells and Carrier WiFi) - Opportunities, Challenges, Strategies and Forecasts: 2013 2020 With an Evaluation of DAS & Cloud
The HetNet Bible (Small Cells and Carrier WiFi) - Opportunities, Challenges, Strategies and Forecasts: 2013 2020 Revision Date: 10 May 2013 2.1.3 HetNets: An Evolution of Network Topology Driven by both
NIST Big Data Public Working Group
NIST Big Data Public Working Group Requirements May 13, 2014 Arnab Roy, Fujitsu On behalf of the NIST BDWG S&P Subgroup S&P Requirements Emerging due to Big Data Characteristics Variety: Traditional encryption
ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford [email protected].
ITU-T Kaleidoscope Conference Innovations in NGN Managing NGN using the SOA Philosophy Y. Fun Hu University of Bradford [email protected] Next Generation Network (NGN) A IP/IMS based network Provide
Sensor Information Representation for the Internet of Things
Sensor Information Representation for the Internet of Things Jiehan Zhou [email protected] University of Oulu, Finland Carleton University, Canada Agenda Internet of Things and Challenges Application
Fostering IoT Deployment Challenges and Assets of SDN Techniques
Fostering IoT Deployment Challenges and Assets of SDN Techniques C. Jacquenet [email protected] Slide 1 Outline Context On IoT networking, routing and service design Additional IoT challenges
Trusted Personal Data Management A User-Centric Approach
GRUPPO TELECOM ITALIA Future Cloud Seminar Oulu, August 13th 2014 A User-Centric Approach SKIL Lab, Trento - Italy Why are we talking about #privacy and #personaldata today? 3 Our data footprint Every
Social Data Science for Intelligent Cities
Social Data Science for Intelligent Cities The Role of Social Media for Sensing Crowds Prof.dr.ir. Geert-Jan Houben TU Delft Web Information Systems & Delft Data Science WIS - Web Information Systems Why
Technology Implications of an Instrumented Planet presented at IFIP WG 10.4 Workshop on Challenges and Directions in Dependability
Technology Implications of an Instrumented Planet presented at IFIP WG 10.4 Workshop on Challenges and Directions in Dependability Nick Bowen Colin Harrison IBM June 2008 1 Background Global Technology
Semantically Enhanced Web Personalization Approaches and Techniques
Semantically Enhanced Web Personalization Approaches and Techniques Dario Vuljani, Lidia Rovan, Mirta Baranovi Faculty of Electrical Engineering and Computing, University of Zagreb Unska 3, HR-10000 Zagreb,
ATTPS Publication: Trustworthy ICT Taxonomy
Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94
User Needs and Requirements Analysis for Big Data Healthcare Applications
User Needs and Requirements Analysis for Big Data Healthcare Applications Sonja Zillner, Siemens AG In collaboration with: Nelia Lasierra, Werner Faix, and Sabrina Neururer MIE 2014 in Istanbul: 01-09-2014
WWW.6GBUSINESS.COM. Give your business the competitive advantage
WWW.6GBUSINESS.COM Give your business the competitive advantage 6G Internet s Technology Superfast wireless broadband providing speeds from 10Mbps to 10Gbps* 6G internet s Air Fibre is a forward thinking
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
How To Develop An Open Play Context Framework For Android (For Android)
Dynamix: An Open Plug-and-Play Context Framework for Android Darren Carlson and Andreas Schrader Ambient Computing Group / Institute of Telematics University of Lübeck, Germany www.ambient.uni-luebeck.de
Advanced Transportation Management Systems
Advanced Transportation Management Systems Summary Many Department of Transportation agencies are looking for cost-saving ways to improve the efficiencies of roadways without making actual surface improvements
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
CLOUD BASED SEMANTIC EVENT PROCESSING FOR
CLOUD BASED SEMANTIC EVENT PROCESSING FOR MONITORING AND MANAGEMENT OF SUPPLY CHAINS A VLTN White Paper Dr. Bill Karakostas [email protected] Executive Summary Supply chain visibility is essential
powl Features and Usage Overview
powl Features and Usage Overview Live demonstrations and further information is available from: http://powl.sourceforge.net/swc Sören Auer University of Leipzig [email protected] Norman Beck
Characteristic-Based Security Analysis of Personal Networks
Characteristic-Based Security Analysis of Personal Networks Andrew J. Paverd Department of Computer Science University of Oxford [email protected] Fadi El-Moussa BT Research BT Technology, Service
Ampersand and the Semantic Web
Ampersand and the Semantic Web The Ampersand Conference 2015 Lloyd Rutledge The Semantic Web Billions and billions of data units Triples (subject-predicate-object) of URI s Your data readily integrated
How To Design Software
The Software Development Life Cycle: An Overview Presented by Maxwell Drew and Dan Kaiser Southwest State University Computer Science Program Last Time The design process and design methods Design strategies
The data can be transmitted through a variety of different communications platforms such as:
COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects
Distributed Database for Environmental Data Integration
Distributed Database for Environmental Data Integration A. Amato', V. Di Lecce2, and V. Piuri 3 II Engineering Faculty of Politecnico di Bari - Italy 2 DIASS, Politecnico di Bari, Italy 3Dept Information
Objective 1.2 Cloud Computing, Internet of Services and Advanced Software Engineering
Cloud Computing, Internet of Services and Advanced Software Engineering Arian Zwegers European Commission Information Society and Media Directorate General Software & Service Architectures and Infrastructures
Future of IMT Systems: Wireless World Vision 2020
Future of IMT Systems: Wireless World Vision 2020 Dr. Sudhir Dixit WWRF Vision Committee Chairman & Vice Chair Asia Pacific Director, Hewlett-Packard Laboratories Bangalore, India Outline Wireless World
Introduction of Information Security Research Division
Introduction of Information Security Research Division 2005. 5. 13. Kyo-il Chung, Ph. D. Information Security Infrastructure Research Group Contents Overview - Secure u-it KOREA - Organization of ETRI
Reducing Configuration Complexity with Next Gen IoT Networks
Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration
JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining
S.NO TITLES Domains 1 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing 2 Anonymizing Collections of Tree-Structured Data 3 Making Digital Artifacts on the Web Verifiable and
IoT Solutions from Things to the Cloud
IoT Solutions from Things to the Cloud Intel Quark SoC X1000 Applications Marketing Seminar Anaheim, California Oct. 29, 2014 Intel, the Intel logo, the Intel Inside logo, Intel Atom, Intel Core, Quark
