CWI/CTIF seminar 24.-25.Oct2011. Integrating context- and content-aware mobile services into the cloud

Similar documents
INTEGRATED IDENTITY MECHANISM FOR UBIQUITOUS SERVICE ACCESS

The ebbits project: from the Internet of Things to Food Traceability

Comprehensive geospatial network management based on MapInfo. Supporting both physical and logical network resource management

Cisco Secure BYOD Solution

Rotary Medlemsmøte, Skedsmo Nord, 11May2015. Livet er trådløs, Mobilen styrer og Internet blir alt

The 5G Infrastructure Public-Private Partnership

Challenges. Department of Informatics University of Oslo. Presenter. October 25, 2011

Smart Cities. Photo used under Creative Commons from nigelhowe

Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration

Seminar: Security Metrics in Cloud Computing ( se)

An Open Agent Environment for Context-Aware mcommerce

INTRODUCTION TO NETWORK VIRTUALIZATION

Service Oriented Architecture

Data collection architecture for Big Data

Horizontal IoT Application Development using Semantic Web Technologies

IEEE JAVA Project 2012

Context Aware Mobile Network Marketing Services

OWL Ontology Translation for the Semantic Web

IoT R&I on IoT integration and platforms INTERNET OF THINGS FOCUS AREA

IoT Prospects of Worldwide Development and Current Global Circumstances

Key Challenges in Cloud Computing to Enable Future Internet of Things

HControl offers you not One, nor Two, or even Three but Four vital home services with our exclusive Smart Home System.

Future Networks and Communications (Priority Area A)

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University

Big Data & Security. Aljosa Pasic 12/02/2015

Master of Science Service Oriented Architecture for Enterprise. Courses description

Context Model Based on Ontology in Mobile Cloud Computing

Combining the INTERNET of THINGS and the INTERNET of SERVICES

A COLLABORATIVE PERSPECTIVE OF CRM

Service management evolution

Autonomic computing system for selfmanagement of Machine-to-Machine networks

Networking Research: Trends and Issues

Ten Things You Need to Know About Data Virtualization

How To Build A Cloud Based Intelligence System

INTERNET CONNECTIVITY

Governance van Mobiele Service Platforms

The HetNet Bible (Small Cells and Carrier WiFi) - Opportunities, Challenges, Strategies and Forecasts: With an Evaluation of DAS & Cloud

NIST Big Data Public Working Group

ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford

Sensor Information Representation for the Internet of Things

Fostering IoT Deployment Challenges and Assets of SDN Techniques

Trusted Personal Data Management A User-Centric Approach

Social Data Science for Intelligent Cities

Technology Implications of an Instrumented Planet presented at IFIP WG 10.4 Workshop on Challenges and Directions in Dependability

Semantically Enhanced Web Personalization Approaches and Techniques

ATTPS Publication: Trustworthy ICT Taxonomy

User Needs and Requirements Analysis for Big Data Healthcare Applications

Give your business the competitive advantage

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

How To Develop An Open Play Context Framework For Android (For Android)

Advanced Transportation Management Systems

CHAPTER 1 INTRODUCTION

CLOUD BASED SEMANTIC EVENT PROCESSING FOR

powl Features and Usage Overview

Characteristic-Based Security Analysis of Personal Networks

Ampersand and the Semantic Web

How To Design Software

The data can be transmitted through a variety of different communications platforms such as:

Distributed Database for Environmental Data Integration

Objective 1.2 Cloud Computing, Internet of Services and Advanced Software Engineering

Future of IMT Systems: Wireless World Vision 2020

Introduction of Information Security Research Division

Reducing Configuration Complexity with Next Gen IoT Networks

JAVA IEEE Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

IoT Solutions from Things to the Cloud

Transcription:

Center for Wireless Innovation Norway cwin.no CWI Norway CWI/CTIF seminar 24.-25.Oct2011 Integrating context- and content-aware mobile services into the cloud Josef Noll, Zahid Iqbal, Mohammad M.R. Chowdhury University of Oslo/UNIK Member of CWI Norway {josef,zahid,mohammad}@unik.no

Outline Business collaboration for Future Internet From Sensors to Services Security, privacy and dependability in sensor systems Security in heterogeneous systems Sensors & Mobile in the Cloud example: virus protection trust-based privacy - trust the cloud? content- and context-awareness System architecture Identity-based access PID, SID, CID awareness implementation through semantic technologies Conclusions 2

Collaborative Enterprise Computing Paradigm Collaborative Enterprise Computing Combination of (i) Cloud Computing (ii) Social Computing (iii) Semantic Web Integrated Operations for Future Services here: service cloud focus: privacy, trust focus: integration, reasoning

Need for new & highly scalable technologies Sensors Downhole & onboard facilities Process control systems 40 bill US$ added economic value (2007-2015) Integrated Operations on the NCS - OLF numbers Broadband communication Fiber optic cables & wireless networks source: Kaare Finbak, IBM 4

Security Challenges in sensorenabled clouds Security, here security (S) Cloud services privacy (P) dependability (D) across the value chain from sensors to services measurable security? Intelligence Overlay Network Sensors, Embedded Systems challenge: physics challenge: physics System Is made by Components and functionalities Could be SPD Components, SPD functionalities can be composed 5

Sensors/Mobile in the cloud Example: service download through secured cloud services (virus-protection) Trust the cloud? Cloud versus SIM 6

My phone collects all my security SIM with NFC & PKI 7

User-centric representation in the cloud Representation of the user through the mobile - my digital representative Distributed representation in the cloud - virtual mobile Corporate Identity - CID Social Identity - SID Privacy in the mobile (Personal) PID ensures/enables user-centric privacy cloud reasoning PID s User profile, privacy Community Roles, Identities Context, Presence Mobile cloud (virtual mobile) Contacts, Calendar, Context, SMS, email,... security User behaviour Location, Proximity SID CID 8

System view Identities (and roles) social identity - SID - (relations,...) corporate identity - CID - (roles,...) personal identity - PID - (sensitive data) Trust relation Context & content-aware SID CID Trust virtual Cloud services Service provider trust-based reasoning s s s PID profile preferences trustempowered context trust-empowered mobile cloud 9

Collaboration Framework Collaboration Ensemble Engine Provides information in the cloud Criterion Manager provides trust-based criteria Access Manager semantic attribute-based access Access manager Collaboration Ensemble Engine Criterion Manager

Semantic Representation Cloud service representation through semantic integration Overlay Policy-based Core Services Policy Trust Composition System Discovery Desired service Intelligence Overlay Cloud services Suggested service Overlay Embedded Intelligence Network Sensors, Embedded Systems s OWL goals OWL integration Semantic Technologies OWL integration 11

User profile ontology User profile ontology individual interests distributed for areas multiple roles Profile access coarse distribution Profile

Trust ontology Trust based on direction context topic Trust types direct (announced) Trust reputation history

Implementation: OWL Restrictions Through OWL restriction we can specify that the Class A to be a subclass of Class B, then every individual of Class A is also an individual of Class B. Restriction Category - Quantifier Restrictions - Cardinality Restrictions - hasvalue Restrictions OWL restrictions guarantee access to trust-based context data

Quantifier & value restrictions There are two quantifier and one value restrictions Existential Restriction Known as somevaluesfrom Existential restrictions describe the set of individuals that have at least one specific kind of relationship to individuals that are members of a specific class. Universal Restriction Known as allvaluesfrom Existential restrictions describe the set of individuals that have at least one specific kind of relationship to individuals that are members of a specific class. hasvalue Restriction describes an anonymous class of individuals that are related to another specific individual along a specified property.

Cardinality Restrictions Comes in three flavors Minimum Cardinality: specify the minimum number of relationships that an individual must participate in for a given property Maximum Cardinality: specify the maximum number of relationships that an individual can participate in for a given property Cardinality Restriction: specify the exact number of relationships that an individual must participate in for a given property. properties used for semantic access

Idea Ontology (some classes) Definition of idea with OWL Restrictions Definition of ExcellentIdea, helps reasoner to classify any idea as excellent.

Conclusions Access manager Future services means business collaboration Collaborative enterprise computing based on Collaboration Ensemble Engine Collaboration Criterion Manager Access Manager Ontologies for user profiles (adapted from WWRF) trust context and content Description Logic for Reasoning Challenges real-world complexity - can we represent? topic specific trust-metrics Intelligence Overlay Cloud services Network Sensors, Embedded Systems Collaboration Ensemble Engine Criterion Manager Collaborative Radio & Operation, the driver for cost-effective future wireless broadband networks 18