Skip to main content
Erschienen in: World Wide Web 1/2018

01.05.2017

Traceability and visual analytics for the Internet-of-Things (IoT) architecture

verfasst von: Richard K. Lomotey, Joseph C. Pry, Chenshean Chai

Erschienen in: World Wide Web | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

There are several billion network-oriented devices in use today that are facilitated to inter-communicate; thereby forming a giant neural-like architecture known as the Internet-of-Things (IoT). The benefits of the IoT cut across all spectrums of our individual lives, corporate culture, and societal co-existence. This is because IoT devices support health tracking, security monitoring, consumer tracking, forecasting, and so on. However, the huge interconnectedness in IoT architectures complicates traceability and faulty data propagation is not easily detected since there are challenges with data origin authentication. Thus, this research proposes a provenance technique to deal with these issues. The technique is based on associative rules and lexical chaining methodologies, which enable traceability through the identification of propagation routes of data and object-to-object communications. Through visualization tools, the proposed methodologies also enabled us to determine linkability and unlinkability between IoT devices in a network which further leads to mechanisms to check correctness in sensor data propagation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-Azez, Z.T., Lawey, A.Q., El-Gorashi, T.E.H., Elmirghani, J.M.H.: Virtualization framework for energy efficient IoT networks, cloud networking (CloudNet), 2015 I.E. 4th International Conference on, pp. 74–77. Niagara Falls, ON (2015). doi:10.1109/CloudNet.2015.7335284 CrossRef Al-Azez, Z.T., Lawey, A.Q., El-Gorashi, T.E.H., Elmirghani, J.M.H.: Virtualization framework for energy efficient IoT networks, cloud networking (CloudNet), 2015 I.E. 4th International Conference on, pp. 74–77. Niagara Falls, ON (2015). doi:10.​1109/​CloudNet.​2015.​7335284 CrossRef
2.
Zurück zum Zitat Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials. 17(4), 2347–2376. ISSN 1553-877x (2015). doi:10.1109/COMST.2015.2444095 CrossRef Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials. 17(4), 2347–2376. ISSN 1553-877x (2015). doi:10.​1109/​COMST.​2015.​2444095 CrossRef
6.
Zurück zum Zitat Banda, G., Chaitanya, K. and Mohan, H.: An IoT protocol and framework for OEMs to make IoT-enabled devices forward compatible, 2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Bangkok, (2015), pp. 824–832, doi:10.1109/SITIS.2015.106. Banda, G., Chaitanya, K. and Mohan, H.: An IoT protocol and framework for OEMs to make IoT-enabled devices forward compatible, 2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Bangkok, (2015), pp. 824–832, doi:10.​1109/​SITIS.​2015.​106.
7.
Zurück zum Zitat Bauer, S., & Schreckling, D.:Data provenance in the internet of things. EU Project COMPOSE, Conference Seminar (2013) Bauer, S., & Schreckling, D.:Data provenance in the internet of things. EU Project COMPOSE, Conference Seminar (2013)
8.
Zurück zum Zitat Boman, J., Taylor, J., Ngu, A. H., Flexible IoT middleware for integration of things and applications, collaborative computing: networking, applications and Worksharing (CollaborateCom), 2014 International Conference on, Miami, FL, (2014), pp. 481–488, doi: 10.4108/icst.collaboratecom.2014.257533. Boman, J., Taylor, J., Ngu, A. H., Flexible IoT middleware for integration of things and applications, collaborative computing: networking, applications and Worksharing (CollaborateCom), 2014 International Conference on, Miami, FL, (2014), pp. 481–488, doi: 10.​4108/​icst.​collaboratecom.​2014.​257533.
10.
Zurück zum Zitat Cui, Z., Lv, H., Yin, C., Gao, G., Zhou, C.: Efficient key management for IOT owner in the cloud, big data and cloud computing (BDCloud), 2015 I.E. fifth International Conference on, Dalian, (2015), pp. 56–61, doi:10.1109/BDCloud.2015.40. Cui, Z., Lv, H., Yin, C., Gao, G., Zhou, C.: Efficient key management for IOT owner in the cloud, big data and cloud computing (BDCloud), 2015 I.E. fifth International Conference on, Dalian, (2015), pp. 56–61, doi:10.​1109/​BDCloud.​2015.​40.
11.
Zurück zum Zitat Davidson, S. B., and Freire, J. Provenance and scientific workflows: challenges and opportunities. In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, SIGMOD '08, pages 1345–1350, 09 (2008). doi: 10.1145/1376616.1376772. Davidson, S. B., and Freire, J. Provenance and scientific workflows: challenges and opportunities. In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, SIGMOD '08, pages 1345–1350, 09 (2008). doi: 10.​1145/​1376616.​1376772.
12.
Zurück zum Zitat Farris, I., Militano, L., Nitti, M., Atzori, L. and Iera, A.: Federated edge-assisted mobile clouds for service provisioning in heterogeneous IoT environments, Internet of Things (WF-IoT), 2015 I.E. 2nd World Forum on, Milan, (2015), pp. 591–596, doi: 10.1109/WF-IoT.2015.7389120. Farris, I., Militano, L., Nitti, M., Atzori, L. and Iera, A.: Federated edge-assisted mobile clouds for service provisioning in heterogeneous IoT environments, Internet of Things (WF-IoT), 2015 I.E. 2nd World Forum on, Milan, (2015), pp. 591–596, doi: 10.​1109/​WF-IoT.​2015.​7389120.
13.
Zurück zum Zitat Genquan, R. Li, Z., Jianmin, W., and Yinbo, L.: One method for provenance tracking of product lifecycle data in collaborative service environment. Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2011 International Conference on, pp.347–356, 10–12 (2011) Genquan, R. Li, Z., Jianmin, W., and Yinbo, L.: One method for provenance tracking of product lifecycle data in collaborative service environment. Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2011 International Conference on, pp.347–356, 10–12 (2011)
14.
Zurück zum Zitat Georgakopoulos, D., Jayaraman, P. P., Zhang, M., Ranjan, R.: Discovery-driven service oriented IoT architecture, 2015 I.E. Conference on Collaboration and Internet Computing (CIC), Hangzhou, (2015), pp. 142–149, doi:10.1109/CIC.2015.34. Georgakopoulos, D., Jayaraman, P. P., Zhang, M., Ranjan, R.: Discovery-driven service oriented IoT architecture, 2015 I.E. Conference on Collaboration and Internet Computing (CIC), Hangzhou, (2015), pp. 142–149, doi:10.​1109/​CIC.​2015.​34.
15.
16.
Zurück zum Zitat Lawabni, A. E., Changjin H., Du, D. H. C., Tewfik, A. H.: A novel update propagation module for the data provenance problem: a contemplating vision on realizing data provenance from models to storage. In Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies, CIKM '11, pages 61–69, 11–14 (2005). doi: 10.1109/MSST.2005.2. Lawabni, A. E., Changjin H., Du, D. H. C., Tewfik, A. H.: A novel update propagation module for the data provenance problem: a contemplating vision on realizing data provenance from models to storage. In Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies, CIKM '11, pages 61–69, 11–14 (2005). doi: 10.​1109/​MSST.​2005.​2.
17.
Zurück zum Zitat Lee, Y. K., Lim, J. D., Jeon, Y. S., Kim, J. N.: Technology trends of access control in IoT and requirements analysis, Information and Communication Technology Convergence (ICTC), 2015 International Conference on, Jeju, (2015). pp. 1031–1033, doi: 10.1109/ICTC.2015.7354730. Lee, Y. K., Lim, J. D., Jeon, Y. S., Kim, J. N.: Technology trends of access control in IoT and requirements analysis, Information and Communication Technology Convergence (ICTC), 2015 International Conference on, Jeju, (2015). pp. 1031–1033, doi: 10.​1109/​ICTC.​2015.​7354730.
18.
Zurück zum Zitat Liu, J., Ahmed, E., Shiraz, M., Gani, A., Buyya, R., Qureshi, A.: Application partitioning algorithms in mobile cloud computing: taxonomy, review and future directions. J. Netw. Comput. Appl. 48, 99–117 (2015)CrossRef Liu, J., Ahmed, E., Shiraz, M., Gani, A., Buyya, R., Qureshi, A.: Application partitioning algorithms in mobile cloud computing: taxonomy, review and future directions. J. Netw. Comput. Appl. 48, 99–117 (2015)CrossRef
19.
Zurück zum Zitat Loo, J., Aiash, M.: Challenges and solutions for secure information centric networks: a case study of the NetInf architecture. J. Netw. Comput. Appl. 50, 64–72 (2015)CrossRef Loo, J., Aiash, M.: Challenges and solutions for secure information centric networks: a case study of the NetInf architecture. J. Netw. Comput. Appl. 50, 64–72 (2015)CrossRef
20.
Zurück zum Zitat Lucia, B.; Ceze, L.: Data provenance tracking for concurrent programs. In Proceedings of the 2015 IEEE/ACM International Symposium on Code Generation and Optimization, CGO (2015), pages 146–156, 7–11 2015. doi: 10.1109/CGO.2015.7054195. Lucia, B.; Ceze, L.: Data provenance tracking for concurrent programs. In Proceedings of the 2015 IEEE/ACM International Symposium on Code Generation and Optimization, CGO (2015), pages 146–156, 7–11 2015. doi: 10.​1109/​CGO.​2015.​7054195.
21.
Zurück zum Zitat Marjit, U., Sarkar, A., Biswas, U.: A novel approach to develop linked data with provenance. Computing, communication and applications (ICCCA), 2012 International Conference on, pp.1-5, 22-24 Feb. (2012), doi: 10.1109/ICCCA.2012.6179211. Marjit, U., Sarkar, A., Biswas, U.: A novel approach to develop linked data with provenance. Computing, communication and applications (ICCCA), 2012 International Conference on, pp.1-5, 22-24 Feb. (2012), doi: 10.​1109/​ICCCA.​2012.​6179211.
22.
Zurück zum Zitat Nastic, S., Copil, G., Truong, H. L., Dustdar, S.: Governing elastic IoT cloud systems under uncertainty, 2015 I.E. 7th International Conference on cloud computing Technology and Science (CloudCom), Vancouver, BC, (2015), pp.131–138, doi: 10.1109/CloudCom.2015.77. Nastic, S., Copil, G., Truong, H. L., Dustdar, S.: Governing elastic IoT cloud systems under uncertainty, 2015 I.E. 7th International Conference on cloud computing Technology and Science (CloudCom), Vancouver, BC, (2015), pp.131–138, doi: 10.​1109/​CloudCom.​2015.​77.
25.
Zurück zum Zitat Park, J., Nguyen, D., Sandhu, R.: On data provenance in group-centric secure collaboration. Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, pp.221–230, 15–18 (2011) Park, J., Nguyen, D., Sandhu, R.: On data provenance in group-centric secure collaboration. Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, pp.221–230, 15–18 (2011)
26.
Zurück zum Zitat Remus, S., Biemann, C.: Three knowledge-free methods for automatic lexical chain extraction, Proceedings of NAACL-HLT 2013, pages 989–999, Atlanta, Georgia, 9–14. Association for Computational Linguistics (2013) Remus, S., Biemann, C.: Three knowledge-free methods for automatic lexical chain extraction, Proceedings of NAACL-HLT 2013, pages 989–999, Atlanta, Georgia, 9–14. Association for Computational Linguistics (2013)
29.
Zurück zum Zitat She, W., I-Ling, Y., Bastani, F., Tran, B., Thuraisingham, B.: Role-based integrated access control and data provenance for SOA based net-centric systems. Service Oriented System Engineering (SOSE), 2011 I.E. 6th International Symposium on, pp.225–234, 12–14 (2011) She, W., I-Ling, Y., Bastani, F., Tran, B., Thuraisingham, B.: Role-based integrated access control and data provenance for SOA based net-centric systems. Service Oriented System Engineering (SOSE), 2011 I.E. 6th International Symposium on, pp.225–234, 12–14 (2011)
30.
Zurück zum Zitat Sultana, S., Shehab, M., Bertino, E.: Secure provenance transmission for streaming data. Knowledge and Data Engineering, IEEE Transactions on, vol.PP, no.99, (2012), pp.1, doi: 10.1109/TKDE.2012.31 Sultana, S., Shehab, M., Bertino, E.: Secure provenance transmission for streaming data. Knowledge and Data Engineering, IEEE Transactions on, vol.PP, no.99, (2012), pp.1, doi: 10.​1109/​TKDE.​2012.​31
31.
Zurück zum Zitat Sun, L., Park, J., Nguyen, D., Sandhu, R.: A provenance-aware access control framework with typed provenance. IEEE Transactions on Dependable and Secure Computing, vol.PP, no.99, pages 1–14, 09, 2015. doi: 10.1109/TDSC.2015.2410793 Sun, L., Park, J., Nguyen, D., Sandhu, R.: A provenance-aware access control framework with typed provenance. IEEE Transactions on Dependable and Secure Computing, vol.PP, no.99, pages 1–14, 09, 2015. doi: 10.​1109/​TDSC.​2015.​2410793
32.
Zurück zum Zitat Tan, V., Groth, P., Miles, S., Jiang, S., Munroe, S., Tsasakou, S., Moreau, L.: Security issues in a SOA-based provenance system, provenance and annotation of data. Lect. Notes Comput. Sci. 4145, 203–211 (2006)CrossRef Tan, V., Groth, P., Miles, S., Jiang, S., Munroe, S., Tsasakou, S., Moreau, L.: Security issues in a SOA-based provenance system, provenance and annotation of data. Lect. Notes Comput. Sci. 4145, 203–211 (2006)CrossRef
33.
Zurück zum Zitat Zhang, O.Q., Kirchberg, M., Ko, R.K.L., Lee, B. S.: How to track Your data: the case for cloud computing provenance. In Proceedings of the 2011 I.E. third International Conference on cloud computing Technology and Science, CloudCom 2011, pages 446–453, (2011). doi: 10.1109/CloudCom.2011.66. Zhang, O.Q., Kirchberg, M., Ko, R.K.L., Lee, B. S.: How to track Your data: the case for cloud computing provenance. In Proceedings of the 2011 I.E. third International Conference on cloud computing Technology and Science, CloudCom 2011, pages 446–453, (2011). doi: 10.​1109/​CloudCom.​2011.​66.
34.
Zurück zum Zitat Zhang, O.Q., Ko, R.K.L., Kirchberg, M., Suen, C. H., Jagadpramana, P., Lee, B. S.: How to track your data: rule-based data provenance tracing algorithms. In Proceedings of the 2012 I.E. 11th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, pages 1429–1437, 25–27 June (2012). doi: 10.1109/TrustCom.2012.175. Zhang, O.Q., Ko, R.K.L., Kirchberg, M., Suen, C. H., Jagadpramana, P., Lee, B. S.: How to track your data: rule-based data provenance tracing algorithms. In Proceedings of the 2012 I.E. 11th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, pages 1429–1437, 25–27 June (2012). doi: 10.​1109/​TrustCom.​2012.​175.
Metadaten
Titel
Traceability and visual analytics for the Internet-of-Things (IoT) architecture
verfasst von
Richard K. Lomotey
Joseph C. Pry
Chenshean Chai
Publikationsdatum
01.05.2017
Verlag
Springer US
Erschienen in
World Wide Web / Ausgabe 1/2018
Print ISSN: 1386-145X
Elektronische ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-017-0461-1

Weitere Artikel der Ausgabe 1/2018

World Wide Web 1/2018 Zur Ausgabe