Abstract
The set of connected embedded devices surrounding and providing resources to us will constantly grow in the future. Currently these devices are often treated as pure data sources and there is no notion of providing and provisioning the compute and storage resources they offer to the users. Paradigms like Infrastructure as a Service, Platform as a Service or, Pay as you Go are very popular and successful in the Cloud Computing domain. We will discuss whether these paradigms can be applied to the Internet of Things domain in order to create a Cloud of Things that is surrounding us and provides resources in an ubiquitous fashion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Weiser, M.: The computer for the 21st century. Scientific American 265(3), 94104 (1991). http://dx.doi.org/10.1038/scientificamerican0991-94
Ashton, K.: That ’Internet of Things’ Thing. RFID Journal (2011)
Wang, Y.-W., Yu, H.-L., Li, Y.: Notice of retraction internet of things technology applied in medical information, pp. 430–433 (April 2011)
Chong, G., Zhihao, L., Yifeng, Y.: The research and implement of smart home system based on internet of things, pp. 2944–2947 (September 2011)
Yuqiang, C., Jianlan, G., Xuanzi, H.: The research of internet of things’ supporting technologies which face the logistics industry, pp. 659–663 (December 2010)
Bandyopadhyay, S., Sengupta, M., Maiti, S., Dutta, S.: Role of middleware for internet of things: A study. International Journal of Computer Science and Engineering Survey 2(3), 94–105 (2011)
Alamri, A., Ansari, W.S., Hassan, M.M., Hossain, M.S., Alelaiwi, A., Hossain, M.A.: A survey on sensor-cloud: Architecture, applications, and approaches. International Journal of Distributed Sensor Networks 2013, 118 (2013). http://dx.doi.org/10.1155/2013/917923
Laukkarinen, T., Suhonen, J., Hännikäinen, M.: An embedded cloud design for internet-of-things. International Journal of Distributed Sensor Networks 2013 (2013)
Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Computer Networks 47(4), 445–487 (2005). http://www.sciencedirect.com/science/article/pii/S1389128604003457
Banerjee, P., Friedrich, R., Bash, C., Goldsack, P., Huberman, B., Manley, J., Patel, C., Ranganathan, P., Veitch, A.: Everything as a service: Powering the new information economy. Computer 44(3), 36–43 (2011)
Perera, C., Jayaraman, P., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Dynamic configuration of sensors using mobile sensor hub in internet of things paradigm. In: 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp. 473–478 (April 2013)
Nagy, M., Katasonov, A., Khriyenko, O., Nikitin, S., Szydlowski, M., Terziyan, V.: Challenges of middleware for the internet of things. University of Jyvaskyla, Tech. Rep. (2009)
Lee, E.A.: Cyber physical systems: design challenges. In: 2008 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing, ISORC, pp. 363–369 (2008)
openHAB. http://www.openhab.org (Online; accessed August 15, 2014)
Bonino, D., Castellina, E., Corno, F.: The dog gateway: enabling ontology-based intelligent domotic environments. IEEE Transactions on Consumer Electronics 54(4), 1656–1664 (2008)
Eisenhauer, M., Rosengren, P., Antolin, P.: A development platform for integrating wireless devices and sensors into ambient intelligence systems. In: 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops, SECON Workshops 2009, pp. 1–3 (2009)
Kim, J.E., Boulos, G., Yackovich, J., Barth, T., Beckel, C., Mosse, D.: Seamless integration of heterogeneous devices and access control in smart homes. In: 2012 8th International Conference on Intelligent Environments (IE) (June 2012)
Stankovic, J.: Research directions for the internet of things. IEEE Internet of Things Journal 1(1), 3–9 (2014)
Heiler, S.: Semantic interoperability. ACM Computing Surveys 27(2), 271–273 (1995). http://dx.doi.org/10.1145/210376.210392
Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Computer Networks 54(15), 2787–2805 (2010). http://www.sciencedirect.com/science/article/pii/S1389128610001568
ISO/IEC/IEEE Health Informatics-Personal Health Device Communication-Part 20601: Application Profile-Optimized Exchange Protocol. ISO/IEEE 11073–20601:2010(E), pp. 1–208 (January 2010)
Hirsch, B., Konnerth, T., Heßler, A.: Merging agents and services the jiac agent platform. In: Multi-Agent Programming. Springer, pp. 159–185 (2009)
Craciunas, S.S., Haas, A., Kirsch, C.M., Payer, H., Röck, H., Rottmann, A., Sokolova, A., Trummer, R., Love, J., Sengupta, R.: Information-acquisition-as-a-service for cyber-physical cloud computing. In: Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing, p. 14 (2010)
Kirsch, C., Pereira, E., Sengupta, R., Chen, H., Hansen, R., Huang, J., Landolt, F., Lippautz, M., Rottmann, A., Swick, R., et al.: Cyber-physical cloud computing: the binding and migration problem. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 1425–1428 (2012)
Gerla, M.: Vehicular cloud computing. In: 2012 The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), pp. 152–155 (2012)
Alam, S., Chowdhury, M.M.R., Noll, J.: Senaas: an event-driven sensor virtualization approach for internet of things cloud. In: 2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications (November 2010). http://dx.doi.org/10.1109/NESEA.2010.5678060
Yuriyama, M., Kushida, T.: Sensor-cloud infrastructure-physical sensor management with virtualized sensors on cloud computing. In: 2010 13th International Conference on Network-Based Information Systems (NBiS) (2010)
Ravi, S., Raghunathan, A., Chakradhar, S.: Tamper resistance mechanisms for secure embedded systems. In: Proceedings of the 17th International Conference on VLSI Design, pp. 605–611 (2004)
Hohl, F.: Time limited blackbox security: protecting mobile agents from malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998). http://dl.acm.org/citation.cfm?id=648051.746183
OAuth, OAuth 2.0. http://oauth.net/ (Online; accessed August 15, 2014)
Recordon, D., Reed, D.: Openid 2.0. In: Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006 (2006). http://dx.doi.org/10.1145/1179529.1179532
Lantz, B., Heller, B., McKeown, N.: A network in a laptop: rapid prototyping for software-defined networks. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, p. 19. ACM (2010)
Pardo-Castellote, G.: Omg data-distribution service: architectural overview. In: 2003 Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (2003). http://dx.doi.org/10.1109/ICDCSW.2003.1203555
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Kliem, A., Renner, T. (2015). Towards On-Demand Resource Provisioning for IoT Environments. In: Nguyen, N., Trawiński, B., Kosala, R. (eds) Intelligent Information and Database Systems. ACIIDS 2015. Lecture Notes in Computer Science(), vol 9012. Springer, Cham. https://doi.org/10.1007/978-3-319-15705-4_47
Download citation
DOI: https://doi.org/10.1007/978-3-319-15705-4_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15704-7
Online ISBN: 978-3-319-15705-4
eBook Packages: Computer ScienceComputer Science (R0)