Traceability and visual analytics for the Internet-of-Things (IoT) architecture
- 527 Downloads
There are several billion network-oriented devices in use today that are facilitated to inter-communicate; thereby forming a giant neural-like architecture known as the Internet-of-Things (IoT). The benefits of the IoT cut across all spectrums of our individual lives, corporate culture, and societal co-existence. This is because IoT devices support health tracking, security monitoring, consumer tracking, forecasting, and so on. However, the huge interconnectedness in IoT architectures complicates traceability and faulty data propagation is not easily detected since there are challenges with data origin authentication. Thus, this research proposes a provenance technique to deal with these issues. The technique is based on associative rules and lexical chaining methodologies, which enable traceability through the identification of propagation routes of data and object-to-object communications. Through visualization tools, the proposed methodologies also enabled us to determine linkability and unlinkability between IoT devices in a network which further leads to mechanisms to check correctness in sensor data propagation.
KeywordsIoT Mobile devices Provenance Data propagation Visualization Traceability
The authors wish to thank Sriramoju Sumanth. This work was supported in part by a grant from the Pennsylvania State University.
- 6.Banda, G., Chaitanya, K. and Mohan, H.: An IoT protocol and framework for OEMs to make IoT-enabled devices forward compatible, 2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Bangkok, (2015), pp. 824–832, doi: 10.1109/SITIS.2015.106.
- 7.Bauer, S., & Schreckling, D.:Data provenance in the internet of things. EU Project COMPOSE, Conference Seminar (2013)Google Scholar
- 8.Boman, J., Taylor, J., Ngu, A. H., Flexible IoT middleware for integration of things and applications, collaborative computing: networking, applications and Worksharing (CollaborateCom), 2014 International Conference on, Miami, FL, (2014), pp. 481–488, doi: 10.4108/icst.collaboratecom.2014.257533.
- 10.Cui, Z., Lv, H., Yin, C., Gao, G., Zhou, C.: Efficient key management for IOT owner in the cloud, big data and cloud computing (BDCloud), 2015 I.E. fifth International Conference on, Dalian, (2015), pp. 56–61, doi: 10.1109/BDCloud.2015.40.
- 11.Davidson, S. B., and Freire, J. Provenance and scientific workflows: challenges and opportunities. In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, SIGMOD '08, pages 1345–1350, 09 (2008). doi: 10.1145/1376616.1376772.
- 12.Farris, I., Militano, L., Nitti, M., Atzori, L. and Iera, A.: Federated edge-assisted mobile clouds for service provisioning in heterogeneous IoT environments, Internet of Things (WF-IoT), 2015 I.E. 2nd World Forum on, Milan, (2015), pp. 591–596, doi: 10.1109/WF-IoT.2015.7389120.
- 13.Genquan, R. Li, Z., Jianmin, W., and Yinbo, L.: One method for provenance tracking of product lifecycle data in collaborative service environment. Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2011 International Conference on, pp.347–356, 10–12 (2011)Google Scholar
- 14.Georgakopoulos, D., Jayaraman, P. P., Zhang, M., Ranjan, R.: Discovery-driven service oriented IoT architecture, 2015 I.E. Conference on Collaboration and Internet Computing (CIC), Hangzhou, (2015), pp. 142–149, doi: 10.1109/CIC.2015.34.
- 16.Lawabni, A. E., Changjin H., Du, D. H. C., Tewfik, A. H.: A novel update propagation module for the data provenance problem: a contemplating vision on realizing data provenance from models to storage. In Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies, CIKM '11, pages 61–69, 11–14 (2005). doi: 10.1109/MSST.2005.2.
- 17.Lee, Y. K., Lim, J. D., Jeon, Y. S., Kim, J. N.: Technology trends of access control in IoT and requirements analysis, Information and Communication Technology Convergence (ICTC), 2015 International Conference on, Jeju, (2015). pp. 1031–1033, doi: 10.1109/ICTC.2015.7354730.
- 20.Lucia, B.; Ceze, L.: Data provenance tracking for concurrent programs. In Proceedings of the 2015 IEEE/ACM International Symposium on Code Generation and Optimization, CGO (2015), pages 146–156, 7–11 2015. doi: 10.1109/CGO.2015.7054195.
- 21.Marjit, U., Sarkar, A., Biswas, U.: A novel approach to develop linked data with provenance. Computing, communication and applications (ICCCA), 2012 International Conference on, pp.1-5, 22-24 Feb. (2012), doi: 10.1109/ICCCA.2012.6179211.
- 22.Nastic, S., Copil, G., Truong, H. L., Dustdar, S.: Governing elastic IoT cloud systems under uncertainty, 2015 I.E. 7th International Conference on cloud computing Technology and Science (CloudCom), Vancouver, BC, (2015), pp.131–138, doi: 10.1109/CloudCom.2015.77.
- 23.NXP, "What the Internet of Things (IoT) Needs to become a reality" white paper, Document Number: INTOTHNGSWP REV 2, May 2014, Availa-ble Online: http://www.nxp.com/files/32bit/doc/white_paper/INTOTHNGSWP.pdf (2014). Last Accessed date: April 02 2016.
- 24.Object Management Group (OMG), Data distribution service (DDS), version 1.4, http://www.omg.org/ spec/DDS/1.4
- 25.Park, J., Nguyen, D., Sandhu, R.: On data provenance in group-centric secure collaboration. Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, pp.221–230, 15–18 (2011)Google Scholar
- 26.Remus, S., Biemann, C.: Three knowledge-free methods for automatic lexical chain extraction, Proceedings of NAACL-HLT 2013, pages 989–999, Atlanta, Georgia, 9–14. Association for Computational Linguistics (2013)Google Scholar
- 27.Rose, K., Eldridge, S., Chapin, L.: The Internet of Things (IoT): an overview, internet society, white paper, date: 15 Oct 2015, Available Online: http://www.internetsociety.org/sites/default/files/ISOC-IoT-Overview-20151221-en.pdf (2015). Last Accessed date: April 04 2016
- 28.SensorTag, http://www.ti.com/tool/cc2650stk#0
- 29.She, W., I-Ling, Y., Bastani, F., Tran, B., Thuraisingham, B.: Role-based integrated access control and data provenance for SOA based net-centric systems. Service Oriented System Engineering (SOSE), 2011 I.E. 6th International Symposium on, pp.225–234, 12–14 (2011)Google Scholar
- 30.Sultana, S., Shehab, M., Bertino, E.: Secure provenance transmission for streaming data. Knowledge and Data Engineering, IEEE Transactions on, vol.PP, no.99, (2012), pp.1, doi: 10.1109/TKDE.2012.31
- 31.Sun, L., Park, J., Nguyen, D., Sandhu, R.: A provenance-aware access control framework with typed provenance. IEEE Transactions on Dependable and Secure Computing, vol.PP, no.99, pages 1–14, 09, 2015. doi: 10.1109/TDSC.2015.2410793
- 33.Zhang, O.Q., Kirchberg, M., Ko, R.K.L., Lee, B. S.: How to track Your data: the case for cloud computing provenance. In Proceedings of the 2011 I.E. third International Conference on cloud computing Technology and Science, CloudCom 2011, pages 446–453, (2011). doi: 10.1109/CloudCom.2011.66.
- 34.Zhang, O.Q., Ko, R.K.L., Kirchberg, M., Suen, C. H., Jagadpramana, P., Lee, B. S.: How to track your data: rule-based data provenance tracing algorithms. In Proceedings of the 2012 I.E. 11th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, pages 1429–1437, 25–27 June (2012). doi: 10.1109/TrustCom.2012.175.