Advertisement

SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators

  • Michael Eggert
  • Roger Häußling
  • Martin Henze
  • Lars Hermerschmidt
  • René Hummen
  • Daniel Kerpen
  • Antonio Navarro Pérez
  • Bernhard Rumpe
  • Dirk Thißen
  • Klaus Wehrle
Chapter

Abstract

Although Cloud Computing promises to lower IT costs and increase users’ productivity in everyday life, the unattractive aspect of this new technology is that the user no longer owns all the devices which process personal data. To lower scepticism, the project SensorCloud investigates techniques to understand and compensate these adoption barriers in a scenario consisting of cloud applications that utilize sensors and actuators placed in private places. This work provides an interdisciplinary overview of the social and technical core research challenges for the trustworthy integration of sensor and actuator devices with the Cloud Computing paradigm. Most importantly, these challenges include (i) ease of development, (ii) security and privacy, and (iii) social dimensions of a cloud-based system which integrates into private life. When these challenges are tackled in the development of future cloud systems, the attractiveness of new use cases in a sensor-enabled world will considerably be increased for users who currently do not trust the Cloud.

Keywords

Cloud Computing Cloud Service Cloud Provider Data Owner Security Architecture 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bell, W.: Foundations of Futures Studies, Human Science for a New Era, vol. History, Purposes, and Knowledge. Transaction Publishers, New Brunswick, London (1997)Google Scholar
  2. 2.
    Cerulo, K.: Nonhumans in social interaction. Annual Review of Sociology 35, 531–552 (2009)Google Scholar
  3. 3.
    Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control. In: 2009 ACM Workshop on Cloud Computing Security (CCSW), pp. 85–90 (2009)Google Scholar
  4. 4.
    Dahm, M.: Grundlagen der Mensch-Computer-Interaktion. Pearson, New York (2006)Google Scholar
  5. 5.
    Danezis, G., Livshits, B.: Towards Ensuring Client-Side Computational Integrity. In: 3rd ACM Workshop on Cloud Computing Security (CCSW), pp. 125–130 (2011)Google Scholar
  6. 6.
    Dean, J., Ghemawat, S.: MapReduce Simplified Data Processing on Large Clusters. Communications of the ACM 51(1), 107–113 (2008)Google Scholar
  7. 7.
    van Dijk, M., Juels, A.: On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. In: 5th USENIX Workshop on Hot Topics in Security (2010)Google Scholar
  8. 8.
    Dougherty, D.: Organizing for innovation in the 21st century. In: S.R. Clegg, C. Hardy, T.B. Lawrence, W.R. Nord (eds.) The Sage Handbook of Organization Studies, 2 edn., pp. 598–617. Sage, London, Thousand OaksCA, New Delhi (2006)Google Scholar
  9. 9.
    Federal Office for Information Security, Germany: Protection Profile for the Gateway of a Smart Metering System. v01.01.01(final draft) (2011)Google Scholar
  10. 10.
    Gentry, C.: Computing Arbitrary Functions of Encrypted Data. Communications of the ACM 53(3), 97–105 (2010)Google Scholar
  11. 11.
    Giese, H., Rumpe, B., Schatz, B., Sztipanovits, J.: Science and Engineering of Cyber-Physical Systems (Dagstuhl Seminar 11441). Dagstuhl Reports 1(11), 1–22 (2011)Google Scholar
  12. 12.
    Greenfield, J., Short, K.: Software Factories Assembling Applications with Patterns, Models, Frameworks and Tools. In: 18th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pp. 16–27 (2003)Google Scholar
  13. 13.
    Haussling, R.: Sozialwissenschaftliche Innovationsforschung. Soziologische Revue 30, 369–382 (2007)Google Scholar
  14. 14.
    Haussling, R.: Video analyses with a four level interaction concept a network-based concept of human-robot interaction. In: U.T. Kissmann (ed.) Video interaction analysis. Methods and methodology, pp. 107–131. Peter Lang, FrankfurtMain (2009)Google Scholar
  15. 15.
    Haussling, R.: Design als soziotechnische Relation. Neue Herausforderungen der Gestaltung inter- und transaktiver Technik am Beispiel humanoider Robotik. In: S. Moebius, S. Prinz (eds.) Das Design der Gesellschaft. Zur Kultursoziologie des Designs, pp. 263–288. transcript, Bielefeld (2012)Google Scholar
  16. 16.
    Heer, T., Jansen, T., Hummen, R., Gotz, S., Wirtz, H., Weingartner, E., Wehrle, K.: PiSA-SA Municipal Wi-Fi Based on Wi-Fi Sharing. In: 19th International Conference on Computer Communications and Networks (ICCCN), pp. 1–8 (2010)Google Scholar
  17. 17.
    Heinecke, A.: Mensch-Computer-Interaktion. Fachbuchverlag, Leipzig (2004)Google Scholar
  18. 18.
    Henze, M., Grossfengels, M., Koprowski, M., Wehrle, K.: Towards Data Handling Requirements-aware Cloud Computing. In: 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (2013)Google Scholar
  19. 19.
    Henze, M., Hummen, R., Matzutt, R., Catrein, D., Wehrle, K.: Maintaining User Control While Storing and Processing Sensor Data in the Cloud. International Journal of Grid and High Performance Computing (IJGHPC) 5(4) (2013)Google Scholar
  20. 20.
    Henze, M., Hummen, R., Wehrle, K.: The Cloud Needs Cross-Layer Data Handling Annotations. In: 2013 IEEE Security and Privacy Workshops (SPW), pp. 18–22 (2013)Google Scholar
  21. 21.
    Hummen, R., Henze, M., Catrein, D., Wehrle, K.: A Cloud Design for User-controlled Storage and Processing of Sensor Data. In: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 232–240 (2012)Google Scholar
  22. 22.
    Jungk, R., Mullert, N.: Future Workshops. Institute for Social Inventions, London (1987)Google Scholar
  23. 23.
    Katz, M.L., Shapiro, C.: Network externalities, competition, and compatibility. The American economic review 75(3), 424–440 (1985)Google Scholar
  24. 24.
    Khajeh-Hosseini, A., Sommerville, I., Sriram, I.: Research Challenges for Enterprise Cloud Computing (2010). ArXiv1001.3257 [cs.DC]Google Scholar
  25. 25.
    Knorr-Cetina, K.: Epistemic Cultures. How the Sciences Make Knowledge. Harvard University Press, Cambridge (1999)Google Scholar
  26. 26.
    Kornwachs, K., Stephan, P.F.: Das Mensch-Ding Verhaltnis. In: O. Herzog, T. Schildhauer (eds.) Intelligente Objekte. Technische Gestaltung—Wirtschaftliche Verwertung –Gesellschaftliche Wirkung, pp. 15–22. Springer, Berlin, Heidelberg (2009)Google Scholar
  27. 27.
    Lee, E.A.: Cyber Physical Systems Design Challenges. In: 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing (ISORC), pp. 363–369 (2008)Google Scholar
  28. 28.
    Li, F., Vogler, M., Claessens, M., Dustdar, S.: Efficient and scalable IoT service delivery on Cloud. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD) (2013)Google Scholar
  29. 29.
    Li, X., Li, Y., Liu, T., Qiu, J., Wang, F.: The Method and Tool of Cost Analysis for Cloud Computing. In: 2009 IEEE International Conference on Cloud Computing (CLOUD), pp. 93–100 (2009)Google Scholar
  30. 30.
    Liu, Z., Yang, D.s.,Wen, D., Zhang,W.m., Mao,W.: Cyber-Physical-Social Systems for Command and Control. IEEE Intelligent Systems 26(4), 92–96 (2011)Google Scholar
  31. 31.
    Pearson, S., Benameur, A.: Privacy, Security and Trust Issues Arising from Cloud Computing. In: 2nd IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 693–702 (2010)Google Scholar
  32. 32.
    Rammert, W.: Hybride Handlungstragerschaft Ein soziotechnisches Modell verteilten Handelns. In: O. Herzog, T. Schildhauer (eds.) Intelligente Objekte. Technische Gestaltung—Wirtschaftliche Verwertung—GesellschaftlicheWirkung, pp. 23–33. Springer, Berlin, Heidelberg (2009)Google Scholar
  33. 33.
    Rellermeyer, J.S., Duller, M., Alonso, G.: Engineering the Cloud from Software Modules. In: 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp. 32–37 (2009)Google Scholar
  34. 34.
    Riungu, L.M., Taipale, O., Smolander, K.: Research Issues for Software Testing in the Cloud. In: 2nd IEEE International Conference on Cloud Computing Technology and Science (Cloud-Com), pp. 557–564 (2010)Google Scholar
  35. 35.
    Santos, N., Gummadi, K.P., Rodrigues, R.: Towards Trusted Cloud Computing. In: USENIX Workshop on Hot Topics in Cloud Computing (HotCloud) (2009)Google Scholar
  36. 36.
    Van Deursen, A., Klint, P., Visser, J.: Domain-Specific Languages An Annotated Bibliography. ACM SIGPLAN Notices 35(6), 26–36 (2000)Google Scholar
  37. 37.
    Venters, W., Whitley, E.A.: A Critical Review of Cloud Computing Research Desires and Realities. Journal of Information Technology 27, 179–197 (2012)Google Scholar
  38. 38.
    Wallom, D., Turilli, M., Taylor, G., Hargreaves, N., Martin, A., Raun, A., McMoran, A.: myTrustedCloud Trusted Cloud Infrastructure for Security-critical Computation and Data Managment. In: 2011 Third IEEE International Conference on Coud Computing Technology and Science (CloudCom, pp. 247–254 (2011)Google Scholar
  39. 39.
    Weiser, M.: The computer for the 21st century. Scientific american 265(3), 94–104 (1991)Google Scholar
  40. 40.
    Yang, H., Tate, M.: A Descriptive Literature Review and Classification of Cloud Computing Research. Communications of the Association for Information Systems 31, 35–60 (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Michael Eggert
    • 1
  • Roger Häußling
    • 1
  • Martin Henze
    • 2
  • Lars Hermerschmidt
    • 3
  • René Hummen
    • 2
  • Daniel Kerpen
    • 1
  • Antonio Navarro Pérez
    • 3
  • Bernhard Rumpe
    • 3
  • Dirk Thißen
    • 2
  • Klaus Wehrle
    • 2
  1. 1.RWTH Aachen, Lehrstuhl für Technik - und OrganisationssoziologieAachenGermany
  2. 2.RWTH Aachen, Communication and Distributed SystemsAachenGermany
  3. 3.RWTH Aachen, Software EngineeringAachenGermany

Personalised recommendations