Towards On-Demand Resource Provisioning for IoT Environments

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9012)


The set of connected embedded devices surrounding and providing resources to us will constantly grow in the future. Currently these devices are often treated as pure data sources and there is no notion of providing and provisioning the compute and storage resources they offer to the users. Paradigms like Infrastructure as a Service, Platform as a Service or, Pay as you Go are very popular and successful in the Cloud Computing domain. We will discuss whether these paradigms can be applied to the Internet of Things domain in order to create a Cloud of Things that is surrounding us and provides resources in an ubiquitous fashion.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Weiser, M.: The computer for the 21st century. Scientific American 265(3), 94104 (1991).
  2. 2.
    Ashton, K.: That ’Internet of Things’ Thing. RFID Journal (2011)Google Scholar
  3. 3.
    Wang, Y.-W., Yu, H.-L., Li, Y.: Notice of retraction internet of things technology applied in medical information, pp. 430–433 (April 2011)Google Scholar
  4. 4.
    Chong, G., Zhihao, L., Yifeng, Y.: The research and implement of smart home system based on internet of things, pp. 2944–2947 (September 2011)Google Scholar
  5. 5.
    Yuqiang, C., Jianlan, G., Xuanzi, H.: The research of internet of things’ supporting technologies which face the logistics industry, pp. 659–663 (December 2010)Google Scholar
  6. 6.
    Bandyopadhyay, S., Sengupta, M., Maiti, S., Dutta, S.: Role of middleware for internet of things: A study. International Journal of Computer Science and Engineering Survey 2(3), 94–105 (2011)CrossRefGoogle Scholar
  7. 7.
    Alamri, A., Ansari, W.S., Hassan, M.M., Hossain, M.S., Alelaiwi, A., Hossain, M.A.: A survey on sensor-cloud: Architecture, applications, and approaches. International Journal of Distributed Sensor Networks 2013, 118 (2013).
  8. 8.
    Laukkarinen, T., Suhonen, J., Hännikäinen, M.: An embedded cloud design for internet-of-things. International Journal of Distributed Sensor Networks 2013 (2013)Google Scholar
  9. 9.
    Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Computer Networks 47(4), 445–487 (2005).
  10. 10.
    Banerjee, P., Friedrich, R., Bash, C., Goldsack, P., Huberman, B., Manley, J., Patel, C., Ranganathan, P., Veitch, A.: Everything as a service: Powering the new information economy. Computer 44(3), 36–43 (2011)CrossRefGoogle Scholar
  11. 11.
    Perera, C., Jayaraman, P., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Dynamic configuration of sensors using mobile sensor hub in internet of things paradigm. In: 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp. 473–478 (April 2013)Google Scholar
  12. 12.
    Nagy, M., Katasonov, A., Khriyenko, O., Nikitin, S., Szydlowski, M., Terziyan, V.: Challenges of middleware for the internet of things. University of Jyvaskyla, Tech. Rep. (2009)Google Scholar
  13. 13.
    Lee, E.A.: Cyber physical systems: design challenges. In: 2008 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing, ISORC, pp. 363–369 (2008)Google Scholar
  14. 14.
    openHAB. (Online; accessed August 15, 2014)
  15. 15.
    Bonino, D., Castellina, E., Corno, F.: The dog gateway: enabling ontology-based intelligent domotic environments. IEEE Transactions on Consumer Electronics 54(4), 1656–1664 (2008)CrossRefGoogle Scholar
  16. 16.
    Eisenhauer, M., Rosengren, P., Antolin, P.: A development platform for integrating wireless devices and sensors into ambient intelligence systems. In: 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops, SECON Workshops 2009, pp. 1–3 (2009)Google Scholar
  17. 17.
    Kim, J.E., Boulos, G., Yackovich, J., Barth, T., Beckel, C., Mosse, D.: Seamless integration of heterogeneous devices and access control in smart homes. In: 2012 8th International Conference on Intelligent Environments (IE) (June 2012)Google Scholar
  18. 18.
    Stankovic, J.: Research directions for the internet of things. IEEE Internet of Things Journal 1(1), 3–9 (2014)CrossRefGoogle Scholar
  19. 19.
    Heiler, S.: Semantic interoperability. ACM Computing Surveys 27(2), 271–273 (1995).
  20. 20.
    Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Computer Networks 54(15), 2787–2805 (2010).
  21. 21.
    ISO/IEC/IEEE Health Informatics-Personal Health Device Communication-Part 20601: Application Profile-Optimized Exchange Protocol. ISO/IEEE 11073–20601:2010(E), pp. 1–208 (January 2010)Google Scholar
  22. 22.
    Hirsch, B., Konnerth, T., Heßler, A.: Merging agents and services the jiac agent platform. In: Multi-Agent Programming. Springer, pp. 159–185 (2009)Google Scholar
  23. 23.
    Craciunas, S.S., Haas, A., Kirsch, C.M., Payer, H., Röck, H., Rottmann, A., Sokolova, A., Trummer, R., Love, J., Sengupta, R.: Information-acquisition-as-a-service for cyber-physical cloud computing. In: Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing, p. 14 (2010)Google Scholar
  24. 24.
    Kirsch, C., Pereira, E., Sengupta, R., Chen, H., Hansen, R., Huang, J., Landolt, F., Lippautz, M., Rottmann, A., Swick, R., et al.: Cyber-physical cloud computing: the binding and migration problem. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 1425–1428 (2012)Google Scholar
  25. 25.
    Gerla, M.: Vehicular cloud computing. In: 2012 The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), pp. 152–155 (2012)Google Scholar
  26. 26.
    Alam, S., Chowdhury, M.M.R., Noll, J.: Senaas: an event-driven sensor virtualization approach for internet of things cloud. In: 2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications (November 2010).
  27. 27.
    Yuriyama, M., Kushida, T.: Sensor-cloud infrastructure-physical sensor management with virtualized sensors on cloud computing. In: 2010 13th International Conference on Network-Based Information Systems (NBiS) (2010)Google Scholar
  28. 28.
    Ravi, S., Raghunathan, A., Chakradhar, S.: Tamper resistance mechanisms for secure embedded systems. In: Proceedings of the 17th International Conference on VLSI Design, pp. 605–611 (2004)Google Scholar
  29. 29.
    Hohl, F.: Time limited blackbox security: protecting mobile agents from malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998). CrossRefGoogle Scholar
  30. 30.
    OAuth, OAuth 2.0. (Online; accessed August 15, 2014)
  31. 31.
    Recordon, D., Reed, D.: Openid 2.0. In: Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006 (2006).
  32. 32.
    Lantz, B., Heller, B., McKeown, N.: A network in a laptop: rapid prototyping for software-defined networks. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, p. 19. ACM (2010)Google Scholar
  33. 33.
    Pardo-Castellote, G.: Omg data-distribution service: architectural overview. In: 2003 Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (2003).

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Department of Telecommunication Systems, Complex and Distributed IT SystemsTechnische Universität BerlinBerlinGermany

Personalised recommendations