SlideShare a Scribd company logo
1 of 27
Download to read offline
SECuRE and Trustworthy
Computing Lab
Aura: An IoT based Cloud Infrastructure for
Localized Mobile Computation Outsourcing
Authors
Ragib Hasan, Md Mahmud Hossain, and Rasib Khan
SECuRE and Trustworthy computing Lab (SECRETLab)
University of Alabama at Birmingham
Presenter: Ragib Hasan, Assistant Professor, Dept. of Computer
and Information Sciences, UAB
http://secret.cis.uab.edu
CLOUD
COMPUTING
IoT
SECuRE and Trustworthy
Computing Lab
Do Clouds/computations always need to be
stationary (and far far away)?
Today’s clouds are all stationary, located far away from
users, and are housed in dedicated cloud data centers.
But sometimes, users need to perform local computation
offloading, sending data to resources close to them.
Why?
 Security
 Performance
 Mobile computing
2
SECuRE and Trustworthy
Computing Lab
How can we use the power of clouds, while
doing localized computation offloading?
Solution:
 Outsource computation locally
 Use idle or underutilized local devices
 Use the idea of bidding and micropayments to
create a sustainable computation ecosystem
 Use the cloud computing paradigm to manage
services
 Make the computation and data follow the user
3
SECuRE and Trustworthy
Computing Lab
In our grand vision, the cloud should follow
the user as she moves between locations
4
SECuRE and Trustworthy
Computing Lab
Finding computing devices in a building:
Internet of Things (IoT) to the rescue!
 IoT devices are everywhere (approximately 18.2 billions)
 Leverage the WIDE availability of IoT devices for computation offloading
 Concept: a ‘traveling’ cloud using IoT devices for mobile devices
5
SECuRE and Trustworthy
Computing Lab
Internet of
Things
M2M
Smart
Cards
Ubiquitous
computing
Web of
things
Wearables
Context -
aware
computing
Pieces of the Puzzle: Internet of Things (IoT)
 Future of computing,
communications, and services
 Self configuring capabilities
 Integrates…
 Machine-to-machine (M2M)
 Context-aware computing
 Wearables
 Ubiquitous computing
6
SECuRE and Trustworthy
Computing Lab
Smart Spaces – IoT Ecosystems
 Homes, offices, etc.
 Smart things
 Interconnected devices
 Proximal/Remote communication
 IoT information network
 Cooperative decision making
 Send/Receive data
 Share contexts
7
SECuRE and Trustworthy
Computing Lab
Cloud
Computing
Pay As You Use
Scalability
Highly
Automated
Utility Based
Reliability &
Sustainability
Device &
Location
Independent
Pieces of the Puzzle: Cloud Computing
 Elastic resource scalability
 On-demand provisioning
 Pay-as-you-go
 Complex problem solving
using inexpensive yet large
scale computing model.
 Distributed data processing
(e.g. MapReduce)
8
SECuRE and Trustworthy
Computing Lab
Pieces of the Puzzle: Computation Offloading
 Offloading/ distributed
computation of mobile
applications using cloud
resources
 Augmented execution of
partial or full process using
virtually much more
powerful devices.
9
Mobile Device
HW
OS
PaaS/IaaS Cloud
Virtual Machine
Virtual HW
OS
Partial/Full offloading
Process/Application
Process/Application
SECuRE and Trustworthy
Computing Lab
Our Approach
10
SECuRE and Trustworthy
Computing Lab
Aura
Contributions
 Create a framework for outsourcing computations to IoT devices in a
building
 Create a mobile cloud using the IoT devices
 Proof of concept: Ported MapReduce to IoT devices
11
SECuRE and Trustworthy
Computing Lab
Our solution, Aura: An IoT based Computation
Outsourcing Framework, creates a localized cloud
 Localized IoT-based cloud
 Physical proximity
 Uses available IoT devices
 Computation outsourcing
 Secure
 Less network b/w
 Supports interruption,
result preservation, and
resumption
 Increased battery lifetime
12
SECuRE and Trustworthy
Computing Lab
Aura Architecture
 Mobile devices (agents)
 Smart phone, tablet, wearables, etc.
 IoT devices
 Perform outsourced computations
 Controller
 Monitors localized IoT cloud
 Communicational and
computational abstraction between
IoT devices and the M-Agent
 High end devices (Laptop, Smart
TV, etc.)
13
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (1)
14
Mobile Agent
Controller
IoT NodeIoT Node
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (2)
15
Mobile Agent
Controller
IoT Node
3. Device Spec[req.]
4. Device Spec[resp.]
IoT Node
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (3)
16
Mobile Agent
Controller
IoT Node
3. Device Spec[req.]
4. Device Spec[resp.]
IoT Node
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (4)
17
Mobile Agent
Controller
IoT Node
3. Device Spec[req.]
4. Device Spec[resp.]
7. Submit Task Spec.
8. Task Ack.
IoT Node
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (5)
18
Mobile Agent
Controller
IoT Node
3. Device Spec[req.]
4. Device Spec[resp.]
7. Submit Task Spec.
8. Task Ack.
9. Submit Task
IoT Node
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (6)
19
Mobile Agent
Controller
IoT Node
3. Device Spec[req.]
4. Device Spec[resp.]
7. Submit Task Spec.
8. Task Ack.
9. Submit Task 10. Forward Task
IoT Node
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (7)
20
Mobile Agent
Controller
IoT Node
3. Device Spec[req.]
4. Device Spec[resp.]
7. Submit Task Spec.
8. Task Ack.
9. Submit Task 10. Forward Task
11. Results
IoT Node
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (8)
21
Mobile Agent
Controller
IoT Node
3. Device Spec[req.]
4. Device Spec[resp.]
7. Submit Task Spec.
8. Task Ack.
9. Submit Task
12. Forward Results
10. Forward Task
11. Results
IoT Node
SECuRE and Trustworthy
Computing Lab
Implementation and Experimental Results
22
SECuRE and Trustworthy
Computing Lab
Experimental Environment
 Ubuntu 12.04 LTS
 Java Controller
 T-Mote Sky IoT node
23
 Android Mobile Agent
 Contiki OS
 Cooja Simulator.
SECuRE and Trustworthy
Computing Lab
Experiment
 ‘Word Count’ using MapReduce
24
SECuRE and Trustworthy
Computing Lab
Experimental Result
25
SECuRE and Trustworthy
Computing Lab
Open Problems and Future Work
26
Application &
use case scenarios
Plug & Play devices
Self-configuring protocol
Large scale
experiment &
evaluation
Incentive model
Security
SECuRE and Trustworthy
Computing Lab
Thank You
27
SECRETLab@UAB
 Phone: 205.934.8643
 Fax: 205.934.5473
 Web: http://secret.cis.uab.edu/
Ragib Hasan
 Email: ragib@cis.uab.edu
 Web: http://www.ragibhasan.com/

More Related Content

What's hot

Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...
Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...
Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...Andri Yadi
 
Towards a Serverless Platform for Edge AI
Towards a Serverless Platform for Edge AITowards a Serverless Platform for Edge AI
Towards a Serverless Platform for Edge AIThomas Rausch
 
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Codit
 
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Codit
 
Connecting IoT devices to Azure
Connecting IoT devices to AzureConnecting IoT devices to Azure
Connecting IoT devices to AzureGuy Barrette
 
BRK2122 IOT - From the cloud to the edge
BRK2122 IOT - From the cloud to the edgeBRK2122 IOT - From the cloud to the edge
BRK2122 IOT - From the cloud to the edgeAxel Dittmann
 
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...Mahmud Hossain
 
Using Azure, AI and IoT to find out if the person next to you is a Cylon
Using Azure, AI and IoT to find out if the person next to you is a CylonUsing Azure, AI and IoT to find out if the person next to you is a Cylon
Using Azure, AI and IoT to find out if the person next to you is a CylonTodd Whitehead
 
Google Cloud IoT Core
Google Cloud IoT CoreGoogle Cloud IoT Core
Google Cloud IoT CoreIdo Flatow
 
IOT Edge within th eAzure IOT Framework
IOT Edge within th eAzure IOT FrameworkIOT Edge within th eAzure IOT Framework
IOT Edge within th eAzure IOT FrameworkAxel Dittmann
 
Building IoT solutions using Windows 10 IoT Core & Azure
Building IoT solutions using Windows 10 IoT Core & AzureBuilding IoT solutions using Windows 10 IoT Core & Azure
Building IoT solutions using Windows 10 IoT Core & AzureMostafa
 
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...Microsoft Tech Community
 
How I started with Azure IoT - Global Azure Greece 2021
How I started with Azure IoT - Global Azure Greece 2021How I started with Azure IoT - Global Azure Greece 2021
How I started with Azure IoT - Global Azure Greece 2021Maria-Anastasia Moustaka
 
Guide to IoT Projects and Architecture with Microsoft Cloud and Azure
Guide to IoT Projects and Architecture with Microsoft Cloud and AzureGuide to IoT Projects and Architecture with Microsoft Cloud and Azure
Guide to IoT Projects and Architecture with Microsoft Cloud and AzureBarnaba Accardi
 
Exploring IoT Edge
Exploring IoT EdgeExploring IoT Edge
Exploring IoT EdgeCodit
 
Windows for Raspberry Pi 2 Makers (and more!)
Windows for Raspberry Pi 2Makers (and more!)Windows for Raspberry Pi 2Makers (and more!)
Windows for Raspberry Pi 2 Makers (and more!)Guy Barrette
 
Attack graph generation for micro services architecture
Attack graph generation for micro services architectureAttack graph generation for micro services architecture
Attack graph generation for micro services architectureAbdul Qadir
 

What's hot (20)

Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...
Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...
Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...
 
Towards a Serverless Platform for Edge AI
Towards a Serverless Platform for Edge AITowards a Serverless Platform for Edge AI
Towards a Serverless Platform for Edge AI
 
IoT on azure
IoT on azureIoT on azure
IoT on azure
 
Azure Digital Twins
Azure Digital TwinsAzure Digital Twins
Azure Digital Twins
 
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
 
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
 
Connecting IoT devices to Azure
Connecting IoT devices to AzureConnecting IoT devices to Azure
Connecting IoT devices to Azure
 
BRK2122 IOT - From the cloud to the edge
BRK2122 IOT - From the cloud to the edgeBRK2122 IOT - From the cloud to the edge
BRK2122 IOT - From the cloud to the edge
 
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
 
Using Azure, AI and IoT to find out if the person next to you is a Cylon
Using Azure, AI and IoT to find out if the person next to you is a CylonUsing Azure, AI and IoT to find out if the person next to you is a Cylon
Using Azure, AI and IoT to find out if the person next to you is a Cylon
 
Google Cloud IoT Core
Google Cloud IoT CoreGoogle Cloud IoT Core
Google Cloud IoT Core
 
IOT Edge within th eAzure IOT Framework
IOT Edge within th eAzure IOT FrameworkIOT Edge within th eAzure IOT Framework
IOT Edge within th eAzure IOT Framework
 
Building IoT solutions using Windows 10 IoT Core & Azure
Building IoT solutions using Windows 10 IoT Core & AzureBuilding IoT solutions using Windows 10 IoT Core & Azure
Building IoT solutions using Windows 10 IoT Core & Azure
 
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
 
How I started with Azure IoT - Global Azure Greece 2021
How I started with Azure IoT - Global Azure Greece 2021How I started with Azure IoT - Global Azure Greece 2021
How I started with Azure IoT - Global Azure Greece 2021
 
Guide to IoT Projects and Architecture with Microsoft Cloud and Azure
Guide to IoT Projects and Architecture with Microsoft Cloud and AzureGuide to IoT Projects and Architecture with Microsoft Cloud and Azure
Guide to IoT Projects and Architecture with Microsoft Cloud and Azure
 
Az-Internet of things
Az-Internet of thingsAz-Internet of things
Az-Internet of things
 
Exploring IoT Edge
Exploring IoT EdgeExploring IoT Edge
Exploring IoT Edge
 
Windows for Raspberry Pi 2 Makers (and more!)
Windows for Raspberry Pi 2Makers (and more!)Windows for Raspberry Pi 2Makers (and more!)
Windows for Raspberry Pi 2 Makers (and more!)
 
Attack graph generation for micro services architecture
Attack graph generation for micro services architectureAttack graph generation for micro services architecture
Attack graph generation for micro services architecture
 

Similar to Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outsourcing

Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)Codit
 
Azure intelligent edge solutions overview
Azure intelligent edge solutions overviewAzure intelligent edge solutions overview
Azure intelligent edge solutions overviewCenk Ersoy
 
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017) Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017) Codit
 
Azure iot edge and AI enabling the intelligent edge
Azure iot edge and AI  enabling the intelligent edgeAzure iot edge and AI  enabling the intelligent edge
Azure iot edge and AI enabling the intelligent edgeMarco Dal Pino
 
Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar reportSKS
 
Architectural solutions for the cloud
Architectural solutions for the cloudArchitectural solutions for the cloud
Architectural solutions for the cloudthreesixty
 
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...RahulJain989779
 
IoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and mlIoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and mlMarco Dal Pino
 
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...FIWARE
 
Innovation anywhere with microsoft azure arc
Innovation anywhere with microsoft azure arcInnovation anywhere with microsoft azure arc
Innovation anywhere with microsoft azure arcGoviccaSihombing
 
한컴MDS_Microsoft Azure IoT Overview
한컴MDS_Microsoft Azure IoT Overview한컴MDS_Microsoft Azure IoT Overview
한컴MDS_Microsoft Azure IoT OverviewHANCOM MDS
 
Cloud Monitoring System Using Internet of Things
Cloud Monitoring System Using Internet of ThingsCloud Monitoring System Using Internet of Things
Cloud Monitoring System Using Internet of ThingsIRJET Journal
 
Cloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsCloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsDarshan Rajagopal
 
Smart Storage for Home Application
Smart Storage for Home ApplicationSmart Storage for Home Application
Smart Storage for Home ApplicationIRJET Journal
 
Keynote on Mobile Grid and Cloud Computing
Keynote on Mobile Grid and Cloud ComputingKeynote on Mobile Grid and Cloud Computing
Keynote on Mobile Grid and Cloud ComputingSayed Chhattan Shah
 
Virtualization on embedded boards
Virtualization on embedded boardsVirtualization on embedded boards
Virtualization on embedded boardsMohamed Ramadan
 
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Codit
 

Similar to Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outsourcing (20)

Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
 
Azure IoT Camp
Azure IoT CampAzure IoT Camp
Azure IoT Camp
 
Azure intelligent edge solutions overview
Azure intelligent edge solutions overviewAzure intelligent edge solutions overview
Azure intelligent edge solutions overview
 
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017) Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
 
Azure iot edge and AI enabling the intelligent edge
Azure iot edge and AI  enabling the intelligent edgeAzure iot edge and AI  enabling the intelligent edge
Azure iot edge and AI enabling the intelligent edge
 
Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar report
 
Architectural solutions for the cloud
Architectural solutions for the cloudArchitectural solutions for the cloud
Architectural solutions for the cloud
 
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
 
IoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and mlIoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and ml
 
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...
 
Innovation anywhere with microsoft azure arc
Innovation anywhere with microsoft azure arcInnovation anywhere with microsoft azure arc
Innovation anywhere with microsoft azure arc
 
한컴MDS_Microsoft Azure IoT Overview
한컴MDS_Microsoft Azure IoT Overview한컴MDS_Microsoft Azure IoT Overview
한컴MDS_Microsoft Azure IoT Overview
 
Azure 10 major services
Azure 10 major servicesAzure 10 major services
Azure 10 major services
 
Cloud Monitoring System Using Internet of Things
Cloud Monitoring System Using Internet of ThingsCloud Monitoring System Using Internet of Things
Cloud Monitoring System Using Internet of Things
 
Cloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsCloud Computing for Mobile Robots
Cloud Computing for Mobile Robots
 
Smart Storage for Home Application
Smart Storage for Home ApplicationSmart Storage for Home Application
Smart Storage for Home Application
 
Keynote on Mobile Grid and Cloud Computing
Keynote on Mobile Grid and Cloud ComputingKeynote on Mobile Grid and Cloud Computing
Keynote on Mobile Grid and Cloud Computing
 
Virtualization on embedded boards
Virtualization on embedded boardsVirtualization on embedded boards
Virtualization on embedded boards
 
Final Report
Final ReportFinal Report
Final Report
 
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
 

More from Mahmud Hossain

Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Mahmud Hossain
 
CACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming ServiceCACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming ServiceMahmud Hossain
 
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...Mahmud Hossain
 
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...Mahmud Hossain
 
Secprov: Trustworthy and Efficient Provenance Management in the Cloud
Secprov: Trustworthy and Efficient Provenance Management in the CloudSecprov: Trustworthy and Efficient Provenance Management in the Cloud
Secprov: Trustworthy and Efficient Provenance Management in the CloudMahmud Hossain
 
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...Mahmud Hossain
 
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...Mahmud Hossain
 
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
Jugo: A Generic Architecture for Composite Cloud as a Service AuthJugo: A Generic Architecture for Composite Cloud as a Service Auth
Jugo: A Generic Architecture for Composite Cloud as a Service AuthMahmud Hossain
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Mahmud Hossain
 
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...Mahmud Hossain
 
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...Mahmud Hossain
 

More from Mahmud Hossain (11)

Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
 
CACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming ServiceCACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming Service
 
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
 
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
 
Secprov: Trustworthy and Efficient Provenance Management in the Cloud
Secprov: Trustworthy and Efficient Provenance Management in the CloudSecprov: Trustworthy and Efficient Provenance Management in the Cloud
Secprov: Trustworthy and Efficient Provenance Management in the Cloud
 
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
 
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
 
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
Jugo: A Generic Architecture for Composite Cloud as a Service AuthJugo: A Generic Architecture for Composite Cloud as a Service Auth
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
 
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
 
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outsourcing

  • 1. SECuRE and Trustworthy Computing Lab Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outsourcing Authors Ragib Hasan, Md Mahmud Hossain, and Rasib Khan SECuRE and Trustworthy computing Lab (SECRETLab) University of Alabama at Birmingham Presenter: Ragib Hasan, Assistant Professor, Dept. of Computer and Information Sciences, UAB http://secret.cis.uab.edu CLOUD COMPUTING IoT
  • 2. SECuRE and Trustworthy Computing Lab Do Clouds/computations always need to be stationary (and far far away)? Today’s clouds are all stationary, located far away from users, and are housed in dedicated cloud data centers. But sometimes, users need to perform local computation offloading, sending data to resources close to them. Why?  Security  Performance  Mobile computing 2
  • 3. SECuRE and Trustworthy Computing Lab How can we use the power of clouds, while doing localized computation offloading? Solution:  Outsource computation locally  Use idle or underutilized local devices  Use the idea of bidding and micropayments to create a sustainable computation ecosystem  Use the cloud computing paradigm to manage services  Make the computation and data follow the user 3
  • 4. SECuRE and Trustworthy Computing Lab In our grand vision, the cloud should follow the user as she moves between locations 4
  • 5. SECuRE and Trustworthy Computing Lab Finding computing devices in a building: Internet of Things (IoT) to the rescue!  IoT devices are everywhere (approximately 18.2 billions)  Leverage the WIDE availability of IoT devices for computation offloading  Concept: a ‘traveling’ cloud using IoT devices for mobile devices 5
  • 6. SECuRE and Trustworthy Computing Lab Internet of Things M2M Smart Cards Ubiquitous computing Web of things Wearables Context - aware computing Pieces of the Puzzle: Internet of Things (IoT)  Future of computing, communications, and services  Self configuring capabilities  Integrates…  Machine-to-machine (M2M)  Context-aware computing  Wearables  Ubiquitous computing 6
  • 7. SECuRE and Trustworthy Computing Lab Smart Spaces – IoT Ecosystems  Homes, offices, etc.  Smart things  Interconnected devices  Proximal/Remote communication  IoT information network  Cooperative decision making  Send/Receive data  Share contexts 7
  • 8. SECuRE and Trustworthy Computing Lab Cloud Computing Pay As You Use Scalability Highly Automated Utility Based Reliability & Sustainability Device & Location Independent Pieces of the Puzzle: Cloud Computing  Elastic resource scalability  On-demand provisioning  Pay-as-you-go  Complex problem solving using inexpensive yet large scale computing model.  Distributed data processing (e.g. MapReduce) 8
  • 9. SECuRE and Trustworthy Computing Lab Pieces of the Puzzle: Computation Offloading  Offloading/ distributed computation of mobile applications using cloud resources  Augmented execution of partial or full process using virtually much more powerful devices. 9 Mobile Device HW OS PaaS/IaaS Cloud Virtual Machine Virtual HW OS Partial/Full offloading Process/Application Process/Application
  • 10. SECuRE and Trustworthy Computing Lab Our Approach 10
  • 11. SECuRE and Trustworthy Computing Lab Aura Contributions  Create a framework for outsourcing computations to IoT devices in a building  Create a mobile cloud using the IoT devices  Proof of concept: Ported MapReduce to IoT devices 11
  • 12. SECuRE and Trustworthy Computing Lab Our solution, Aura: An IoT based Computation Outsourcing Framework, creates a localized cloud  Localized IoT-based cloud  Physical proximity  Uses available IoT devices  Computation outsourcing  Secure  Less network b/w  Supports interruption, result preservation, and resumption  Increased battery lifetime 12
  • 13. SECuRE and Trustworthy Computing Lab Aura Architecture  Mobile devices (agents)  Smart phone, tablet, wearables, etc.  IoT devices  Perform outsourced computations  Controller  Monitors localized IoT cloud  Communicational and computational abstraction between IoT devices and the M-Agent  High end devices (Laptop, Smart TV, etc.) 13
  • 14. SECuRE and Trustworthy Computing Lab Aura Operational Model (1) 14 Mobile Agent Controller IoT NodeIoT Node
  • 15. SECuRE and Trustworthy Computing Lab Aura Operational Model (2) 15 Mobile Agent Controller IoT Node 3. Device Spec[req.] 4. Device Spec[resp.] IoT Node
  • 16. SECuRE and Trustworthy Computing Lab Aura Operational Model (3) 16 Mobile Agent Controller IoT Node 3. Device Spec[req.] 4. Device Spec[resp.] IoT Node
  • 17. SECuRE and Trustworthy Computing Lab Aura Operational Model (4) 17 Mobile Agent Controller IoT Node 3. Device Spec[req.] 4. Device Spec[resp.] 7. Submit Task Spec. 8. Task Ack. IoT Node
  • 18. SECuRE and Trustworthy Computing Lab Aura Operational Model (5) 18 Mobile Agent Controller IoT Node 3. Device Spec[req.] 4. Device Spec[resp.] 7. Submit Task Spec. 8. Task Ack. 9. Submit Task IoT Node
  • 19. SECuRE and Trustworthy Computing Lab Aura Operational Model (6) 19 Mobile Agent Controller IoT Node 3. Device Spec[req.] 4. Device Spec[resp.] 7. Submit Task Spec. 8. Task Ack. 9. Submit Task 10. Forward Task IoT Node
  • 20. SECuRE and Trustworthy Computing Lab Aura Operational Model (7) 20 Mobile Agent Controller IoT Node 3. Device Spec[req.] 4. Device Spec[resp.] 7. Submit Task Spec. 8. Task Ack. 9. Submit Task 10. Forward Task 11. Results IoT Node
  • 21. SECuRE and Trustworthy Computing Lab Aura Operational Model (8) 21 Mobile Agent Controller IoT Node 3. Device Spec[req.] 4. Device Spec[resp.] 7. Submit Task Spec. 8. Task Ack. 9. Submit Task 12. Forward Results 10. Forward Task 11. Results IoT Node
  • 22. SECuRE and Trustworthy Computing Lab Implementation and Experimental Results 22
  • 23. SECuRE and Trustworthy Computing Lab Experimental Environment  Ubuntu 12.04 LTS  Java Controller  T-Mote Sky IoT node 23  Android Mobile Agent  Contiki OS  Cooja Simulator.
  • 24. SECuRE and Trustworthy Computing Lab Experiment  ‘Word Count’ using MapReduce 24
  • 25. SECuRE and Trustworthy Computing Lab Experimental Result 25
  • 26. SECuRE and Trustworthy Computing Lab Open Problems and Future Work 26 Application & use case scenarios Plug & Play devices Self-configuring protocol Large scale experiment & evaluation Incentive model Security
  • 27. SECuRE and Trustworthy Computing Lab Thank You 27 SECRETLab@UAB  Phone: 205.934.8643  Fax: 205.934.5473  Web: http://secret.cis.uab.edu/ Ragib Hasan  Email: ragib@cis.uab.edu  Web: http://www.ragibhasan.com/