SlideShare a Scribd company logo
SECuRE and Trustworthy
Computing Lab
Aura: An IoT based Cloud Infrastructure for
Localized Mobile Computation Outsourcing
Authors
Ragib Hasan, Md Mahmud Hossain, and Rasib Khan
SECuRE and Trustworthy computing Lab (SECRETLab)
University of Alabama at Birmingham
Presenter: Ragib Hasan, Assistant Professor, Dept. of Computer
and Information Sciences, UAB
http://secret.cis.uab.edu
CLOUD
COMPUTING
IoT
SECuRE and Trustworthy
Computing Lab
Do Clouds/computations always need to be
stationary (and far far away)?
Today’s clouds are all stationary, located far away from
users, and are housed in dedicated cloud data centers.
But sometimes, users need to perform local computation
offloading, sending data to resources close to them.
Why?
 Security
 Performance
 Mobile computing
2
SECuRE and Trustworthy
Computing Lab
How can we use the power of clouds, while
doing localized computation offloading?
Solution:
 Outsource computation locally
 Use idle or underutilized local devices
 Use the idea of bidding and micropayments to
create a sustainable computation ecosystem
 Use the cloud computing paradigm to manage
services
 Make the computation and data follow the user
3
SECuRE and Trustworthy
Computing Lab
In our grand vision, the cloud should follow
the user as she moves between locations
4
SECuRE and Trustworthy
Computing Lab
Finding computing devices in a building:
Internet of Things (IoT) to the rescue!
 IoT devices are everywhere (approximately 18.2 billions)
 Leverage the WIDE availability of IoT devices for computation offloading
 Concept: a ‘traveling’ cloud using IoT devices for mobile devices
5
SECuRE and Trustworthy
Computing Lab
Internet of
Things
M2M
Smart
Cards
Ubiquitous
computing
Web of
things
Wearables
Context -
aware
computing
Pieces of the Puzzle: Internet of Things (IoT)
 Future of computing,
communications, and services
 Self configuring capabilities
 Integrates…
 Machine-to-machine (M2M)
 Context-aware computing
 Wearables
 Ubiquitous computing
6
SECuRE and Trustworthy
Computing Lab
Smart Spaces – IoT Ecosystems
 Homes, offices, etc.
 Smart things
 Interconnected devices
 Proximal/Remote communication
 IoT information network
 Cooperative decision making
 Send/Receive data
 Share contexts
7
SECuRE and Trustworthy
Computing Lab
Cloud
Computing
Pay As You Use
Scalability
Highly
Automated
Utility Based
Reliability &
Sustainability
Device &
Location
Independent
Pieces of the Puzzle: Cloud Computing
 Elastic resource scalability
 On-demand provisioning
 Pay-as-you-go
 Complex problem solving
using inexpensive yet large
scale computing model.
 Distributed data processing
(e.g. MapReduce)
8
SECuRE and Trustworthy
Computing Lab
Pieces of the Puzzle: Computation Offloading
 Offloading/ distributed
computation of mobile
applications using cloud
resources
 Augmented execution of
partial or full process using
virtually much more
powerful devices.
9
Mobile Device
HW
OS
PaaS/IaaS Cloud
Virtual Machine
Virtual HW
OS
Partial/Full offloading
Process/Application
Process/Application
SECuRE and Trustworthy
Computing Lab
Our Approach
10
SECuRE and Trustworthy
Computing Lab
Aura
Contributions
 Create a framework for outsourcing computations to IoT devices in a
building
 Create a mobile cloud using the IoT devices
 Proof of concept: Ported MapReduce to IoT devices
11
SECuRE and Trustworthy
Computing Lab
Our solution, Aura: An IoT based Computation
Outsourcing Framework, creates a localized cloud
 Localized IoT-based cloud
 Physical proximity
 Uses available IoT devices
 Computation outsourcing
 Secure
 Less network b/w
 Supports interruption,
result preservation, and
resumption
 Increased battery lifetime
12
SECuRE and Trustworthy
Computing Lab
Aura Architecture
 Mobile devices (agents)
 Smart phone, tablet, wearables, etc.
 IoT devices
 Perform outsourced computations
 Controller
 Monitors localized IoT cloud
 Communicational and
computational abstraction between
IoT devices and the M-Agent
 High end devices (Laptop, Smart
TV, etc.)
13
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (1)
14
Mobile Agent
Controller
IoT NodeIoT Node
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (2)
15
Mobile Agent
Controller
IoT Node
3. Device Spec[req.]
4. Device Spec[resp.]
IoT Node
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (3)
16
Mobile Agent
Controller
IoT Node
3. Device Spec[req.]
4. Device Spec[resp.]
IoT Node
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (4)
17
Mobile Agent
Controller
IoT Node
3. Device Spec[req.]
4. Device Spec[resp.]
7. Submit Task Spec.
8. Task Ack.
IoT Node
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (5)
18
Mobile Agent
Controller
IoT Node
3. Device Spec[req.]
4. Device Spec[resp.]
7. Submit Task Spec.
8. Task Ack.
9. Submit Task
IoT Node
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (6)
19
Mobile Agent
Controller
IoT Node
3. Device Spec[req.]
4. Device Spec[resp.]
7. Submit Task Spec.
8. Task Ack.
9. Submit Task 10. Forward Task
IoT Node
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (7)
20
Mobile Agent
Controller
IoT Node
3. Device Spec[req.]
4. Device Spec[resp.]
7. Submit Task Spec.
8. Task Ack.
9. Submit Task 10. Forward Task
11. Results
IoT Node
SECuRE and Trustworthy
Computing Lab
Aura Operational Model (8)
21
Mobile Agent
Controller
IoT Node
3. Device Spec[req.]
4. Device Spec[resp.]
7. Submit Task Spec.
8. Task Ack.
9. Submit Task
12. Forward Results
10. Forward Task
11. Results
IoT Node
SECuRE and Trustworthy
Computing Lab
Implementation and Experimental Results
22
SECuRE and Trustworthy
Computing Lab
Experimental Environment
 Ubuntu 12.04 LTS
 Java Controller
 T-Mote Sky IoT node
23
 Android Mobile Agent
 Contiki OS
 Cooja Simulator.
SECuRE and Trustworthy
Computing Lab
Experiment
 ‘Word Count’ using MapReduce
24
SECuRE and Trustworthy
Computing Lab
Experimental Result
25
SECuRE and Trustworthy
Computing Lab
Open Problems and Future Work
26
Application &
use case scenarios
Plug & Play devices
Self-configuring protocol
Large scale
experiment &
evaluation
Incentive model
Security
SECuRE and Trustworthy
Computing Lab
Thank You
27
SECRETLab@UAB
 Phone: 205.934.8643
 Fax: 205.934.5473
 Web: http://secret.cis.uab.edu/
Ragib Hasan
 Email: ragib@cis.uab.edu
 Web: http://www.ragibhasan.com/

More Related Content

What's hot

Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...
Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...
Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...
Andri Yadi
 
Towards a Serverless Platform for Edge AI
Towards a Serverless Platform for Edge AITowards a Serverless Platform for Edge AI
Towards a Serverless Platform for Edge AI
Thomas Rausch
 
IoT on azure
IoT on azureIoT on azure
IoT on azure
Joanna Lamch
 
Azure Digital Twins
Azure Digital TwinsAzure Digital Twins
Azure Digital Twins
Marco Parenzan
 
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Codit
 
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Codit
 
Connecting IoT devices to Azure
Connecting IoT devices to AzureConnecting IoT devices to Azure
Connecting IoT devices to Azure
Guy Barrette
 
BRK2122 IOT - From the cloud to the edge
BRK2122 IOT - From the cloud to the edgeBRK2122 IOT - From the cloud to the edge
BRK2122 IOT - From the cloud to the edge
Axel Dittmann
 
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
Mahmud Hossain
 
Using Azure, AI and IoT to find out if the person next to you is a Cylon
Using Azure, AI and IoT to find out if the person next to you is a CylonUsing Azure, AI and IoT to find out if the person next to you is a Cylon
Using Azure, AI and IoT to find out if the person next to you is a Cylon
Todd Whitehead
 
Google Cloud IoT Core
Google Cloud IoT CoreGoogle Cloud IoT Core
Google Cloud IoT Core
Ido Flatow
 
IOT Edge within th eAzure IOT Framework
IOT Edge within th eAzure IOT FrameworkIOT Edge within th eAzure IOT Framework
IOT Edge within th eAzure IOT Framework
Axel Dittmann
 
Building IoT solutions using Windows 10 IoT Core & Azure
Building IoT solutions using Windows 10 IoT Core & AzureBuilding IoT solutions using Windows 10 IoT Core & Azure
Building IoT solutions using Windows 10 IoT Core & Azure
Mostafa
 
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
Microsoft Tech Community
 
How I started with Azure IoT - Global Azure Greece 2021
How I started with Azure IoT - Global Azure Greece 2021How I started with Azure IoT - Global Azure Greece 2021
How I started with Azure IoT - Global Azure Greece 2021
Maria-Anastasia Moustaka
 
Guide to IoT Projects and Architecture with Microsoft Cloud and Azure
Guide to IoT Projects and Architecture with Microsoft Cloud and AzureGuide to IoT Projects and Architecture with Microsoft Cloud and Azure
Guide to IoT Projects and Architecture with Microsoft Cloud and Azure
Barnaba Accardi
 
Az-Internet of things
Az-Internet of thingsAz-Internet of things
Az-Internet of things
kaushalkishor94
 
Exploring IoT Edge
Exploring IoT EdgeExploring IoT Edge
Exploring IoT Edge
Codit
 
Windows for Raspberry Pi 2 Makers (and more!)
Windows for Raspberry Pi 2Makers (and more!)Windows for Raspberry Pi 2Makers (and more!)
Windows for Raspberry Pi 2 Makers (and more!)
Guy Barrette
 
Attack graph generation for micro services architecture
Attack graph generation for micro services architectureAttack graph generation for micro services architecture
Attack graph generation for micro services architecture
Abdul Qadir
 

What's hot (20)

Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...
Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...
Global Azure Bootcamp 2016 - Real-world Internet of Things Backend with Azure...
 
Towards a Serverless Platform for Edge AI
Towards a Serverless Platform for Edge AITowards a Serverless Platform for Edge AI
Towards a Serverless Platform for Edge AI
 
IoT on azure
IoT on azureIoT on azure
IoT on azure
 
Azure Digital Twins
Azure Digital TwinsAzure Digital Twins
Azure Digital Twins
 
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
 
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
 
Connecting IoT devices to Azure
Connecting IoT devices to AzureConnecting IoT devices to Azure
Connecting IoT devices to Azure
 
BRK2122 IOT - From the cloud to the edge
BRK2122 IOT - From the cloud to the edgeBRK2122 IOT - From the cloud to the edge
BRK2122 IOT - From the cloud to the edge
 
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
 
Using Azure, AI and IoT to find out if the person next to you is a Cylon
Using Azure, AI and IoT to find out if the person next to you is a CylonUsing Azure, AI and IoT to find out if the person next to you is a Cylon
Using Azure, AI and IoT to find out if the person next to you is a Cylon
 
Google Cloud IoT Core
Google Cloud IoT CoreGoogle Cloud IoT Core
Google Cloud IoT Core
 
IOT Edge within th eAzure IOT Framework
IOT Edge within th eAzure IOT FrameworkIOT Edge within th eAzure IOT Framework
IOT Edge within th eAzure IOT Framework
 
Building IoT solutions using Windows 10 IoT Core & Azure
Building IoT solutions using Windows 10 IoT Core & AzureBuilding IoT solutions using Windows 10 IoT Core & Azure
Building IoT solutions using Windows 10 IoT Core & Azure
 
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
Azure IoT Edge: a breakthrough platform and service running cloud intelligenc...
 
How I started with Azure IoT - Global Azure Greece 2021
How I started with Azure IoT - Global Azure Greece 2021How I started with Azure IoT - Global Azure Greece 2021
How I started with Azure IoT - Global Azure Greece 2021
 
Guide to IoT Projects and Architecture with Microsoft Cloud and Azure
Guide to IoT Projects and Architecture with Microsoft Cloud and AzureGuide to IoT Projects and Architecture with Microsoft Cloud and Azure
Guide to IoT Projects and Architecture with Microsoft Cloud and Azure
 
Az-Internet of things
Az-Internet of thingsAz-Internet of things
Az-Internet of things
 
Exploring IoT Edge
Exploring IoT EdgeExploring IoT Edge
Exploring IoT Edge
 
Windows for Raspberry Pi 2 Makers (and more!)
Windows for Raspberry Pi 2Makers (and more!)Windows for Raspberry Pi 2Makers (and more!)
Windows for Raspberry Pi 2 Makers (and more!)
 
Attack graph generation for micro services architecture
Attack graph generation for micro services architectureAttack graph generation for micro services architecture
Attack graph generation for micro services architecture
 

Similar to Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outsourcing

Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Codit
 
Azure IoT Camp
Azure IoT CampAzure IoT Camp
Azure IoT Camp
Vadim Kacherov
 
Azure intelligent edge solutions overview
Azure intelligent edge solutions overviewAzure intelligent edge solutions overview
Azure intelligent edge solutions overview
Cenk Ersoy
 
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017) Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Codit
 
Azure iot edge and AI enabling the intelligent edge
Azure iot edge and AI  enabling the intelligent edgeAzure iot edge and AI  enabling the intelligent edge
Azure iot edge and AI enabling the intelligent edge
Marco Dal Pino
 
Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar report
SKS
 
Architectural solutions for the cloud
Architectural solutions for the cloudArchitectural solutions for the cloud
Architectural solutions for the cloud
threesixty
 
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
RahulJain989779
 
IoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and mlIoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and ml
Marco Dal Pino
 
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...
FIWARE
 
Innovation anywhere with microsoft azure arc
Innovation anywhere with microsoft azure arcInnovation anywhere with microsoft azure arc
Innovation anywhere with microsoft azure arc
GoviccaSihombing
 
한컴MDS_Microsoft Azure IoT Overview
한컴MDS_Microsoft Azure IoT Overview한컴MDS_Microsoft Azure IoT Overview
한컴MDS_Microsoft Azure IoT Overview
HANCOM MDS
 
Azure 10 major services
Azure 10 major servicesAzure 10 major services
Azure 10 major services
Arnab Chakraborty,PMP
 
Cloud Monitoring System Using Internet of Things
Cloud Monitoring System Using Internet of ThingsCloud Monitoring System Using Internet of Things
Cloud Monitoring System Using Internet of Things
IRJET Journal
 
Cloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsCloud Computing for Mobile Robots
Cloud Computing for Mobile Robots
Darshan Rajagopal
 
Smart Storage for Home Application
Smart Storage for Home ApplicationSmart Storage for Home Application
Smart Storage for Home Application
IRJET Journal
 
Keynote on Mobile Grid and Cloud Computing
Keynote on Mobile Grid and Cloud ComputingKeynote on Mobile Grid and Cloud Computing
Keynote on Mobile Grid and Cloud Computing
Sayed Chhattan Shah
 
Virtualization on embedded boards
Virtualization on embedded boardsVirtualization on embedded boards
Virtualization on embedded boards
Mohamed Ramadan
 
Final Report
Final ReportFinal Report
Final Report
San Kai Hong
 
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Codit
 

Similar to Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outsourcing (20)

Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
 
Azure IoT Camp
Azure IoT CampAzure IoT Camp
Azure IoT Camp
 
Azure intelligent edge solutions overview
Azure intelligent edge solutions overviewAzure intelligent edge solutions overview
Azure intelligent edge solutions overview
 
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017) Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
 
Azure iot edge and AI enabling the intelligent edge
Azure iot edge and AI  enabling the intelligent edgeAzure iot edge and AI  enabling the intelligent edge
Azure iot edge and AI enabling the intelligent edge
 
Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar report
 
Architectural solutions for the cloud
Architectural solutions for the cloudArchitectural solutions for the cloud
Architectural solutions for the cloud
 
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
 
IoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and mlIoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and ml
 
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...
 
Innovation anywhere with microsoft azure arc
Innovation anywhere with microsoft azure arcInnovation anywhere with microsoft azure arc
Innovation anywhere with microsoft azure arc
 
한컴MDS_Microsoft Azure IoT Overview
한컴MDS_Microsoft Azure IoT Overview한컴MDS_Microsoft Azure IoT Overview
한컴MDS_Microsoft Azure IoT Overview
 
Azure 10 major services
Azure 10 major servicesAzure 10 major services
Azure 10 major services
 
Cloud Monitoring System Using Internet of Things
Cloud Monitoring System Using Internet of ThingsCloud Monitoring System Using Internet of Things
Cloud Monitoring System Using Internet of Things
 
Cloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsCloud Computing for Mobile Robots
Cloud Computing for Mobile Robots
 
Smart Storage for Home Application
Smart Storage for Home ApplicationSmart Storage for Home Application
Smart Storage for Home Application
 
Keynote on Mobile Grid and Cloud Computing
Keynote on Mobile Grid and Cloud ComputingKeynote on Mobile Grid and Cloud Computing
Keynote on Mobile Grid and Cloud Computing
 
Virtualization on embedded boards
Virtualization on embedded boardsVirtualization on embedded boards
Virtualization on embedded boards
 
Final Report
Final ReportFinal Report
Final Report
 
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
 

More from Mahmud Hossain

Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Mahmud Hossain
 
CACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming ServiceCACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming Service
Mahmud Hossain
 
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Mahmud Hossain
 
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
Mahmud Hossain
 
Secprov: Trustworthy and Efficient Provenance Management in the Cloud
Secprov: Trustworthy and Efficient Provenance Management in the CloudSecprov: Trustworthy and Efficient Provenance Management in the Cloud
Secprov: Trustworthy and Efficient Provenance Management in the Cloud
Mahmud Hossain
 
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Mahmud Hossain
 
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Mahmud Hossain
 
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
Jugo: A Generic Architecture for Composite Cloud as a Service AuthJugo: A Generic Architecture for Composite Cloud as a Service Auth
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
Mahmud Hossain
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Mahmud Hossain
 
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
Mahmud Hossain
 
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
Mahmud Hossain
 

More from Mahmud Hossain (11)

Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
 
CACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming ServiceCACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming Service
 
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
 
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
 
Secprov: Trustworthy and Efficient Provenance Management in the Cloud
Secprov: Trustworthy and Efficient Provenance Management in the CloudSecprov: Trustworthy and Efficient Provenance Management in the Cloud
Secprov: Trustworthy and Efficient Provenance Management in the Cloud
 
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
 
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
 
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
Jugo: A Generic Architecture for Composite Cloud as a Service AuthJugo: A Generic Architecture for Composite Cloud as a Service Auth
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
 
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
 
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
 

Recently uploaded

Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 

Recently uploaded (20)

Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 

Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outsourcing

  • 1. SECuRE and Trustworthy Computing Lab Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outsourcing Authors Ragib Hasan, Md Mahmud Hossain, and Rasib Khan SECuRE and Trustworthy computing Lab (SECRETLab) University of Alabama at Birmingham Presenter: Ragib Hasan, Assistant Professor, Dept. of Computer and Information Sciences, UAB http://secret.cis.uab.edu CLOUD COMPUTING IoT
  • 2. SECuRE and Trustworthy Computing Lab Do Clouds/computations always need to be stationary (and far far away)? Today’s clouds are all stationary, located far away from users, and are housed in dedicated cloud data centers. But sometimes, users need to perform local computation offloading, sending data to resources close to them. Why?  Security  Performance  Mobile computing 2
  • 3. SECuRE and Trustworthy Computing Lab How can we use the power of clouds, while doing localized computation offloading? Solution:  Outsource computation locally  Use idle or underutilized local devices  Use the idea of bidding and micropayments to create a sustainable computation ecosystem  Use the cloud computing paradigm to manage services  Make the computation and data follow the user 3
  • 4. SECuRE and Trustworthy Computing Lab In our grand vision, the cloud should follow the user as she moves between locations 4
  • 5. SECuRE and Trustworthy Computing Lab Finding computing devices in a building: Internet of Things (IoT) to the rescue!  IoT devices are everywhere (approximately 18.2 billions)  Leverage the WIDE availability of IoT devices for computation offloading  Concept: a ‘traveling’ cloud using IoT devices for mobile devices 5
  • 6. SECuRE and Trustworthy Computing Lab Internet of Things M2M Smart Cards Ubiquitous computing Web of things Wearables Context - aware computing Pieces of the Puzzle: Internet of Things (IoT)  Future of computing, communications, and services  Self configuring capabilities  Integrates…  Machine-to-machine (M2M)  Context-aware computing  Wearables  Ubiquitous computing 6
  • 7. SECuRE and Trustworthy Computing Lab Smart Spaces – IoT Ecosystems  Homes, offices, etc.  Smart things  Interconnected devices  Proximal/Remote communication  IoT information network  Cooperative decision making  Send/Receive data  Share contexts 7
  • 8. SECuRE and Trustworthy Computing Lab Cloud Computing Pay As You Use Scalability Highly Automated Utility Based Reliability & Sustainability Device & Location Independent Pieces of the Puzzle: Cloud Computing  Elastic resource scalability  On-demand provisioning  Pay-as-you-go  Complex problem solving using inexpensive yet large scale computing model.  Distributed data processing (e.g. MapReduce) 8
  • 9. SECuRE and Trustworthy Computing Lab Pieces of the Puzzle: Computation Offloading  Offloading/ distributed computation of mobile applications using cloud resources  Augmented execution of partial or full process using virtually much more powerful devices. 9 Mobile Device HW OS PaaS/IaaS Cloud Virtual Machine Virtual HW OS Partial/Full offloading Process/Application Process/Application
  • 10. SECuRE and Trustworthy Computing Lab Our Approach 10
  • 11. SECuRE and Trustworthy Computing Lab Aura Contributions  Create a framework for outsourcing computations to IoT devices in a building  Create a mobile cloud using the IoT devices  Proof of concept: Ported MapReduce to IoT devices 11
  • 12. SECuRE and Trustworthy Computing Lab Our solution, Aura: An IoT based Computation Outsourcing Framework, creates a localized cloud  Localized IoT-based cloud  Physical proximity  Uses available IoT devices  Computation outsourcing  Secure  Less network b/w  Supports interruption, result preservation, and resumption  Increased battery lifetime 12
  • 13. SECuRE and Trustworthy Computing Lab Aura Architecture  Mobile devices (agents)  Smart phone, tablet, wearables, etc.  IoT devices  Perform outsourced computations  Controller  Monitors localized IoT cloud  Communicational and computational abstraction between IoT devices and the M-Agent  High end devices (Laptop, Smart TV, etc.) 13
  • 14. SECuRE and Trustworthy Computing Lab Aura Operational Model (1) 14 Mobile Agent Controller IoT NodeIoT Node
  • 15. SECuRE and Trustworthy Computing Lab Aura Operational Model (2) 15 Mobile Agent Controller IoT Node 3. Device Spec[req.] 4. Device Spec[resp.] IoT Node
  • 16. SECuRE and Trustworthy Computing Lab Aura Operational Model (3) 16 Mobile Agent Controller IoT Node 3. Device Spec[req.] 4. Device Spec[resp.] IoT Node
  • 17. SECuRE and Trustworthy Computing Lab Aura Operational Model (4) 17 Mobile Agent Controller IoT Node 3. Device Spec[req.] 4. Device Spec[resp.] 7. Submit Task Spec. 8. Task Ack. IoT Node
  • 18. SECuRE and Trustworthy Computing Lab Aura Operational Model (5) 18 Mobile Agent Controller IoT Node 3. Device Spec[req.] 4. Device Spec[resp.] 7. Submit Task Spec. 8. Task Ack. 9. Submit Task IoT Node
  • 19. SECuRE and Trustworthy Computing Lab Aura Operational Model (6) 19 Mobile Agent Controller IoT Node 3. Device Spec[req.] 4. Device Spec[resp.] 7. Submit Task Spec. 8. Task Ack. 9. Submit Task 10. Forward Task IoT Node
  • 20. SECuRE and Trustworthy Computing Lab Aura Operational Model (7) 20 Mobile Agent Controller IoT Node 3. Device Spec[req.] 4. Device Spec[resp.] 7. Submit Task Spec. 8. Task Ack. 9. Submit Task 10. Forward Task 11. Results IoT Node
  • 21. SECuRE and Trustworthy Computing Lab Aura Operational Model (8) 21 Mobile Agent Controller IoT Node 3. Device Spec[req.] 4. Device Spec[resp.] 7. Submit Task Spec. 8. Task Ack. 9. Submit Task 12. Forward Results 10. Forward Task 11. Results IoT Node
  • 22. SECuRE and Trustworthy Computing Lab Implementation and Experimental Results 22
  • 23. SECuRE and Trustworthy Computing Lab Experimental Environment  Ubuntu 12.04 LTS  Java Controller  T-Mote Sky IoT node 23  Android Mobile Agent  Contiki OS  Cooja Simulator.
  • 24. SECuRE and Trustworthy Computing Lab Experiment  ‘Word Count’ using MapReduce 24
  • 25. SECuRE and Trustworthy Computing Lab Experimental Result 25
  • 26. SECuRE and Trustworthy Computing Lab Open Problems and Future Work 26 Application & use case scenarios Plug & Play devices Self-configuring protocol Large scale experiment & evaluation Incentive model Security
  • 27. SECuRE and Trustworthy Computing Lab Thank You 27 SECRETLab@UAB  Phone: 205.934.8643  Fax: 205.934.5473  Web: http://secret.cis.uab.edu/ Ragib Hasan  Email: ragib@cis.uab.edu  Web: http://www.ragibhasan.com/