Today’s cyber-physical systems (CPS) span IoT and cloud-based
datacenter infrastructures, which are highly heterogeneous with
various types of uncertainty. Thus, testing uncertainties in these
CPS is a challenging and multidisciplinary activity. We need several
tools for modeling, deployment, control, and analytics to test and
evaluate uncertainties for different configurations of the same CPS.
In this paper, we explain why using state-of-the art model-driven
engineering (MDE) and model-based testing (MBT) tools is not
adequate for testing uncertainties of CPS in IoT Cloud infrastruc-
tures. We discus how to combine them with techniques for elastic
execution to dynamically provision both CPS under test and testing
utilities to perform tests in various IoT Cloud infrastructures.
BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...Nexgen Technology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
modeling and predicting cyber hacking breaches Venkat Projects
Analyzing cyber incident data sets is an important method for deepening our understanding of the evolution of the threat situation. This is a relatively new research topic, and many studies remain to be done. In this paper, we report a statistical analysis of a breach incident data set corresponding to 12 years (2005–2017) of cyber hacking activities that include malware attacks. We show that, in contrast to the findings reported in the literature, both hacking breach incident inter-arrival times and breach sizes should be modeled by stochastic processes, rather than by distributions because they exhibit autocorrelations. Then, we propose particular stochastic process models to, respectively, fit the inter-arrival times and the breach sizes. We also show that these models can predict the inter-arrival times and the breach sizes. In order to get deeper insights into the evolution of hacking breach incidents, we conduct both qualitative and quantitative trend analyses on the data set. We draw a set of cybersecurity insights, including that the threat of cyber hacks is indeed getting worse in terms of their frequency, but not in terms of the magnitude of their damage.
This lecture was delivered at the Intelligent systems and data mining workshop held in Faculty of Computers and information, Kafer Elshikh University On Wednesday 6 December 2017
BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...Nexgen Technology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
modeling and predicting cyber hacking breaches Venkat Projects
Analyzing cyber incident data sets is an important method for deepening our understanding of the evolution of the threat situation. This is a relatively new research topic, and many studies remain to be done. In this paper, we report a statistical analysis of a breach incident data set corresponding to 12 years (2005–2017) of cyber hacking activities that include malware attacks. We show that, in contrast to the findings reported in the literature, both hacking breach incident inter-arrival times and breach sizes should be modeled by stochastic processes, rather than by distributions because they exhibit autocorrelations. Then, we propose particular stochastic process models to, respectively, fit the inter-arrival times and the breach sizes. We also show that these models can predict the inter-arrival times and the breach sizes. In order to get deeper insights into the evolution of hacking breach incidents, we conduct both qualitative and quantitative trend analyses on the data set. We draw a set of cybersecurity insights, including that the threat of cyber hacks is indeed getting worse in terms of their frequency, but not in terms of the magnitude of their damage.
This lecture was delivered at the Intelligent systems and data mining workshop held in Faculty of Computers and information, Kafer Elshikh University On Wednesday 6 December 2017
Modeling and Provisioning IoT Cloud Systems for Testing UncertaintiesHong-Linh Truong
Modern Cyber-Physical Systems (CPS) and Internet of Things (IoT)
systems consist of both loosely and tightly interactions among
various resources in IoT networks, edge servers and cloud data
centers. These elements are being built atop virtualization layers
and deployed in both edge and cloud infrastructures. They also deal
with a lot of data through the interconnection of different types of
networks and services. Therefore, several new types of uncertainties
are emerging, such as data, actuation, and elasticity uncertainties.
This triggers several challenges for testing uncertainty in such
systems. However, there is a lack of novel ways to model and
prepare the right infrastructural elements covering requirements
for testing emerging uncertainties. In this paper, first we present
techniques for modeling CPS/IoT Systems and their uncertainties
to be tested. Second, we introduce techniques for determining and
generating deployment configuration for testing in different IoT
and cloud infrastructures. We illustrate our work with a real-world
use case for monitoring and analysis of Base Transceiver Stations.
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
Background: Network science is the set of mathematical frameworks, models, and measures that are used to understand a complex system modeled as a network composed of nodes and edges. The nodes of a network represent entities and the edges represent relationships between these entities. Network science has been used in many research works for mining human interaction during different phases of software engineering (SE). Objective: The goal of this study is to identify, review, and analyze the published research works that used network analysis as a tool for understanding the human collaboration on different levels of software development. This study and its findings are expected to be of benefit for software engineering practitioners and researchers who are mining software repositories using tools from network science field. Method: We conducted a systematic literature review, in which we analyzed a number of selected papers from different digital libraries based on inclusion and exclusion criteria. Results: We identified 35 primary studies (PSs) from four digital libraries, then we extracted data from each PS according to a predefined data extraction sheet. The results of our data analysis showed that not all of the constructed networks used in the PSs were valid as the edges of these networks did not reflect a real relationship between the entities of the network. Additionally, the used measures in the PSs were in many cases not suitable for the used networks. Also, the reported analysis results by the PSs were not, in most cases, validated using any statistical model. Finally, many of the PSs did not provide lessons or guidelines for software practitioners that can improve the software engineering practices. Conclusion: Although employing network analysis in mining developers’ collaboration showed some satisfactory results in some of the PSs, the application of network analysis needs to be conducted more carefully. That is said, the constructed network should be representative and meaningful, the used measure needs to be suitable for the context, and the validation of the results should be considered. More and above, we state some research gaps, in which network science can be applied, with some pointers to recent advances that can be used to mine collaboration networks.
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
Background: Network science is the set of mathematical frameworks, models, and measures that are
used to understand a complex system modeled as a network composed of nodes and edges. The nodes of a network
represent entities and the edges represent relationships between these entities. Network science has been used in
many research works for mining human interaction during different phases of software engineering (SE)
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...IJNSA Journal
Feature extraction and feature selection are the first tasks in pre-processing of input logs in order to detect cyber security threats and attacks while utilizing machine learning. When it comes to the analysis of heterogeneous data derived from different sources, these tasks are found to be time-consuming and difficult to be managed efficiently. In this paper, we present an approach for handling feature extraction and feature selection for security analytics of heterogeneous data derived from different network sensors. The approach is implemented in Apache Spark, using its python API, named pyspark.
K anonymity for crowdsourcing database
In crowdsourcing database, human operators are embedded into the database engine and collaborate with other conventional database operators to process the queries. Each human operator publishes small HITs (Human Intelligent Task) to the crowdsourcing platform, which consists of a set of database records and corresponding questions for human workers.
Modeling and Provisioning IoT Cloud Systems for Testing UncertaintiesHong-Linh Truong
Modern Cyber-Physical Systems (CPS) and Internet of Things (IoT)
systems consist of both loosely and tightly interactions among
various resources in IoT networks, edge servers and cloud data
centers. These elements are being built atop virtualization layers
and deployed in both edge and cloud infrastructures. They also deal
with a lot of data through the interconnection of different types of
networks and services. Therefore, several new types of uncertainties
are emerging, such as data, actuation, and elasticity uncertainties.
This triggers several challenges for testing uncertainty in such
systems. However, there is a lack of novel ways to model and
prepare the right infrastructural elements covering requirements
for testing emerging uncertainties. In this paper, first we present
techniques for modeling CPS/IoT Systems and their uncertainties
to be tested. Second, we introduce techniques for determining and
generating deployment configuration for testing in different IoT
and cloud infrastructures. We illustrate our work with a real-world
use case for monitoring and analysis of Base Transceiver Stations.
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
Background: Network science is the set of mathematical frameworks, models, and measures that are used to understand a complex system modeled as a network composed of nodes and edges. The nodes of a network represent entities and the edges represent relationships between these entities. Network science has been used in many research works for mining human interaction during different phases of software engineering (SE). Objective: The goal of this study is to identify, review, and analyze the published research works that used network analysis as a tool for understanding the human collaboration on different levels of software development. This study and its findings are expected to be of benefit for software engineering practitioners and researchers who are mining software repositories using tools from network science field. Method: We conducted a systematic literature review, in which we analyzed a number of selected papers from different digital libraries based on inclusion and exclusion criteria. Results: We identified 35 primary studies (PSs) from four digital libraries, then we extracted data from each PS according to a predefined data extraction sheet. The results of our data analysis showed that not all of the constructed networks used in the PSs were valid as the edges of these networks did not reflect a real relationship between the entities of the network. Additionally, the used measures in the PSs were in many cases not suitable for the used networks. Also, the reported analysis results by the PSs were not, in most cases, validated using any statistical model. Finally, many of the PSs did not provide lessons or guidelines for software practitioners that can improve the software engineering practices. Conclusion: Although employing network analysis in mining developers’ collaboration showed some satisfactory results in some of the PSs, the application of network analysis needs to be conducted more carefully. That is said, the constructed network should be representative and meaningful, the used measure needs to be suitable for the context, and the validation of the results should be considered. More and above, we state some research gaps, in which network science can be applied, with some pointers to recent advances that can be used to mine collaboration networks.
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
Background: Network science is the set of mathematical frameworks, models, and measures that are
used to understand a complex system modeled as a network composed of nodes and edges. The nodes of a network
represent entities and the edges represent relationships between these entities. Network science has been used in
many research works for mining human interaction during different phases of software engineering (SE)
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...IJNSA Journal
Feature extraction and feature selection are the first tasks in pre-processing of input logs in order to detect cyber security threats and attacks while utilizing machine learning. When it comes to the analysis of heterogeneous data derived from different sources, these tasks are found to be time-consuming and difficult to be managed efficiently. In this paper, we present an approach for handling feature extraction and feature selection for security analytics of heterogeneous data derived from different network sensors. The approach is implemented in Apache Spark, using its python API, named pyspark.
K anonymity for crowdsourcing database
In crowdsourcing database, human operators are embedded into the database engine and collaborate with other conventional database operators to process the queries. Each human operator publishes small HITs (Human Intelligent Task) to the crowdsourcing platform, which consists of a set of database records and corresponding questions for human workers.
Integrated Analytics for IIoT Predictive Maintenance using IoT Big Data Cloud...Hong-Linh Truong
For predictive maintenance of equipment with In-
dustrial Internet of Things (IIoT) technologies, existing IoT Cloud
systems provide strong monitoring and data analysis capabilities
for detecting and predicting status of equipment. However, we
need to support complex interactions among different software
components and human activities to provide an integrated analyt-
ics, as software algorithms alone cannot deal with the complexity
and scale of data collection and analysis and the diversity of
equipment, due to the difficulties of capturing and modeling
uncertainties and domain knowledge in predictive maintenance.
In this paper, we describe how we design and augment complex
IoT big data cloud systems for integrated analytics of IIoT
predictive maintenance. Our approach is to identify various
complex interactions for solving system incidents together with
relevant critical analytics results about equipment. We incorpo-
rate humans into various parts of complex IoT Cloud systems
to enable situational data collection, services management, and
data analytics. We leverage serverless functions, cloud services,
and domain knowledge to support dynamic interactions between
human and software for maintaining equipment. We use a real-
world maintenance of Base Transceiver Stations to illustrate our
engineering approach which we have prototyped with state-of-
the art cloud and IoT technologies, such as Apache Nifi, Hadoop,
Spark and Google Cloud Functions.
Towards a Resource Slice Interoperability Hub for IoTHong-Linh Truong
Interoperability for IoT is a challenging problem
because it requires us to tackle (i) cross-system interoperability
issues at the IoT platform sides as well as relevant network
functions and clouds in the edge systems and data centers
and (ii) cross-layer interoperability, e.g., w.r.t. data formats,
communication protocols, data delivery mechanisms, and perfor-
mance. However, existing solutions are quite static w.r.t software
deployment and provisioning for interoperability. Many middle-
ware, services and platforms have been built and deployed as
interoperability bridges but they are not dynamically provisioned
and reconfigured for interoperability at runtime. Furthermore,
they are often not considered together with other services as a
whole in application-specific contexts. In this paper, we focus
on dynamic aspects by introducing the concept of Resource
Slice Interoperability Hub (rsiHub). Our approach leverages
existing software artifacts and services for interoperability to
create and provision dynamic resource slices, including IoT,
network functions and clouds, for addressing application-specific
interoperability requirements. We will present our key concepts,
architectures and examples toward the realization of rsiHub.
On Supporting Contract-aware IoT Dataspace ServicesHong-Linh Truong
Advances in the Internet of Things (IoT) enable a
huge number of connected devices that produce large amounts
of data. Such data is increasingly shared among various
stakeholders to support advanced (predictive) analytics and
precision decision making in different application domains like
smart cities and industrial internet. Currently there are several
platforms that facilitate sharing, buying and selling IoT data.
However, these platforms do not support the establishment and
monitoring of usage contracts for IoT data. In this paper we
address this research issue by introducing a new extensible
platform for enabling contract-aware IoT dataspace services,
which supports data contract specification and IoT data flow
monitoring based on established data contracts. We present
a general architecture of contract monitoring services for
IoT dataspaces and evaluate our platform through illustrative
examples with real-world datasets and through performance
analysis.
Towards the Realization of Multi-dimensional Elasticity for Distributed Cloud...Hong-Linh Truong
As multiple types of distributed, heterogeneous cloud computing environments have proliferated, cloud software can leverage
diverse types of infrastructural, platform and data resources with di
erent cost and quality models. This introduces a multi-
dimensional elasticity perspective for cloud software that would greatly meet changing demands from the user. However, we argue
that current techniques are not enough for dealing with multi-dimensional elasticity in distributed cloud environments. We present
our approach to the realization of multi-dimensional elasticity by introducing novel concepts and a roadmap to achieve them.
On Engineering Analytics of Elastic IoT Cloud SystemsHong-Linh Truong
Developing IoT cloud platforms is very challenging, as IoT
cloud platforms consist of a mix of cloud services and IoT elements, e.g.,
for sensor management, near-realtime events handling, and data analyt-
ics. Developers need several tools for deployment, control, governance
and analytics actions to test and evaluate designs of software compo-
nents and optimize the operation of di erent design con gurations. In
this paper, we describe requirements and our techniques on support-
ing the development and testing of IoT cloud platforms. We present our
choices of tools and engineering actions that help the developer to design,
test and evaluate IoT cloud platforms in multi-cloud environments.
HINC – Harmonizing Diverse Resource Information Across IoT, Network Functions...Hong-Linh Truong
Effective resource management in IoT systems must
represent IoT resources, edge-to-cloud network capabilities, and
cloud resources at a high-level, while being able to link to diverse
low-level types of IoT devices, network functions, and cloud
computing infrastructures. Hence resource management in such
a context demands a highly distributed and extensible approach,
which allows us to integrate and provision IoT, network functions,
and cloud resources from various providers. In this paper, we
address this crucial research issue. We first present a high-
level information model for virtualized IoT, network functions
and cloud resource modeling, which also incorporates software-
defined gateways, network slicing and data centers. This model
is used to glue various low-level resource models from different
types of infrastructures in a distributed manner to capture
sets of resources spanning across different sub-networks. We
then develop a set of utilities and a middleware to support
the integration of information about distributed resources from
various sources. We present a proof of concept prototype with
various experiments to illustrate how various tasks in IoT cloud
systems can be simplified as well as to evaluate the performance
of our framework.
SINC – An Information-Centric Approach for End-to-End IoT Cloud Resource Prov...Hong-Linh Truong
We present SINC –
Slicing IoT, Network Functions, and Clouds – which enables designers to dynamically create/update end-to-end slices of the overall IoT network in order to simultaneously meet multiple user needs.
Governing Elastic IoT Cloud Systems under UncertaintiesHong-Linh Truong
we introduce U-GovOps – a novel framework for
dynamic, on-demand governance of elastic IoT cloud systems under
uncertainty. We introduce a declarative policy language to simplify
the development of uncertainty- and elasticity-aware governance
strategies. Based on that we develop runtime mechanisms, which
enable mitigating the uncertainties by monitoring and governing
the IoT cloud systems through specified strategies.
SmartSociety – A Platform for Collaborative People-Machine ComputationHong-Linh Truong
We present the SmartSociety Platform for Collaborative People-Machine computation carried out in the FET SmartSociety project: http://www.smart-society-project.eu/
On Developing and Operating of Data Elasticity Management ProcessHong-Linh Truong
The Data-as-a-Service (DaaS) model enables data analytics
providers to provision and offer data assets to their consumers. To achieve quality of results for the data assets, we need to enable DaaS elasticity by trading off quality and cost of resource usage. However, most of the current work on DaaS is focused on infrastructure elasticity, such as scaling
in/out data nodes and virtual machines based on performance and usage, without considering the data assets' quality of results. In this talk, we introduce an elastic data asset model for provisioning data enriched with quality of results. Based on this model, we present techniques to generate and operate data elasticity management process that is used to
monitor, evaluate and enforce expected quality of results. We develop a runtime system to guarantee the quality of resulting data assets provisioned on-demand. We present several experiments to demonstrate the usefulness of our proposed techniques.
The Building Blocks of QuestDB, a Time Series Databasejavier ramirez
Talk Delivered at Valencia Codes Meetup 2024-06.
Traditionally, databases have treated timestamps just as another data type. However, when performing real-time analytics, timestamps should be first class citizens and we need rich time semantics to get the most out of our data. We also need to deal with ever growing datasets while keeping performant, which is as fun as it sounds.
It is no wonder time-series databases are now more popular than ever before. Join me in this session to learn about the internal architecture and building blocks of QuestDB, an open source time-series database designed for speed. We will also review a history of some of the changes we have gone over the past two years to deal with late and unordered data, non-blocking writes, read-replicas, or faster batch ingestion.
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
Adjusting OpenMP PageRank : SHORT REPORT / NOTESSubhajit Sahu
For massive graphs that fit in RAM, but not in GPU memory, it is possible to take
advantage of a shared memory system with multiple CPUs, each with multiple cores, to
accelerate pagerank computation. If the NUMA architecture of the system is properly taken
into account with good vertex partitioning, the speedup can be significant. To take steps in
this direction, experiments are conducted to implement pagerank in OpenMP using two
different approaches, uniform and hybrid. The uniform approach runs all primitives required
for pagerank in OpenMP mode (with multiple threads). On the other hand, the hybrid
approach runs certain primitives in sequential mode (i.e., sumAt, multiply).
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...pchutichetpong
M Capital Group (“MCG”) expects to see demand and the changing evolution of supply, facilitated through institutional investment rotation out of offices and into work from home (“WFH”), while the ever-expanding need for data storage as global internet usage expands, with experts predicting 5.3 billion users by 2023. These market factors will be underpinned by technological changes, such as progressing cloud services and edge sites, allowing the industry to see strong expected annual growth of 13% over the next 4 years.
Whilst competitive headwinds remain, represented through the recent second bankruptcy filing of Sungard, which blames “COVID-19 and other macroeconomic trends including delayed customer spending decisions, insourcing and reductions in IT spending, energy inflation and reduction in demand for certain services”, the industry has seen key adjustments, where MCG believes that engineering cost management and technological innovation will be paramount to success.
MCG reports that the more favorable market conditions expected over the next few years, helped by the winding down of pandemic restrictions and a hybrid working environment will be driving market momentum forward. The continuous injection of capital by alternative investment firms, as well as the growing infrastructural investment from cloud service providers and social media companies, whose revenues are expected to grow over 3.6x larger by value in 2026, will likely help propel center provision and innovation. These factors paint a promising picture for the industry players that offset rising input costs and adapt to new technologies.
According to M Capital Group: “Specifically, the long-term cost-saving opportunities available from the rise of remote managing will likely aid value growth for the industry. Through margin optimization and further availability of capital for reinvestment, strong players will maintain their competitive foothold, while weaker players exit the market to balance supply and demand.”
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Discussion on Vector Databases, Unstructured Data and AI
https://www.meetup.com/unstructured-data-meetup-new-york/
This meetup is for people working in unstructured data. Speakers will come present about related topics such as vector databases, LLMs, and managing data at scale. The intended audience of this group includes roles like machine learning engineers, data scientists, data engineers, software engineers, and PMs.This meetup was formerly Milvus Meetup, and is sponsored by Zilliz maintainers of Milvus.
Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructures: Combining Model-Driven Engineering and Elastic Execution
1. Testing Uncertainty of Cyber-Physical
Systems in IoT Cloud Infrastructures:
Combining Model-Driven Engineering
and Elastic Execution
Hong-Linh Truong, Luca Berardinelli
Distributed Systems Group, TU Wien
truong@dsg.tuwien.ac.at
http://rdsea.github.io
TECPS'17, 13 July, 2017, Santa Barbara, USA 1
2. Outline
Our focused CPS
IoT Cloud Systems, Elastic Execution, Uncertainty
Top-down and bottom up approaches
MDE/MBT versus Elastic Execution
Combining methods and tool pipelines
Early results
Summary
TECPS'17, 13 July, 2017, Santa Barbara, USA 2
3. Our view on IoT Cloud Systems
3
TECPS'17, 13 July, 2017, Santa Barbara, USA
Source: Duc-Hung Le, Nanjangud C. Narendra, Hong Linh Truong:
HINC - Harmonizing Diverse Resource Information across IoT, Network Functions, and Clouds. FiCloud 2016: 317-324
4. Cyber-physical systems in IoT
Cloud Infrastructures
Heavily based on virtual resources
Loosely couple and tightly couple interactions
Different degrees of data and control interactions
TECPS'17, 13 July, 2017, Santa Barbara, USA 4
(Virtual) Cyber-physical systems
5. IoT Cloud Systems - Elastic
Execution
5TECPS'17, 13 July, 2017, Santa Barbara, USA
http://tuwiendsg.github.io/iCOMOT/
Examples:
Elastic execution is a fundamental aspect in IoT Cloud Systems,
strongly changing methods for design and execution of CPS/IoT
6. Testing uncertainty in CPS
Uncertainty:
due to lack of knowledge, especially due to the complexity and
diversity of resources and interactions in IoT and Cloud systems
Supporting testing uncertainties and uncertainties analytics
Emerging novel aspects: data uncertainties (data/data-centric
CPS), elasticity of CPS resources (w.r.t function and composition),
and Governance (related to business/trustworthiness)
How to discover them and then deal with them?
Uncertainty analytics through testing (H2020 U-Test objectives)
Also adaptation of resources considering uncertainties
TECPS'17, 13 July, 2017, Santa Barbara, USA 6
9. Modeling and Provisioning IoT Cloud
Infrastructures for Uncertainty Testing
The Topdown approach (MDE/MBT)
TECPS'17, 13 July, 2017, Santa Barbara, USA 9
10. IoT and Cloud Resource Profile
TECPS'17, 13 July, 2017, Santa Barbara, USA 10
12. Then Model-based Testing (MBT)
TECPS'17, 13 July, 2017, Santa Barbara, USA 12
Mostly do not
consider how to deal
with the
infrastructures of
SUT
Work with specific
static SUT
deployment
Figure source:
Mark Utting and Bruno Legeard. 2006. Practical Model-Based Testing: A Tools
Approach. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
13. Elastic Infrastructure Testing
The bottom up approach (from IoT Cloud
systems)
Example from:
Daniel Moldovan,Hong-Linh Truong, A Platform for Run-time Health
Verification of Elastic Cyber-physical Systems, The IEEE International
Symposium on Modelling, Analysis and Simulation of Computer and
Telecommunication Systems (MASCOTS 2016), September 19-21, Imperial
College, London, UK
TECPS'17, 13 July, 2017, Santa Barbara, USA 13
14. Infrastructure-level Testing
Approach
TECPS'17, 13 July, 2017, Santa Barbara, USA 14
(From modeling/description)
*testing strategy=testing plan
Daniel Moldovan,Hong-Linh Truong, A
Platform for Run-time Health
Verification of Elastic Cyber-physical
Systems, The IEEE International
Symposium on Modelling, Analysis and
Simulation of Computer and
Telecommunication Systems
(MASCOTS 2016), September 19-21,
Imperial College, London, UK
15. Run-Time view on structure of
Elasic IoT Cloud systems/CPS
TECPS'17, 13 July, 2017, Santa Barbara, USA 15
16. Infrastructure Testing Platform
Domain-Specific Language for Test Plan
Description
name: "TestName"
description: "human readable description"
timeout: timeInSeconds
Triggers
every: number s|m
event: "Added |"Removed“ |”TestFailed” | “TestPassed”| on ComponentIdentifier
…
Execution
executor: [distinct] ComponentIdentifier for ComponentIdentifier [, ComponentIdentifier]+
where ComponentIdentifier:
• Type. [Service | Process | VirtualContainer | VirtualMachine | PhysicalMachine | PhysicalDevice]
• ID.”ComponentID”
• UUID.”ComponentUUID”
TECPS'17, 13 July, 2017, Santa Barbara, USA 16
Using this DSL: for the test plan, both deployment/configuration and
testing tasks can be described interwoven
17. Closing the gap: Combining MDE and
Elastic Execution
TECPS'17, 13 July, 2017, Santa Barbara, USA 17
Currently we are not able to leverage strength of
topdown approach and bottom-up approach for
testing CPS uncertainty
18. Public cloud infrastructures
Private cloud infrs.
Base Transceiver Station (BTS)
Case Stduy BTS
Data uncertainty: influence both monitoring and controlling of
equipment
Large-scale systems (1000+ BTS)
Flexible back-end clouds
Generic enough for other applications (e.g., in smart agriculture)
TECPS'17, 13 July, 2017, Santa Barbara, USA 18
Sensor
IoT
Gateway
MQTT
Broker
BigQuery
Cassandra
Hadoop FS
Actuator
Optimizer Analytics
19. Key issues
Current MDE/MBT tools are not enough for
testing uncertainties
Models, languages and transformation techniques at
the moment do not support on-demand, pay-per-use,
elasticity of IoT and cloud resources
Elastic Execution hidden from models for
testing
IoT and cloud infrastructures are not fixed
SUT and their configurations are changed
TECPS'17, 13 July, 2017, Santa Barbara, USA 19
20. Key issues: Two separate worlds
TECPS'17, 13 July, 2017, Santa Barbara, USA 20
SUT Infrastructure
Development
Deployment Description
Development
IoT/Cloud Infrastructures
Infrastructure Configurations
Resource
Information
Adaptor/Tool
Deployment Scripts
Preparing CPS under Test
Requirements
Artifact
Repository
Figure source:
Mark Utting and Bruno Legeard. 2006. Practical Model-Based Testing: A Tools
Approach. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
?
21. Combining MDE with Elastic
Execution
TECPS'17, 13 July, 2017, Santa Barbara, USA 21
22. Interwoven test exuection and
provisioning
TECPS'17, 13 July, 2017, Santa Barbara, USA 22
IoT Cloud Infrastructures
Modeling
Uncertainties
and SUT
Uncertainty
Profile
System Under
Test (SUT)
Models
Generating
Uncertainty
Test cases
Deploying/
Configuring
SUT
System Under
Test (SUT)
Test cases
Executing
Tests
IoT/Cloud
Resource
Information
Deploying/
Configuring
Testing Utilities
Test
Utilities
23. Tool pipelines: from MDE to elastic
execution for testing
TECPS'17, 13 July, 2017, Santa Barbara, USA 23
Key thoughts:
Different algorithms to create suitable deployment configurations based
on data uncertainties, cost, and time
Interactions between testing and elasticity control of IoT and Cloud
services
24. Our current progress
TECPS'17, 13 July, 2017, Santa Barbara, USA 24
Consider to generate provisioning configurations
from SUT models
Extracting
model
information &
Generating test
configuration
test
strategies
Infrastructural
IoT Cloud
resources
Provisioning &
Configuring
SUT
Executing
Tests
Test plans &
executors
IoT Units
Cloud
T
E
S
T
S
ProviderA
ActuatorsSensors
VMsAnalytics GWs
IoT Units
Cloud
T
E
S
T
S
ProviderB
ActuatorsSensors
VMsAnalytics GWs
Infrastructure
(Class Diagrams)
Behaviour
(State Machine
diagrams)
Uncertainty
Hong-Linh Truong, Luca Berardinelli, Ivan Pakovic, Georgiana Copil, Modeling and Provisioning IoT Cloud
Infrastructures for Testing Uncertainties, July, 2017 under submission
25. Example of BTS monitoring
TECPS'17, 13 July, 2017, Santa Barbara, USA 25
26. Elastic Test plan
Generic models for Task Executor
TECPS'17, 13 July, 2017, Santa Barbara, USA 26
Test
Configuration
Test
Executor
Provisioning
Task
Reconfiguration
Task
Test Case
Execution Task
Uncertainty
Metric
27. Concrete tool pipeline
TECPS'17, 13 July, 2017, Santa Barbara, USA 27
HINC
(runtime)Docker
Registry
Artifact
Repository
Extracted
information
(JSON)
Deployment
Description
(YAML/TOSCA)
Generate
Configurations &
Deployment
SALSA, Docker
and gcloud
utilities
29. TECPS'17, 13 July, 2017, Santa Barbara, USA 29
Example: using SALSA for deployment and
configurations
http://tuwiendsg.github.io/SALSA/
30. Summary
Testing uncertainties need to deal with elasticity and
virtualization
Different tools for modeling, provisioning and testing
uncertainties based on MDE/MBT and elastic techniques
Closing gaps in testing uncertainties by introducing
novel methods and tool pipelines
Our future work
Prototype our approach for uncertainty testing
Machine learning/big data analytics for uncertainty analytics
(www.u-test.eu)
Check https://github.com/tuwiendsg/COMOT4U for new
update
TECPS'17, 13 July, 2017, Santa Barbara, USA 30