[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators

  • Chapter
  • First Online:
Trusted Cloud Computing

Abstract

Although Cloud Computing promises to lower IT costs and increase users’ productivity in everyday life, the unattractive aspect of this new technology is that the user no longer owns all the devices which process personal data. To lower scepticism, the project SensorCloud investigates techniques to understand and compensate these adoption barriers in a scenario consisting of cloud applications that utilize sensors and actuators placed in private places. This work provides an interdisciplinary overview of the social and technical core research challenges for the trustworthy integration of sensor and actuator devices with the Cloud Computing paradigm. Most importantly, these challenges include (i) ease of development, (ii) security and privacy, and (iii) social dimensions of a cloud-based system which integrates into private life. When these challenges are tackled in the development of future cloud systems, the attractiveness of new use cases in a sensor-enabled world will considerably be increased for users who currently do not trust the Cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bell, W.: Foundations of Futures Studies, Human Science for a New Era, vol. History, Purposes, and Knowledge. Transaction Publishers, New Brunswick, London (1997)

    Google Scholar 

  2. Cerulo, K.: Nonhumans in social interaction. Annual Review of Sociology 35, 531–552 (2009)

    Google Scholar 

  3. Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control. In: 2009 ACM Workshop on Cloud Computing Security (CCSW), pp. 85–90 (2009)

    Google Scholar 

  4. Dahm, M.: Grundlagen der Mensch-Computer-Interaktion. Pearson, New York (2006)

    Google Scholar 

  5. Danezis, G., Livshits, B.: Towards Ensuring Client-Side Computational Integrity. In: 3rd ACM Workshop on Cloud Computing Security (CCSW), pp. 125–130 (2011)

    Google Scholar 

  6. Dean, J., Ghemawat, S.: MapReduce Simplified Data Processing on Large Clusters. Communications of the ACM 51(1), 107–113 (2008)

    Google Scholar 

  7. van Dijk, M., Juels, A.: On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. In: 5th USENIX Workshop on Hot Topics in Security (2010)

    Google Scholar 

  8. Dougherty, D.: Organizing for innovation in the 21st century. In: S.R. Clegg, C. Hardy, T.B. Lawrence, W.R. Nord (eds.) The Sage Handbook of Organization Studies, 2 edn., pp. 598–617. Sage, London, Thousand OaksCA, New Delhi (2006)

    Google Scholar 

  9. Federal Office for Information Security, Germany: Protection Profile for the Gateway of a Smart Metering System. v01.01.01(final draft) (2011)

    Google Scholar 

  10. Gentry, C.: Computing Arbitrary Functions of Encrypted Data. Communications of the ACM 53(3), 97–105 (2010)

    Google Scholar 

  11. Giese, H., Rumpe, B., Schatz, B., Sztipanovits, J.: Science and Engineering of Cyber-Physical Systems (Dagstuhl Seminar 11441). Dagstuhl Reports 1(11), 1–22 (2011)

    Google Scholar 

  12. Greenfield, J., Short, K.: Software Factories Assembling Applications with Patterns, Models, Frameworks and Tools. In: 18th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pp. 16–27 (2003)

    Google Scholar 

  13. Haussling, R.: Sozialwissenschaftliche Innovationsforschung. Soziologische Revue 30, 369–382 (2007)

    Google Scholar 

  14. Haussling, R.: Video analyses with a four level interaction concept a network-based concept of human-robot interaction. In: U.T. Kissmann (ed.) Video interaction analysis. Methods and methodology, pp. 107–131. Peter Lang, FrankfurtMain (2009)

    Google Scholar 

  15. Haussling, R.: Design als soziotechnische Relation. Neue Herausforderungen der Gestaltung inter- und transaktiver Technik am Beispiel humanoider Robotik. In: S. Moebius, S. Prinz (eds.) Das Design der Gesellschaft. Zur Kultursoziologie des Designs, pp. 263–288. transcript, Bielefeld (2012)

    Google Scholar 

  16. Heer, T., Jansen, T., Hummen, R., Gotz, S., Wirtz, H., Weingartner, E., Wehrle, K.: PiSA-SA Municipal Wi-Fi Based on Wi-Fi Sharing. In: 19th International Conference on Computer Communications and Networks (ICCCN), pp. 1–8 (2010)

    Google Scholar 

  17. Heinecke, A.: Mensch-Computer-Interaktion. Fachbuchverlag, Leipzig (2004)

    Google Scholar 

  18. Henze, M., Grossfengels, M., Koprowski, M., Wehrle, K.: Towards Data Handling Requirements-aware Cloud Computing. In: 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (2013)

    Google Scholar 

  19. Henze, M., Hummen, R., Matzutt, R., Catrein, D., Wehrle, K.: Maintaining User Control While Storing and Processing Sensor Data in the Cloud. International Journal of Grid and High Performance Computing (IJGHPC) 5(4) (2013)

    Google Scholar 

  20. Henze, M., Hummen, R., Wehrle, K.: The Cloud Needs Cross-Layer Data Handling Annotations. In: 2013 IEEE Security and Privacy Workshops (SPW), pp. 18–22 (2013)

    Google Scholar 

  21. Hummen, R., Henze, M., Catrein, D., Wehrle, K.: A Cloud Design for User-controlled Storage and Processing of Sensor Data. In: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 232–240 (2012)

    Google Scholar 

  22. Jungk, R., Mullert, N.: Future Workshops. Institute for Social Inventions, London (1987)

    Google Scholar 

  23. Katz, M.L., Shapiro, C.: Network externalities, competition, and compatibility. The American economic review 75(3), 424–440 (1985)

    Google Scholar 

  24. Khajeh-Hosseini, A., Sommerville, I., Sriram, I.: Research Challenges for Enterprise Cloud Computing (2010). ArXiv1001.3257 [cs.DC]

    Google Scholar 

  25. Knorr-Cetina, K.: Epistemic Cultures. How the Sciences Make Knowledge. Harvard University Press, Cambridge (1999)

    Google Scholar 

  26. Kornwachs, K., Stephan, P.F.: Das Mensch-Ding Verhaltnis. In: O. Herzog, T. Schildhauer (eds.) Intelligente Objekte. Technische Gestaltung—Wirtschaftliche Verwertung –Gesellschaftliche Wirkung, pp. 15–22. Springer, Berlin, Heidelberg (2009)

    Google Scholar 

  27. Lee, E.A.: Cyber Physical Systems Design Challenges. In: 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing (ISORC), pp. 363–369 (2008)

    Google Scholar 

  28. Li, F., Vogler, M., Claessens, M., Dustdar, S.: Efficient and scalable IoT service delivery on Cloud. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD) (2013)

    Google Scholar 

  29. Li, X., Li, Y., Liu, T., Qiu, J., Wang, F.: The Method and Tool of Cost Analysis for Cloud Computing. In: 2009 IEEE International Conference on Cloud Computing (CLOUD), pp. 93–100 (2009)

    Google Scholar 

  30. Liu, Z., Yang, D.s.,Wen, D., Zhang,W.m., Mao,W.: Cyber-Physical-Social Systems for Command and Control. IEEE Intelligent Systems 26(4), 92–96 (2011)

    Google Scholar 

  31. Pearson, S., Benameur, A.: Privacy, Security and Trust Issues Arising from Cloud Computing. In: 2nd IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 693–702 (2010)

    Google Scholar 

  32. Rammert, W.: Hybride Handlungstragerschaft Ein soziotechnisches Modell verteilten Handelns. In: O. Herzog, T. Schildhauer (eds.) Intelligente Objekte. Technische Gestaltung—Wirtschaftliche Verwertung—GesellschaftlicheWirkung, pp. 23–33. Springer, Berlin, Heidelberg (2009)

    Google Scholar 

  33. Rellermeyer, J.S., Duller, M., Alonso, G.: Engineering the Cloud from Software Modules. In: 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp. 32–37 (2009)

    Google Scholar 

  34. Riungu, L.M., Taipale, O., Smolander, K.: Research Issues for Software Testing in the Cloud. In: 2nd IEEE International Conference on Cloud Computing Technology and Science (Cloud-Com), pp. 557–564 (2010)

    Google Scholar 

  35. Santos, N., Gummadi, K.P., Rodrigues, R.: Towards Trusted Cloud Computing. In: USENIX Workshop on Hot Topics in Cloud Computing (HotCloud) (2009)

    Google Scholar 

  36. Van Deursen, A., Klint, P., Visser, J.: Domain-Specific Languages An Annotated Bibliography. ACM SIGPLAN Notices 35(6), 26–36 (2000)

    Google Scholar 

  37. Venters, W., Whitley, E.A.: A Critical Review of Cloud Computing Research Desires and Realities. Journal of Information Technology 27, 179–197 (2012)

    Google Scholar 

  38. Wallom, D., Turilli, M., Taylor, G., Hargreaves, N., Martin, A., Raun, A., McMoran, A.: myTrustedCloud Trusted Cloud Infrastructure for Security-critical Computation and Data Managment. In: 2011 Third IEEE International Conference on Coud Computing Technology and Science (CloudCom, pp. 247–254 (2011)

    Google Scholar 

  39. Weiser, M.: The computer for the 21st century. Scientific american 265(3), 94–104 (1991)

    Google Scholar 

  40. Yang, H., Tate, M.: A Descriptive Literature Review and Classification of Cloud Computing Research. Communications of the Association for Information Systems 31, 35–60 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Eggert .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Eggert, M. et al. (2014). SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators. In: Krcmar, H., Reussner, R., Rumpe, B. (eds) Trusted Cloud Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-12718-7_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12718-7_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12717-0

  • Online ISBN: 978-3-319-12718-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics