2,032 Hits in 5.4 sec

A Scalable IoT Video Data Analytics for Smart Cities

Mien Doan, Vu Tran, Hung Huynh, Hiep Huynh
2018 EAI Endorsed Transactions on Context-aware Systems and Applications  
IoT provides the ability to manage, remotely monitor and control devices from massive streams of real-time data.Our model offers a scalable IoT video data analytics applications for Smart cities to end  ...  This model provides data analytics programming suites and environments in which developers and researchers can design scalable analytics services and applications.  ...  Wang [1] presents a scalable, privacy-aware architecture for large camera networks.  ... 
doi:10.4108/eai.13-7-2018.163136 fatcat:ql5attjsuzbqbfxoo2ku6so6ki

Best Papers of the ACM Multimedia Systems (MMSys) Conference 2017 and the ACM Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV) 2017

Pablo Cesar, Cheng-Hsin Hsu, Chun-Ying Huang, Pan Hui
2018 ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)  
VR (Virtual Reality), and (iv) IoT (Internet-of-Things) Connectivity and Infrastructure.  ...  In "ASAP: Adaptive Stall-Aware Pacing for Improved DASH Video Experience in Cellular Network" (, Zahran et al. present novel DASH traffic management solutions, which reduce  ...  The algorithm is shown to outperform other prediction algorithms, because the proposed algorithm is finer-grained, and trend-, periodicity-, and autocorrelation-aware.  ... 
doi:10.1145/3214700 fatcat:nqsbyw77w5fpfkttpxrcckxxlm

Supporting Audio Privacy-aware Services in Emerging IoT Environment

Naushin Nower, Institute of Information Technology, University of Dhaka, Bangladesh
2021 International Journal of Wireless and Microwave Technologies  
In this paper, a new architecture for providing audio transparency and privacy in the IoT-rich environment is proposed.  ...  Among them, some of the data are sensitive and a user may not aware of when and where audio recordings are sent for processing.  ...  Conclusions As IoT devices increasingly adopt microphones and other voice assistant devices, there is a growing need for practical privacy defenses.  ... 
doi:10.5815/ijwmt.2021.03.04 fatcat:ijyge5omufgifealc4g3uxn26m

Challenges in designing edge-based middlewares for the Internet of Things: A survey [article]

Eduard Gibert Renart, Daniel Balouek-thomert, Manish Parashar
2019 arXiv   pre-print
An edge-based middleware is defined as a software that serves as an interface between the computational resources and the IoT devices, making communication possible among elements.  ...  In this regard, we propose a four-layer architecture for the design of edge-based middleware, along with some design goals for each of the proposed layer.  ...  ACKNOWLEDGMENTS This research is supported in part by NSF via grants numbers OAC 1339036, OAC 1441376, OCE 1745246, OAC 1826997, OAC 1835692, and OAC 1640834, and was conducted as part of the Rutgers Discovery  ... 
arXiv:1912.06567v1 fatcat:7it2ztkngrhsld244agl7eoyoq

BlendSPS: A BLockchain-ENabled Decentralized Smart Public Safety System

Ronghua Xu, Seyed Yahya Nikouei, Deeraj Nagothu, Alem Fitwi, Yu Chen
2020 Smart Cities  
scalable and extensible services in a large-scale heterogeneous network environment.  ...  Due to the recent advancements in the Internet of Things (IoT) and Edge-Fog-Cloud Computing technologies, the Smart Public Safety (SPS) system has become a more realistic solution for seamless public safety  ...  Therefore, adopting monolithic framework in a distributed IoT-based network inevitably brings new challenges in terms of scalability, service extensibility, data privacy, and cross-platform interoperability  ... 
doi:10.3390/smartcities3030047 fatcat:yrzfdm2qlbcf5e5n63oioc2vma

Survey on Multi-Access Edge Computing for Internet of Things Realization

Pawani Porambage, Jude Okwuibe, Madhusanka Liyanage, Mika Ylianttila, Tarik Taleb
2018 IEEE Communications Surveys and Tutorials  
IoT is identified as a key use case of MEC, given MEC's ability to provide cloud platform and gateway services at the network edge.  ...  In this survey, we provide a holistic overview on the exploitation of MEC technology for the realization of IoT applications and their synergies.  ...  IoT architecture [160] Propose a trust translation model for fog nodes and a privacy-aware model for access control at fog nodes.  ... 
doi:10.1109/comst.2018.2849509 fatcat:fnksr3dbqfakzfvnopyyxjdlfm

A Survey on Secure Data Analytics in Edge Computing

Dan Liu, Zheng Yan, Wenxiu Ding, Mohammed Atiquzzaman
2019 IEEE Internet of Things Journal  
In this paper, we first introduce the concept and features of edge computing, and then propose a number of requirements for its secure data analytics by analyzing potential security threats in edge computing  ...  Unfortunately, edge computing brings new security and privacy challenges when applied to data analytics.  ...  Towards service delivery, MEC and fog computing can serve for such IoT applications that have strict requirements on low latency, location awareness, mobility and context awareness.  ... 
doi:10.1109/jiot.2019.2897619 fatcat:fqmkiuse4vgafhiexe4ymqtx6m

Edge-Computing-Enabled Smart Cities: A Comprehensive Survey [article]

Latif U. Khan, Ibrar Yaqoob, Nguyen H. Tran, S. M. Ahsan Kazmi, Tri Nguyen Dang, Choong Seon Hong
2020 arXiv   pre-print
Later, we categorize and classify the literature by devising a comprehensive and meticulous taxonomy.  ...  Such applications continuously generate enormous amounts of data which demand strict latency-aware computational processing capabilities.  ...  [71] • Proposed an architecture for remote live support. • A video compression is adopted to reduce the bandwidth requirement. Qiao et al.  ... 
arXiv:1909.08747v2 fatcat:nwnyec5gnfdmtd3msohsbkgulm


Khan Zulfiqar
[71] • Proposed an architecture for remote live support. • A video compression is adopted to reduce the bandwidth requirement. Qiao et al.  ...  . • Context-awareness, scalability, and sustainability are also exploited in the proposed system. • Narrow-band IoT is used for communication due to its high energy efficiency, low cost, and support for  ... 
doi:10.6084/m9.figshare.14099087.v1 fatcat:nipztbbrgrcwvp2dy6m2gbyytm

5G Internet of Things: A survey

Shancang Li, Li Da Xu, Shanshan Zhao
2018 Journal of Industrial Information Integration  
The existing IoT solutions are facing a number of challenges such as large number of conneciton of nodes, security, and new standards.  ...  This paper reviews the current research state-of-the-art of 5G IoT, key enabling technologies, and main research trends and challenges in 5G IoT 1 .  ...  The convergence of 5G, AI, data analytic and IoT [53] .  ... 
doi:10.1016/j.jii.2018.01.005 fatcat:wst2mrwbpjgxvdqqig3yj4ofum

A Survey on Use Cases and Security Issues in Fog Computing

Vaijayanti H. Panse
2018 Helix  
These issues can be resolved by using a new concept called, Fog Computing. Fog computing is an emerging research area for both academia and industry.  ...  In this paper, we view and summarize different use case scenarios of fog computing. The recent research contributions on security and privacy issues in fog computing are also discussed in this paper.  ...  The author also well studied several existing researches for security and privacy challenges in fog services [9] .  ... 
doi:10.29042/2018-4413-4417 fatcat:5tjpvrghtvfhtj4gdd3yucfg2y

All One Needs to Know about Fog Computing and Related Edge Computing Paradigms

Ashkan Yousefpour, Caleb Fung, Tam Nguyen, Krishna Kadiyala, Fatemeh Jalali, Amirreza Niakanlahiji, Jian Kong, Jason P. Jue
2019 Journal of systems architecture  
IoT is expected to connect billions of devices and humans to bring promising advantages for us.  ...  Next, we provide a taxonomy of research topics in fog computing, and through a comprehensive survey, we summarize and categorize the efforts on fog computing and its related computing paradigms.  ...  Xu et al. proposed edge analytics as a service (EAaaS) to promote a lightweight, scalable, and low-latency service model for IoT devices Figure 10 : 10 A bar chart showing the number of research articles  ... 
doi:10.1016/j.sysarc.2019.02.009 fatcat:udonbl6rerfwdap2psex7ryloa

Assisting Users in a World Full of Cameras: A Privacy-Aware Infrastructure for Computer Vision Applications

Anupam Das, Martin Degeling, Xiaoyou Wang, Junjue Wang, Norman Sadeh, Mahadev Satyanarayanan
2017 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)  
In this paper we introduce a novel distributed privacy infrastructure for the Internet-of-Things and discuss in particular how it can help enhance user's awareness of and control over the collection and  ...  These developments raise privacy concerns and call for novel solutions to ensure adequate user awareness, and ideally, control over the resulting collection and use of potentially sensitive data.  ...  The US Government is authorized to reproduce and distribute reprints for Governmental purposes not withstanding any copyright notation thereon. Additional support has also been provided by Google.  ... 
doi:10.1109/cvprw.2017.181 dblp:conf/cvpr/DasDWWSS17 fatcat:xm7tk7ntlrbedj2gqxxpanlwde

Survey Based on Security Aware Caching Scheme for IoT Based Information Centric Networking

M. Sakthivanitha, S. Saradha
2020 EAI Endorsed Transactions on Energy Web  
In this work, an several architecture for effective caching at the edge devices for data-centric IoT applications and a rapid content access that depends on novel deep learning techniques and caching processes  ...  Security of client and content, originating place, and identity privacy are inherent in ICN paradigm design in contrast to present host centric concept where they are introduced as a second-thought.  ...  for scalability.  ... 
doi:10.4108/eai.1-7-2020.165960 fatcat:ndhynglnpzdapcyx4ftcyrstda

Next Generation Internet of Things [chapter]

Ovidiu Vermesan, Joël Bacquet
2018 Next Generation Internet of Things  
The chapter presents an overview of the eight that are part of the European IoT Security and Privacy Projects initiative (IoT-ESP) addressing advanced concepts for end-to-end security in highly distributed  ...  addressing object identity management, discovery services, virtualisation of objects, devices and infrastructures and trusted IoT approaches.  ...  IoTCrawler focuses on providing reliable, quality and resource-aware and scalable mechanisms for data and services publishing, crawling, indexing in very large-scale distributed dynamic IoT environments  ... 
doi:10.13052/rp-9788770220071 fatcat:bnyyfkhdzbghxetcwhisrqsapq
« Previous Showing results 1 — 15 out of 2,032 results