Internet of Things Search Engine: Concepts, Classification, and Open Issues

Internet of Things (IoT) enabled infrastructures, products, and services are revolutionising the way businesses and societies engage and operate. Billions of devices, small and large, are predicted to be connected via Internet over the coming years. These devices and the systems built upon them will be generating huge amount of data and information that would be leveraged for providing different products and services. One of the core components of such systems will be Internet of Things Search Engines (IoTSE) because without customised search engines, it is not possible to detect and use devices, sensors and  actuators, that form the IoT systems. Hence, it is important to understand various concepts, technologies, and aspects of IoTSE, which is a complicated and relatively immature research topic. The diversity of IoT systems and the content they generate poses a significant challenge to advance the R&D for IoTSE. To fill this gap, we have produced an article to help easily understand the concepts, classification, and open issues for IoTSE. We are glad to share that this article has been accepted in the ACM Communication magazine, which is one of the top venue for ICT publications. This is the pre-print copy of the article, whose abstract below can provide a brief about the content of the article.  Continue reading

Posted in Innovation, Internet of Everything, Internet of Things (IoTs), Service Oriented Computing, Smart Campus, Smart Cities, Smart Environment, Smart People, Social Computing, Software Architecture | Leave a comment

Building and Leveraging Design Spaces for Architecting Contemporary Software Systems

It was a great pleasure to visit the Secure Systems Group at the Aalto University of Finland. I was hosted by Professor N. Asokan, the leader of the group and a leading authority on different aspects of the security systems, and Dr Lachlan Gunn, a postdoctoral researcher who has a long association with me from the University of Adelaide. I have had the opportunity to meet and discuss common interests areas and activities with several researchers from the group and also attended two talks by the group members on their work. I also gave a rather informal talk to the group to brief them about different pieces of research being carried out by the members of the CREST group that I lead at the University of Adelaide. The title of this post is the title of my talk and below is the abstract of the talk. If you are interested in getting the slides used for this talk, please drop me a line.

One of our main research goals is to scientifically develop and apply design knowledge, so-called design space, that can be leveraged for directing research, building tools, and supporting software design decisions. To this end, we have been building and leveraging design spaces for architecting contemporary software systems. This talk will describe our efforts to build and use design spaces for the Internet of Things Search Engine (IoTSE) and Big Data Cybersecurity Analytics (BDCA). IoTSE denotes software systems that discover and resolve queries on content in the Internet of Things, such as sensor readings, actuating functionality and the digital representation of IoT-enabled objects. Our research on IoTSE focuses on developing an architecture that can model most classes of IoTSE and building the software infrastructure to support the engineering of IoTSE systems from prior components. BDCA leverages big data technologies for collecting, storing, and analyzing a large volume of security event data. Our research on BDCA investigates the use of architectural tactics for architecting a BDCA system to achieve the desired quality of service.  The talk also mentions some of the other areas of our research to support software systems engineering for supporting organizational security.

Posted in Architectural knowledge, Cyber Security, Design patterns, Design rationale, Internet of Everything, Internet of Things (IoTs), Knowledge Sharing, Security, Service Oriented Computing, Service-Oriented Architecture, Software Architecture, Software Engineering, Uncategorized | Leave a comment

Architecting for Continuous Delivery and Deployment

Continuous Software Engineering has been gaining signifiant momentum in terms of widespread adoption among large and small Software houses. This paradigm shift is based on the promise of early, frequent delivery and deployment of software features and continuous feedback on the usefulness and adoption of the features. One of the key challenging area of practice for continuous software engineering is architecting – Software development teams are expected to adopt new conceptualisation and designing approaches and design decision making processes – for example, moving from monolithic to micro services. Given the significant challenges of architectural issues in DevOps, it is important to build and share evidence-based body of knowledge about practices and processes for architectural support in Continuous Software Engineering. We have undertaken a significant research program on this topic and one of our comprehensive pieces of of work has just been accepted in a premier Software Engineering journal with the title of, An Empirical Study of Architecting for Continuous Delivery and Deployment, following is the abstract copied from the paper for the readers of this blog. The paper’s pre-print copies will be available soon.  Continue reading

Posted in Continuous Development, Continuous Software Engineering, DevOps, Evidence-Based Software Engineering, Human-Centric Software Engineering, Software Architecture, Software Engineering, Uncategorized | Leave a comment

Our New Work on Self-Adaptive Security for large-scale Open Environments

We are continuously progressing on the plan for strengthening our capabilities in Cyber Security. To achieve this goal, we have been not only building internal capabilities but also forming and leveraging strategic collaborations. Out of one of our recent collaborations, with Giannis and Rami, in the areas of Cyber Security has resulted a high quality piece of work that has been accepted in a highly profile journal, ACM Computing Survey. The abstract of this paper is below and can provide some useful insights to the potential readers of this work. We are hoping that this piece of work will lead to systematic classification and comparison of architectural level Cyber Security Solutions and develop and evaluate new techniques, approaches, and tools for designing and evaluating security centric large scale distributed systems. Below is the abstract from the paper. Continue reading

Posted in Architectural knowledge, Cloud Computing, Cyber Security, Data Exfiltration, Design patterns, Design rationale, Security, Service Oriented Computing, Service-Oriented Architecture, Software Architecture, Software Engineering, Uncategorized | Leave a comment

Data Exfiltration: External Attack Vectors and Countermeasures

With regards to our work on Cyber Security, we have recently successfully completed a collaborative piece fo work with researchers from Security Lancaster, University of Lancaster, UK. Our collaborative work was focused on identifying and understanding Data Exfiltration: External Vectors and Countermeasures and has been accepted in Journal of Network and Computer Applications with the following title and abstract. The pieces of paper provide an extensive literature review that is expected to be leveraged for understanding the key external attack vectors and the countermeasures and the areas for future research.

“Data Exfiltration: A Review of External Attack Vectors and Countermeasures” Continue reading

Posted in Big Data, Cloud Computing, Cyber Security, Data Exfiltration, Knowledge Sharing, Security, Service Oriented Computing | Leave a comment

Search Engines for Web of Things (WoT)

Millions of objects are being connected to provide different services via the Web. This trend has led the paradigm of Web of Things (WoT), that can be searched and leveraged by uses (i.e., human or other systems/machines). One of the key enabling technologies for materialising the WoT vision are search engines, which need to be highly sophisticated pieces of complex software systems. Researchers and practitioners have been allocated huge amount of resources for developing a large variety of search engines for WoT. It is pertinent to critically review the state of the art on search engines for WoT to assess the currently available search engines as well as to guide the future research and innovation efforts in this area. To this goal, we have recently completed a large scale review of the search engines for WoT.  We are ver proud to share that our review titled, Searching the Web of Things: State of the Art, Challenges and Solutions, has been accepted in the top quality journal ACM Computing Survey. Here is the preprint version of the paper that provides a detailed critical review of more than 30 systems and highlights the open issues that need to be addressed in order to achieve a so-called ideal WoT Search Engine. 

Posted in Innovation, Internet of Everything, Internet of Things (IoTs), Software Architecture, Software Engineering, Uncategorized, Web of Things (WoTs) | Leave a comment

Evaluating Docker for Secure and Scalable Private Cloud with Container Technologies

The ongoing collaboration with the Maritime Division of Defence and Science Technology Group (DST) has resulted in another very useful piece of work that we are very glad to share through this blog. We have been conducting a series of Research and Development (R&D) projects with the same group in the Maritime Division of DST for evaluating technological solutions for building secure and scalable private clouds for mission critical systems. Given the increasing adopting of containerised solutions, our collaborators were interested in evaluating Docker for secure and scale private cloud – that means both security and scalability are the key quality attributes for their domain. Ben Ramsey from my team led the efforts of carrying out this work that has resulted in a detailed technical report. We believe that this technical report will be very useful for anyone interested in knowing about the security and scalability aspects of container technologies like Docker when used for building a private cloud infrastructure. Here is the report titled, Evaluating Docker for Secure and Scalable Private Cloud with Container Technologies, and the abstract has been copied from the report below: Continue reading

Posted in Cloud Computing, Combat Systems, Container Technologies, Cyber Security, Defence Systems, Private Cloud, Scalable, Security, Service Oriented Computing, Submarine Systems | Leave a comment