• Title/Summary/Keyword: IoT-Cloud service

Search Result 131, Processing Time 0.022 seconds

Design and Implementation of Distributed Parking Space Management Service in Scalable LPWA-Based Networks (대규모 LPWA기반 네트워크에서 분산된 주차 공간 관리서비스의 설계 및 구현)

  • Park, Shinyeol;Jeong, Jongpil;Park, Dongbeom;Park, Byungjun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.10
    • /
    • pp.259-268
    • /
    • 2018
  • Due to the development of cities and the increase of vehicles, effective control of parking space management service in cities is needed. However, the existing parking lot management system does not provide limited or convenient service in terms of space and time. In this paper, we propose distributed parking space management service based on large scale LPWA (Low-Power Wide-Area). The parking sensor collects parking space information from the parking lot and is transmitted over a low-power wide network. All parking data is processed and analyzed in the IoT cloud. Through a parking space management service system in all cities, users are given the temporal convenience of determining the parking space and the area efficiency of the parking space.

Individual Presence-and-Preference-Based Local Intelligent Service System and Mobile Edge Computing (개인 프레즌스-선호 기반 지능형 로컬 서비스 시스템과 모바일 엣지 컴퓨팅 환경에서의 적용 방안)

  • Kim, Kilhwan;Jang, Jin-San;Keum, Changsup;Chung, Ki-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.523-535
    • /
    • 2017
  • Local intelligent services aim at controlling local services such as cooling or lightening services in a certain local area, using Internet-of-Things (IoT) sensor data in the area. As the IoT paradigm has evolved, local intelligent services have gained increasing attention. However, most of the local intelligent service mechanism proposed so far do not directly take the users' presence and service preference information into account for controlling local services. This study proposes an individual presence-and-preference-based local service system (IPP-LISS). We present a intelligent service control algorithm and implement a prototype system of IPP-LISS. Typically, the intelligence part of IPP-LISS including the prediction models, is generated on remote server in the cloud because of their compute-intense aspect. However, this can cause huge data traffic between IoT devices and servers in the cloud. The emerging mobile edge computing technology will be a promising solution of this challenge of IPP-LISS. In this paper, we implement IPP-LISS in the cloud, and then, based on the implementation result, we discuss applying the mobile edge computing technology to the IPP-LISS application.

Design and Implementation of IoT Collaboration Module Supporting User Context Management (사용자 상황 정보 관리를 지원하는 IoT 통합 제어 모듈 설계 및 구현)

  • Kum, Seung Woo;Lim, Tae Beom;Park, Jong Il
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.3
    • /
    • pp.129-137
    • /
    • 2015
  • Various personalized services are provided based on user context these days, and IoT(Internet of Things) devices provides effective ways to collect user context. For example, user's activity such as walking steps, calories, and sleeping hours can be collected using smart activity tracker. Smart scale can sense change of user's weight or body fat percentage. However, these services are independent to each other and not easy to make them collaborate. Many standard bodies are working on the documents for this issue, but due to diversity of IoT use case scenarios, it seems that multiple IoT technologies co-exist for the time being. This paper propose a framework to collaborate heterogeneous IoT services. The proposed framework provides methods to build application for heterogeneous IoT devices and user context management in more intuitive way using HTTP. To improve compatibility and usability, gathered user contexts are based on MPEG-UD. Implementation of framework and service with real-world devices are also presented.

A Study on the Structure of Research Domain for Internet of Things Based on Keyword Analysis (키워드 분석 기반 사물인터넷 연구 도메인 구조 분석)

  • Namn, Su-Hyeon
    • Management & Information Systems Review
    • /
    • v.36 no.1
    • /
    • pp.273-290
    • /
    • 2017
  • Internet of Things (IoT) is considered to be the next wave of Information Technology transformation after the Internet has changed the process of doing business. Since the domain of IoT ranging from the sensor technology to service to the users is wide, the structure of the research domain is not delineated clearly. To do that we suggest to use the Technology Stack Model proposed by Porter et al.(2014) to measure the maturity level of IoT in organizations. Based on the Stack Model, for the general understandings of IoT, we do keyword analyses on the academic papers whose major research issue is IoT. It is found that the current status of IoT application from the perspectives of cloud and big data analytics is not active, meaning that the real value of IoT has not been realized. We also examine the cases which deal with the part of cloud process which is crucial for value accrual. Based on these findings, we suggest the future direction of IoT research. We also propose that IT is to value chain what IoT is to the Stack Model to derive value in organizations.

  • PDF

Smart Home IoT Service Scenario (스마트홈 IoT 서비스 시나리오)

  • Lim, Damsub;Ruixuhua, Ruixuhua;Piao, Wenxue;Min, Dugki
    • Annual Conference of KIPS
    • /
    • 2018.05a
    • /
    • pp.614-616
    • /
    • 2018
  • IoT 기기의 사용량은 점점 늘어나고 있으며, 전 산업분야에 걸쳐 다양한 형태의 플랫폼으로 적용되고 발전하고 있다. 본 논문에서는 IoT Device, IoT Gateway와 Cloud Infra가 수행하는 역할에 따라 Smart IoT Gateway Platform을 제시하였고, 각각의 역할에 대해 설명하였다. 제시한 Smart IoT Gateway Platform의 역할에 맞게 산업 분야뿐만 아니라 일반적인 가정에서 사용할 수 있는 칩입 탐지 시나리오로써 스마트홈 IoT 시나리오를 제시하였다.

A Study on the Cloud Service Model of CaaS Based on the Object Identification, ePosition, with a Structured Form of Texts (문자열로 구조화된 사물식별아이디 이포지션(ePosition) 기반의 클라우드 CaaS(Contents as a Service) 서비스 모델에 관한 연구)

  • Lee, Sang-Zee;Kang, Myung-Su;Cho, Won-Hee
    • Information Systems Review
    • /
    • v.15 no.3
    • /
    • pp.129-139
    • /
    • 2013
  • The Internet of Things (or IoT for short) which refers to uniquely identifiable objects and their virtual representations in an Internet-like structure is to be reality today. The amount of data on IoT is expected to increase abruptly and there are several key issues like usefulness interoperability between multiple distributes systems, services and databases. In this paper a methodology is proposed to realize a recently developed cloud service model, Contents as a Service (CaaS), which is contents delivery model referred to as 'on-demand contents'. In the proposed method, the global object identification, ePosition, comprising the structured form of two sorts of text strings with a separation symbol like # is applied to identify a specific content and registered with the content at the same server. It is easy-to-realize and effective to solve the interoperability problem systematically and logically. Some APIs for the proposed CaaS service are to be converged to provide some upgraded cloud service model such as 'CaaS supported SaaS' and 'CaaS supported PaaS'.

  • PDF

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing

  • Tang, Wenyi;Qin, Bo;Li, Yanan;Wu, Qianhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.281-298
    • /
    • 2020
  • Fog computing has become a popular concept in the application of internet of things (IoT). With the superiority in better service providing, the edge cloud has become an attractive solution to IoT networks. The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation. Existing solutions mainly deal with the operations over encrypted data, but cannot support the computation verification in the same time. In this paper, we propose a data outsourcing scheme based on an encrypted database system with linear computation as well as efficient query ability, and enhance the interlayer program in the original system with homomorphic message authenticators so that the system could perform computational verifying. The tools we use to construct our scheme have been proven secure and valid. With our scheme, the system could check if the cloud provides the correct service as the system asks. The experiment also shows that our scheme could be as effective as the original version, and the extra load in time is neglectable.

Changes in the Industrial Structure caused by the IoT and AI (사물인터넷과 AI가 가져올 산업구조의 변화)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.93-99
    • /
    • 2017
  • Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.

Implementation of a DB-Based Virtual File System for Lightweight IoT Clouds (경량 사물 인터넷 클라우드를 위한 DB 기반 가상 파일 시스템 구현)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.311-322
    • /
    • 2014
  • IoT(Internet of Things) is a concept of connected internet pursuing direct access to devices or sensors in fused environment of personal, industrial and public area. In IoT environment, it is possible to access realtime data, and the data format and topology of devices are diverse. Also, there are bidirectional communications between users and devices to control actuators in IoT. In this point, IoT is different from the conventional internet in which data are produced by human desktops and gathered in server systems by way of one-sided simple internet communications. For the cloud or portal service of IoT, there should be a file management framework supporting systematic naming service and unified data access interface encompassing the variety of IoT things. This paper implements a DB-based virtual file system maintaining attributes of IoT things in a UNIX-styled file system view. Users who logged in the virtual shell are able to explore IoT things by navigating the virtual file system, and able to access IoT things directly via UNIX-styled file I O APIs. The implemented virtual file system is lightweight and flexible because it maintains only directory structure and descriptors for the distributed IoT things. The result of a test for the virtual shell primitives such as mkdir() or chdir() shows the smooth functionality of the virtual file system, Also, the exploring performance of the file system is better than that of Window file system in case of adopting a simple directory cache mechanism.

Security and Privacy Issues of Fog Computing (포그 컴퓨팅 환경에서의 보안 및 프라이버시 이슈에 대한 연구)

  • Nam, Hyun-Jae;Choi, Ho-Yeol;Shin, Hyung-June;Kwon, Hyun-Soo;Jeong, Jong-Min;Hahn, Chang-Hee;Hur, Jun-Beom
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.257-267
    • /
    • 2017
  • With the development of IoT (Internet of Things) technology, the application area has been diversified and the number of users using this service also has increased greatly. Real time big data generated by many IoT devices is no longer suitable for processing in a cloud computing environment. To solve this issue, fog computing is suggested which minimizes response time and makes real time processing suitable. However, security requirement for new paradigm called fog computing is not established until now. In this paper, we define models for fog computing, and the security requirements for the defined model.