Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1497308.1497407acmconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

On using provenance data to increase the reliability of ubiquitous computing environments

Published: 24 November 2008 Publication History

Abstract

Ubiquitous computing aims at providing computing functionalities embedded into everyday life. Technologies such as networked sensors, actuators, mobile devices, appliances, and stationary computing infrastructures are intended to support smart services by making use of context information. This information may be only of interest for the moment the service is provided, like location-based services, or collected for later use, e.g., to optimize logistic workflows.
In particular in case of spontaneous interactions of components, it becomes difficult to keep track about the provenance of sensor data or even services that are provided in a particular situation. If problems occur, like privacy and security attacks or service failures, this lack of traceable information may decrease the trustworthiness of systems and legal requirements might not be fulfilled properly.
In this position paper, we introduce provenance data to increase reliability in ubiquitous computing systems. Hereby, provenance is a summary of the historical information about gathering, collecting, and aggregating data. We demonstrate and motivate the usefulness of the approach and discuss open issues and further research directions by presenting a health-care emergency use case.

References

[1]
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Trans. on Dependable and Secure Computing, 1(1):11--33, 2004.
[2]
P. Buneman, S. Khanna, and W. C. Tan. Data Provenance: Some Basic Issues. In FST TCS 2000: Proceedings of the 20th Conference on Foundations of Software Technology and Theoretical Computer Science, pages 87--93. Springer-Verlag, 2000.
[3]
R. Derakhshan, M. E. Orlowska, and X. Li. RFID Data Management: Challenges and Opportunities. IEEE Int. Conf. on RFID, pages 175--182, 2007.
[4]
I. Foster. What is the Grid? - A Three Point Checklist. GRIDtoday, 1(6), 2002.
[5]
K. Hummel, G. Boehs, P. Brezany, and I. Janciak. Mobility Extensions for Knowledge Discovery Workflows in Data Mining Grids. In 17th Int. Conf. on Database and Expert Systems Applications, pages 246--250, 2006.
[6]
K. Hummel and G. Jelleschitz. A Robust Decentralized Job Scheduling Approach for Mobile Peers in Ad-hoc Grids. In 7th IEEE Int. Symp. on Cluster Computing and the Grid, pages 461--470, 2007.
[7]
J. Ledlie, C. Ng, D. A. Holl, K.-K. Muniswamy-Reddy, U. Braun, and M. Seltzer. Provenance-aware Sensor Data Storage. In 21st Int. Conf. on Data Engineering Workshops, 2005.
[8]
M. Yu, H. Mokhtar, and M. Merabti. A Survey on Fault Management in Wireless Sensor Networks. In 8th Annual PostGraduate Symp. on the Convergence of Telecommunications, Networking and Broadcasting, 2007.
[9]
Y. Simmhan, B. Plale, D. Gannon, and S. Marru. Performance Evaluation of the Karma Provenance Framework for Scientific Workflows. International Provenance and Annotation Workshop (IPAW), 2006.
[10]
Y. L. Simmhan, B. Plale, and D. Gannon. A Survey of Data Provenance Techniques. Technical report, Computer Science Department, Indiana University, 2005.
[11]
M. Szomszor and L. Moreau. Recording and Reasoning over Data Provenance in Web and Grid Services. In Int. Conf. on Ontologies, Databases and Applications of Semantics, pages 603--620, 2003.
[12]
M. Weiser. The Computer for the 21st Century. In Human-Computer Interaction: Toward the Year 2000. Morgan Kaufmann Publishers Inc., 1995.

Cited By

View all
  • (2012)Applications of Provenance Data for Cloud InfrastructureProceedings of the 2012 Eighth International Conference on Semantics, Knowledge and Grids10.1109/SKG.2012.21(16-23)Online publication date: 22-Oct-2012

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
iiWAS '08: Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
November 2008
703 pages
ISBN:9781605583495
DOI:10.1145/1497308
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 November 2008

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

iiWAS08
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2012)Applications of Provenance Data for Cloud InfrastructureProceedings of the 2012 Eighth International Conference on Semantics, Knowledge and Grids10.1109/SKG.2012.21(16-23)Online publication date: 22-Oct-2012

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media