Premium
Special Issue on Cloud of Things Applications
Author(s) -
Enokido Tomoya,
Hussain Omar Khadeer
Publication year - 2018
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.4879
Subject(s) - cloud computing , computer science , internet of things , emerging technologies , special section , the internet , telecommunications , data science , world wide web , engineering , artificial intelligence , operating system , engineering physics
The aim of this special issue is to share innovative research results and technologies in intelligent, complex, reliable, and optimized cloud computing systems with Internet of Things (IoT) technologies among researchers, developers, and industrial experts. The papers presented in this special issue include the extended versions of the papers presented at the 12th International Conference on Broadband Wireless Computing, Communication and Applications (BWCCA-2012), which was held at Palau Macaya, Barcelona, Spain, from November 8 to November 10, 2017. Networks and information technologies are going through astonishing progress and evolution. Network systems and computing systems are changing to new architectures like cloud computing systems with Internet of Things (IoT) technologies. The appearance of cloud computing system and IoT technologies is giving a great influence to business, economy, and our life. For this reason, it is significant to discuss how to design and realize more intelligent and innovative cloud computing systems and IoT technologies. This special issue covers novel theories and designs to realize intelligent, complex, reliable, and optimized networks and applications for cloud computing systems with IoT technologies. The aim of this special issue is to share innovative research results and technologies related to cloud computing systems with IoT among researchers, developers, and industrial experts. The papers presented in this special issue include the extended versions of the papers presented at the 12th International Conference on Broadband Wireless Computing, Communication and Applications (BWCCA-2012), which was held at Palau Macaya, Barcelona, Spain, from November 8 to November 10, 2017. Cuka et al1 proposed and implemented two fuzzy-based systems (FBSIDS1 and FBSIDS2) for selecting the IoT devices, which complete the task in opportunistic networks. The FBSIDS1 and FBSIDS2 systems can take different parameters for selecting the IoT devices in opportunistic networks. There are different applications that require the optimization of different parameters to design and implement real opportunistic networks. The results obtained in this paper can give insights for deciding appropriate parameters for IoT device selection in opportunistic networks. Wang et al2 pointed out that existing group-based proof-of-storage (GPoS) schemes are not secure since the metadata or tag to the data block can be easily forged. Thus, the cloud system can output correct proof even if the stored data have been damaged, maliciously replaced, or maliciously deleted. Then, the authors proposed an improved GPoS scheme for IoT-based cloud systems and showed the effectiveness of the proposed scheme through some evaluation results. Wireless sensor networks (SNs) came up with hundreds of IoT applications. Shah et al3 focused on underwater SNs to develop IoT applications like harbor monitoring and oceanographic data collection. Then, the authors proposed geo-opportunistic routing algorithms for void hole avoidance using transmission range and depth adjustment technology. In addition, the authors showed the effectiveness of the proposed algorithms through evaluation results. Watanabe et al4 proposed a migration approach for reducing the electric energy consumption of servers where virtual machines with application processes migrate to more energy-efficient servers. Then, the authors proposed an algorithm called ISEAM2 to reduce the electric energy consumption of servers. In the evaluation, the authors showed the total electric energy consumption, the total active time of servers, and the average execution time of processes that can be reduced more in the ISEAM2 algorithm than other existing algorithms. Greco et al5 proposed an approach for abnormal event detection, in the context of an earthquake, that leverages IoT and semantic web technologies. The proposed system is able to retrieve the streams from web services collecting IoT sensor data and semantically annotate them. The evaluation results proved that the proposed situation is suitable in disaster scenarios where low power consumption and short response times are a concern. CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a very common challenge-response test and used in many websites. However, the designs are varying in safety level and robustness and may not be user-friendly for broader use. Ogiela et al6 attempted to evaluate strengths and weaknesses of current solutions, from the security and user-friendliness point of view. Then, the authors described an idea of advanced cognitive CAPTCHAS that are based on using very specific or expert knowledge for proper verification processes. The proposed idea can be applied for different security purposes in modern Cloud of Things technologies. We hope that this special issue will lead to a better understanding on intelligent and innovative cloud computing systems and IoT technologies. As we conclude this overview, we would like to thank all the authors for submitting their papers and express our great thanks to all the reviewers for their good work to make it possible to publish this special issue.