Big Data - Deep Learning
Big Data - Deep Learning
ir
http://www.itrans24.com/landing1.html
Accepted Manuscript
PII: S1389-1286(17)30259-1
DOI: 10.1016/j.comnet.2017.06.013
Reference: COMPNW 6240
Please cite this article as: Ejaz Ahmed, Ibrar Yaqoob, Ibrahim Abaker Targio Hashem, Imran Khan,
Abdelmuttlib Ibrahim Abdalla Ahmed, Muhammad Imran, Athanasios V. Vasilakos, The role of big data
analytics in Internet of Things, Computer Networks (2017), doi: 10.1016/j.comnet.2017.06.013
This is a PDF file of an unedited manuscript that has been accepted for publication. As a service
to our customers we are providing this early version of the manuscript. The manuscript will undergo
copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please
note that during the production process errors may be discovered which could affect the content, and
all legal disclaimers that apply to the journal pertain.
Downloaded from http://iranpaper.ir
http://www.itrans24.com/landing1.html
ACCEPTED MANUSCRIPT
1
T
Abstract—The explosive growth in the number of devices connected to the Internet of Things (IoT) and the exponential
IP
increase in data consumption only reflect how the growth of big data perfectly overlaps with that of IoT. The management
of big data in a continuously expanding network gives rise to non-trivial concerns regarding data collection efficiency, data
processing, analytics, and security. To address these concerns, researchers have examined the challenges associated
CR
with the successful deployment of IoT. Despite the large number of studies on big data, analytics, and IoT, the
convergence of these areas creates several opportunities for flourishing big data and analytics for IoT systems. In this
paper, we explore the recent advances in big data analytics for IoT systems as well as the key requirements for managing
big data and for enabling analytics in an IoT environment. We taxonomized the literature based on important parameters.
US
We identify the opportunities resulting from the convergence of big data, analytics, and IoT as well as discuss the role of
big data analytics in IoT applications. Finally, several open challenges are presented as future research directions.
Index Terms—Internet of things, big data, analytics, distributed computing, smart city.
AN
✦
M
emergence of Internet of Things (IoT). Accord- devices is expected to increase twofold from
ing to the Cisco report1 , the number of ob- 22.9 billion in 2016 to 50 billion by 2020 as
jects connected to the Internet has exceeded the shown in Figure 2.
CE
nology, University of Malaya. (E-mail: ejazahmed@ieee.org, data collection tools in the IoT environment
ibraryaqoob@siswa.um.edu.my, targio@siswa.um.edu.my, and are sensor-fitted devices that require custom
abdelmuttlib@siswa.um.edu.my)
• I. Khan is working in Schneider Electric Industries, 38TEC, protocols, such as message queue telemetry
Grenoble, France. (Email: imran@ieee.org) transport (MQTT) and data distribution service
• M. Imran is with the College of Computer and Informa- (DDS). Given that sensors are used in nearly
tion Sciences, King Saud University, Saudi Arabia. (E-mail:
dr.m.imran@ieee.org) all industries, the IoT is expected to produce a
• Athanasios V. Vasilakos is working with the Department of Com- huge amount of data. The data generated from
puter Science, Electrical and Space Engineering, Lulea University
of Technology, Sweden (e-mail: athanasios.vasilakos@ltu.se)
IoT devices can be used in finding potential
research trends and investigating the impact
1. http:www.cisco.comcdamen usaboutac79docsinnovIoT IBSGof certain events or decisions. These data are
0411FINAL.pdf processed using various analytic tools [1]. Fig-
Downloaded from http://iranpaper.ir
http://www.itrans24.com/landing1.html
ACCEPTED MANUSCRIPT
2
T
paradigm.
IP
The contributions of this paper are as fol-
lows:
CR
• We critically review the recent literature.
• We discuss big data processing and ana-
lytics platforms in the IoT environment.
We discuss the key requirements for big
Fig. 1: Big Data Sources in IoT US •
•
data processing and analytics in an IoT
environment.
We taxonomized the literature based on
AN
important parameters.
• We discuss the potential opportunities in
big data processing and analytics in the
IoT paradigm and highlight the role of
M
marks in section 9.
Fig. 2: Number of Internet-Connected Devices1
CE
ure 3 illustrates the process of data collection, 2 R ECENT A DVANCES IN I OT- BASED
monitoring, and data analytics2 . B IG DATA AND A NALYTICS
Although IoT has created unprecedented
AC
ACCEPTED MANUSCRIPT
3
· Capture
· Integrate Explore
· Store
· Preprocess
Analytical Clean
Data Store
· Map Analyze
· Transform
· Cleanse
T
IoT Infrastructure Share
IP
Big Data Platform Big Data Analytics
CR
Fig. 3: Big Data Flow in IoT
analysis and knowledge acquisition methods virtual data views to end users using prede-
to improve productivity in various industries. fined interfaces. These interfaces come in the
This system, which focuses on industrial big form of a set of functions and a set of datasets.
data analytics, integrates various data analyt- Firework aims to minimize data access latency
PT
ics components in the form of reconfigurable by moving the processing closer to the data pro-
and interchangeable modules to meet different ducers in the edge network. Firework instance
business needs. The authors also provide a new has multiple stakeholders who must register
CE
context intelligence framework that can help their datasets and corresponding functions that
handle industrial informatics based on the sen- are abstracted as data views. These data views
sors, locations, and unstructured data for big are available to all participants of the same
AC
data mining. A case study is also performed framework instance such that they can merge
to illustrate the design of the proposed cyber multiple data views into a single job to perform
physical system. detailed data analytics. They illustrate such
P. Rizwan et al. [5] study the strengths and concept by performing case studies of connected
weaknesses of various traffic management sys- health and find the lost.
tems. They propose a low cost, real-time traffic M. M. Rathore et al. [7] propose a smart
management system that deploys IoT devices city management system based on IoT that
and sensors to capture real-time traffic infor- exploits big data and analytics. The data are
mation. Specifically, low-cost traffic detection collected by deploying different sensors, in-
sensors are embedded in the middle of the road cluding weather and water sensors, vehicular
for every 500 or 1000 meters. The collected data networking sensors, surveillance objects, smart
Downloaded from http://iranpaper.ir
http://www.itrans24.com/landing1.html
ACCEPTED MANUSCRIPT
4
home sensors, and smart parking sensors. An tion framework (RDF) data received from the
architecture for the system and its model for ETL layer. The learning layer extracts several
implementation have also been designed. The features from the data and forms machine-
proposed system is implemented using the learning-based models. The action layer pro-
MapReduce Hadoop ecosystem in a real envi- vides predetermined actions for the output of
ronment. The implementation process involves the learning layer.
several steps, including data generation, data B. Cheng et al. [10] design GeeLytics, an
gathering, data combining, data categorization, edge analytics platform that performs real-time
data preprocessing, and decision making. Spark data processing at the network edges and in
over Hadoop is used for the efficient process- the cloud. This platform addresses the geo-
ing of big data. Smart systems are utilized as distributed and low-latency analytics resulting
T
sources of city data to develop a smart city as an from the large amounts of IoT data. GeeLyt-
implemented system. However, the developed ics is designed to support dynamic stream
IP
smart system is yet to be deployed and its processing topologies by taking into account
accuracy remains untested. the system characteristics of heterogeneous
CR
B. Ahlgren et al. [8] discuss the significance edge/cloud nodes, and the current system
of using IoT to deliver services for improv- workload.
ing the lives of citizens, including transporta- H. Wang et al. [11] discuss the challenges
tion, air quality, and energy efficiency. The au-
thors emphasize that IoT-based systems must
be based on open data and standards, includ-
ing interfaces and protocols, to enable third-
US and opportunities resulting from IoT and big
data for the maritime cluster. They also develop
a new framework for integrating industrial IoT
with big data and analytics technologies. Im-
AN
party innovations by mitigating manufacturer plementing such framework can help increase
lock-ins. Based on this idea, the authors design output and productivity as well as allow whole
and develop a GreenIoT platform in Sweden clusters to continue acting as leaders in the
M
procurement of an open IoT infrastructure, in- of the servIoTicy API. They specifically focus
cluding common data formats and open appli- on the state-of-the-art infrastructure for hosting
cation programming interfaces (APIs), must be IoT workloads in the cloud with an aim to pro-
devised. vide multi-tenant data stream processing capa-
PT
O. B. Sezer et al. [9] propose an augmented bilities, advanced querying mechanisms, multi-
framework that integrates semantic web tech- protocol support, and software solutions by
nologies, big data, and IoT. The key require- combining advanced data-centric technologies.
CE
ments for the proposed framework are ana- Another study [13] partially solves the big data
lyzed, and the conceptual design of the en- storage problem by proposing AllJoyn Lambda,
visioned IoT system is proposed based on a software solution that integrates AllJoyn in
AC
the analysis results. The conceptual framework the Lambda architecture that is used for big
comprises five layers, namely, data acquisi- data storage and analytics.
tion, extract-transform-load (ETL), semantic- A. J. Jara et al. [14] conduct a survey to
rule reasoning, learning, and action. The data highlight the existing solutions and challenges
acquisition layer, which collects data from dif- to big data that are posed by cyber-physical
ferent sources, can be considered as an input systems. Their study focuses on cloud security
layer to the framework. The ETL layer provides and the heterogeneous integration of data from
sensor drivers to transform the data received multiple sources. They highlight the need for
from different types of sensors. The semantic- developing sophisticated data discovery mech-
rule reasoning supports a reasoning engine anisms and for performing real-time stream
to make inferences from the resource descrip- data processing.
Downloaded from http://iranpaper.ir
http://www.itrans24.com/landing1.html
ACCEPTED MANUSCRIPT
5
Z. Ding et al. [15] propose a general sta- amine how various technologies, such as data
tistical database cluster mechanism for big analytics and artificial intelligence, can be used
data analysis in the IoT paradigm (IOT- in the smart world to derive situational facts
StatisticDB). They input statistical functions on and to take actions accordingly. They propose a
IOT-StatisticDB via statistical operators inside gaming-based crowdsourcing platform to make
the database management systems (DBMS) ker- use of human intelligence for the successful
nel. The statistical analysis is performed in a completion of certain control tasks. In the fu-
distributed and parallel fashion using multiple ture, proactive monitoring and diagnosis mech-
servers. anisms with a combination of big data mining
C. Vuppalapati et al. [16] examine the role must be devised to ensure safety in the smart
of big data in healthcare and find that body physical world.
T
sensors generate massive amounts of health- R. P. Minch et al. [21] perform an ex-
related data. Two challenges are analyzed in ploratory research about location privacy in the
IP
this context, namely, integrating these mas- era of IoT, big data, and analytics. They identify,
sive data points with electronic health records classify, and describe privacy issues and reveal
CR
(EHR) and presenting these data to doctors in the possible pain points in the context of big
real time. Based on these observations, they data and analytics. They suggest that a reliable
propose a sensor integration framework that framework for securing privacy in a context-
suggests a scalable cloud architecture that can
provide a holistic approach to the EHR sen-
sor system. Apache Kafka and Spark are used
to process large amounts of data in a real-
US aware environment must be developed in the
future.
A. Mukherjee et al. [22] propose an IoT
framework for the effective execution of data
AN
time manner. Although visualizing the health parallel analytic jobs. They aim to identify a
of patients in real time can help detect urgent suitable analytical algorithm that can cope up
situations, this model lacks a security solution. with the requirements of processing and ana-
M
A. Ahmad et al. [17] analyze human behav- lyzing large amounts of data. Their qualitative
ior by using big data and analytics in the social analysis generates promising results because of
IoT paradigm [18]. They propose an architec- the high effectiveness of the parallel analytic
ED
ture that comprises three operational domains. algorithms in an IoT environment. Future stud-
They also analyze an ecosystem that is created ies must address those issues that hinder the
by smart cities and big data. Collaborative fil- implementation of this model in the presence
tering techniques can be used in the future to of fog computing.
PT
devices. They also analyze the performance of experimental results reveal that Condor has a
four machine learning algorithms, such as k- better scalability and CPU utilization for data-
nearest neighbor (KNN), NaveBayes (NB), sup- parallel jobs compared with a traditional three-
AC
port vector machines (SVM), and random for- tier, server-based architecture.
est. The experimental results show that the NB H. R. Arkian et al. [24] propose MIST, a
algorithm yields the lowest accuracy among all fog-based data analytics scheme with a cost-
classifier models, while the random forest algo- efficient resource provisioning optimization ap-
rithm yields the highest accuracy. Meanwhile, proach that can be used for IoT crowd sens-
the accuracy of KNN and SVM are closely ing applications. This scheme aims to reduce
related to that of the random forest algorithm. the latency of service provisioning in tradi-
I. L. Yen et al. [20] investigate the poten- tional cloud computing frameworks. The exper-
tial of service discovery and composition tech- imental results show that the MIST fog-based
niques in solving real-world problems based scheme outperforms traditional cloud comput-
on the data generated through IoT. They ex- ing as the number of applications that demand
Downloaded from http://iranpaper.ir
http://www.itrans24.com/landing1.html
ACCEPTED MANUSCRIPT
6
real-time services increases. Some possible ex- amounts of data that are generated through the
tensions of this work are as follows: (a) adding Internet of Underwater Things (IoUT). They
a selective sensing module to the fog layer, utilize MapReduce to process these data, and
(b) enriching the architecture with privacy- find that MapReduce greatly shortens the query
preserving data analytics capabilities, and (c) execution time compared with SQL. Despite the
considering the mobility of data generators and many advantages of this framework, testing the
data consumers in the resource provisioning applicability of the scalable trust management
part. protocol with IoUT applications and develop-
M. M. Rathore et al. [25] propose a system ing trust-based admission control for IoUT sys-
that deals with several problems in a smart city tems still need to be addressed in the future.
environment, such as enabling objects to react D. Mourtzis et al. [28] reveal that the adop-
T
with respect to context, minimizing the cost of tion of IoT in the manufacturing industry
collecting data generated by smart devices, and can transform traditional systems into modern
IP
obtaining insights into the data if these data are ones. Moreover, such transformation leads to a
collected and processed in real time. The pro- data production process that turns industrial
CR
posed system has a four-tier architecture, where data into industrial big data, which are ren-
the bottom tier is responsible for data gen- dered useless without analytics power. Adopt-
eration and collection, the intermediate tier 1 ing data analytics can empower enterprises
enables communication among sensors, relays,
base stations, and the Internet, the intermediate
tier 2 is responsible for data management and
processing using the Hadoop framework, and
US to derive new data-driven strategies that can
easily manage competitive pressure. They also
demonstrate how the IoT paradigm can be im-
plemented in a simple case of a company with
AN
the top tier is responsible for applying data almost 100 machines.
analysis techniques and generating results. The R. Ramakrishnan et al. [29] analyze the cur-
implementation results show that the proposed rent energy development in India and deter-
M
system is more scalable and efficient in terms mine the benefits that can be obtained through
of throughput and processing time than the cloud computing and analytics. They also ad-
current systems. However, this system lacks an vocate that the usage of analytics can improve
ED
intelligent decision-making technique that can energy conservation, reduce operation costs,
cope with big data in an IoT environment. and empower customers.
F. Alam et al. [26] examine the applicabil-
ity of eight data mining algorithms, including 3 B IG DATA P ROCESSING AND A NA -
PT
for IoT-generated data. These algorithms are and analytics platforms that can be used for
also compared in terms of their confusion ma- large amounts of IoT-generated data. In IoT,
trix, classification accuracy, and execution time. the big data processing and anlytics can be per-
formed closer to data source using the services
AC
ACCEPTED MANUSCRIPT
7
Hadoop Distributed File System (HDFS) and Hive, while SAP uses Sybase IQ to provide a
the MapReduce programming model. HDFS is columnar DBMS. Hana also has a built-in ana-
used to store the data, while MapReduce is lytics library for containing, spatial processing,
used to process these data in a distributed man- and supporting R language and text analytics
ner [35]. Despite its many advantages, Hadoop libraries. Apart from its low latency, SAP-Hana
lacks encryption at the storage and network can also analyze both text and unstructured
levels, has a limited flexibility, is considered data. However, in this tool, all data in a row
unsuitable for small data sets, and has a high must be read even though only the data from
I/O overhead. a few columns are required to be accessed.
Moreover, the capabilities of SAP-Hana are not
3.2 1010data strong enough compared with those of other
T
solutions.
1010data [36] consists of a columnar database
IP
and mostly deals with semi-structured data,
such as IoT data. Aside from its data visual- 3.5 HP-HAVEn
CR
ization, reporting, and integration capabilities,
this tool provides advanced analytic services, HP introduced the Hadoop Autonomy Vertica
including optimization and statistical analysis. Enterprise (HAVEn) [39] security, a new big IoT
1010data is also very supportive for large-scale data platform architecture for a large number of
infrastructure. This tool also works in a cen-
tralized fashion and applies access controls to
interact with back-end systems. 1010data can
US HP systems that can be used with any number
of applications. HP provides reference hard-
ware configurations for the major distributors
AN
satisfy customer demand through its advanced of the Hadoop software. Autonomy’s IDOL
analytic capabilities. However, 1010data is con- software provides search and exploration ser-
sidered ineffective in terms of data extraction, vices for unstructured data. Vertica is an analyt-
transformation, and loading. ical DBMS for a massively parallel processing
M
Cloudera introduced the Enterprise Data Hub panies to complement legacy enterprise data
[37], a Hadoop-based framework for big IoT warehouses. HP also introduced a “Flex-Zone”
data processing and analytics that can be uti- to facilitate the exploration of large datasets
lized as a central point in managing mas-
PT
ACCEPTED MANUSCRIPT
8
3.7 Pivotal big data suite Recently, MapR added LucidWorks Search and
The Pivotal big data suite (Pivotal BDS) [41], stream processing options into Hadoop to en-
which is usually deployed in a public cloud, hance its predictive capabilities and enable fast
comprises three solutions, namely, Pivotal processing. However, MapR has a higher com-
HDB, Pivotal Greenplum, and Pivotal GemFire, plexity compared with Hadoop.
all of which are delivered under a single license.
Pivotal is an analytical database that combines
massively parallel processing (MPP)-based ana- 4 R EQUIREMENTS
lytics performance with robust ANSI SQL com-
pliance and helps in performing predictive an- The requirements of big data and analytics
alytics on data that are stored in HDFS using in IoT have exponentially increased over the
T
SQL syntax and other related tools. Pivotal years and promise dramatic improvements in
IP
Greenplum is an open source MPP analytical decision-making processes. As a result, the de-
database that is used for performing rapid an- mands of adapting data analytics to big data
alytics on voluminous amounts of data and in IoT have increased as well, thereby changing
CR
provides high query performance on petabyte- the way that data are collected, stored, and ana-
scale data volume. Pivotal GemFire is an in- lyzed. Big data and analytics have great poten-
memory data grid that is designed to support tial for extracting meaningful information from
high volumes of operational and transactional
applications. Despite its many benefits, Pivotal
BDS is still in its infancy and its wide adoption
US the data produced by sensor devices. The gen-
eral requirements for big data and IoT define
the functional and nonfunctional specifications
AN
is mired by many unresolved issues. for data analytics. This section presents the
key requirements for big data and analytics in
the IoT environment. These requirements play
3.8 Infobright
an important role in improving IoT services
M
data. With its high compression and data skip- 4.1 Connectivity
ping ratio, Infobright is considered suitable for
machine-generated data, such as IoT data. In- The IoT paradigm is gradually leading to the
fobright mostly works with Hadoop or high- ubiquitous connectivity of intelligent sensor-
PT
scale data warehouses. The data skipping tech-equipped objects in a smart environment. One
nology and columnar design of this tool ensureof the key requirements of IoT is to provide a
that only the concerned data will be used in reliable connectivity for big data and analytics
CE
each query. These data are also indexed auto- to facilitate the combination and integration
matically without the need of any partitioningof huge volumes of machine-generated sen-
and tuning. However, all queries cannot be sor data. Thus, numerous objects around us
AC
answered optimally using the Infobright opti- have a great potential to be connected to high-
mizer. performance computing infrastructures to en-
hance IoT services. Moreover, with the growing
presence of WiFi and 4G-LTE wireless Internet
3.9 MapR access, the evolution toward ubiquitous infor-
MapR [43] supports big data and analytics as mation and communication networks is already
well as adopts several components of Hadoop evident [44]. However, a seamless connection
to improve its performance (e.g., replacing among different objects in smart cities [45], such
HDFS with an NFS-like network file system to as IoT, cloud computing, big data, and ana-
achieve security and high availability). MapR lytics, must be established before embedding
also has its own system recovery approach. intelligence into our environment.
Downloaded from http://iranpaper.ir
http://www.itrans24.com/landing1.html
ACCEPTED MANUSCRIPT
9
T
information that can enhance different smart 4.5 Benchmark
IP
city services. The spectrum of IoT data sources Big data and analytics have attracted much
includes sensor data, smartphones, and social attention from the academia and various orga-
media that are modeled in different ways and
CR
nizations, and many organizations have started
use various communication protocols and inter- pursuing IoT businesses as well. However,
faces. Most IoT services are based on M2M com- these organizations face some challenges in
munication protocols, which require handling storing and analyzing vast amounts of data
a large number of streams and directly benefit
from the widely distributed storage capacities
of cloud computing infrastructure [46].
US
that are collected through sensors in an IoT
environment. Solving these problems requires
a deep understanding that can be achieved by
AN
using a big data and analytics platform. Bench-
4.3 Quality of services mark plays an important role in this context by
The resource management of IoT sensors and providing organizations with a way to judge
mobile devices is the primary requirement for the quality of big data and analytics solutions.
M
quality of service (QoS) to effectively analyze a An excellent system benchmark can also pro-
huge amount of data. Although many studies vide simple and straightforward comparisons
have attempted to meet the QoS requirement, of various solutions.
ED
by an IoT network must be reliable and must Figure 4 shows the thematic taxonomy of big
guarantee a mobile and efficient transfer of data and analytics solutions that are designed
data from those sources where big data are for IoT systems. These solutions are categorized
generated. The QoS support in this network based on the following attributes: a) big data
CE
is extremely important to big data and ana- sources, b) system components, c) big data en-
lytics. However, to create a reliable network, abling technologies, d) functional elements, and
many emerging networking technologies must e) analytics type.
AC
ACCEPTED MANUSCRIPT
10
T
IP
CR
US
AN
Fig. 4: Taxonomy of Big Data and Analytics Solutions for IoT Systems
M
devices generate a bulk of data that must be ing has the same goal as that in the other appli-
managed and analyzed in real time to obtain cation domains. The relevant information is ex-
ED
relevant insights. Similarly, the manufacturing tracted from a wide range of existing data and
industry has deployed IoT devices that con- then provided to decision makers for service
tinuously generate a huge amount of data to management and to the users of the building.
PT
maximize the productivity and efficiency of Big data in the IoT environment are com-
its operations. To obtain insights from these monly used for the collection and storage of
data, big data and analytics solutions have been monitoring sensor data, performing data ana-
CE
used in designing and testing new products, lytics, making forecasts, and generating alerts
optimizing services and marketing, minimizing if abnormal deviations are detected.
defects, and improving yields.
5.2 System Components
AC
ACCEPTED MANUSCRIPT
11
policies and requires the management to meet rules or policy engines, edge computing de-
big data archival requirements. Various big data vices, and data output.
retention policies involve privacy and legal The raw data are collected from different
concerns against economics to identify archival resources and transferred to edge analytics sys-
rules, retention time, data formats, and encryp- tems. These systems are based on a rules/policy
tion methods. The big data must be transported engine that defines and applies rules to the
across different data sites to guarantee load input data in order to obtain insights. The edge
balancing, business continuity, and replication. computing device is another key player in the
Big data is a term used for large and com- operation of the analytics system. Processing
plex datasets that cannot be processed by tra- the data that are generated by IoT devices on
ditional software. The key challenges involved the edge devices can bring several advantages,
T
in big data processing are related to capturing, such as low latency, minimal bandwidth con-
storage, analysis, search, updating, visualiza-
IP
sumption, data integrity, security, and low cost
tion, and privacy. Big data leverage involves [30], [31], [53]. These data are also made avail-
ensuring how a business can reap benefits from able to the consumer in real time.
CR
their data to increase their revenue.
data in IoT include IEEE 802.15.4, IEEE 802.11, and why it will happen,”is enabled by using
IEEE 802.15.1, and IEEE 802.16. various technologies, such as text/web/data
Real-time analytics make the big data gen- mining, to accurately predict future conditions
ED
erated by IoT devices ready to use as they and states. Prescriptive analytics, which defines
enter the system. Real time can be defined as a “what should I do and why should I do it,”
level of computer responsiveness that is either utilizes simulation, expertise, and decision sup-
port systems to investigate various choices and
PT
ACCEPTED MANUSCRIPT
12
T
System (c) Understand customer needs
(d) Identify potential risks
IP
CR
6.1 Smart Transportation 6.3 Smart Grid
Finding valuable information has become a key Smart grids rapidly generate data, and find-
concern in this modern age of technologies ing useful information from these data has
where vehicles are connected to the Internet
and generate large amounts of data. Data an-
alytics can help transport management authori-
ties to find out the history of road mishaps (e.g.,
US become imperative. In a smart grid environ-
ment, large amounts of data are collected from
various sources, such as the power utilization
habits of users, phasor measurement data for
AN
under what circumstances did the accident oc- situational awareness, and energy consumption
cur and at what speed were the drivers driving data measured by widespread smart meters,
during the mishap), minimize the number of to name a few [55]. Proper analytics can help
road accidents, determine the time when the decision makers measure the appropriate level
M
traffic load reaches its peak, and prepare an op- of electricity supply that they must provide to
timal route plan that can help minimize traffic their customers. Analytics may also help busi-
congestion. ness people predict electricity demands in the
ED
The analytics of smart transport data can near future. The strategic objectives of specific
indirectly optimize shipment movements, im- organizations can also be met through proper
prove road safety, and enhance end-to-end user analytics (e.g., pricing plans that are consistent
PT
experience in terms of delivery time. with supply, demand, and production models).
production has created challenges in extract- owners generate more profit. The analytics of
ing valuable information from big healthcare inventory-systems-generated datasets can help
datasets that can help predict epidemics and one acquire knowledge about market trends.
find cures for various diseases. Data analytics Product recommendations can be generated af-
can help healthcare specialists analyze a large ter analyzing seasonal variations. The analytics
amount of patient data and learn the history of inventory data can also help detect fraud-
of a disease (in the case of family doctors). ulent cases. Analytics may aid advertisers in
Insurance companies may also use data analyt- strategically placing their advertisements. Pre-
ics when making policies. Healthcare specialists dictive analytics can help people make valu-
may also detect serious illnesses at their early able decisions and understand further their cus-
stages and subsequently prevent the loss of life. tomers and products. Data analytics can also
Downloaded from http://iranpaper.ir
http://www.itrans24.com/landing1.html
ACCEPTED MANUSCRIPT
13
help companies identify their potential risks only for its domain, but cross-domain data
and opportunities. have emerged as efficient solutions to different
problems [56]. Different types of data, such
7 O PPORTUNITIES as runtime data, device metadata, commercial
The current IoT environment provides the fol- data, retail data, and enterprise data, can now
lowing opportunities for effective big data and be used because of the various enabling tech-
analytics. nologies that complement IoT, including big
data, cloud, semantic web, and data storage
7.1 Decision making technologies.
The proliferation of IoT devices, smart phones,
7.4 Value Added Applications
T
and social media offers decision makers with
an opportunity to extract valuable information Deep learning [57], machine learning [58], and
IP
about their users, to predict future trends, and artificial intelligence [59] are key technologies
detect fraud. Big data can generate significant that provide value added applications using
CR
value by making information transparent and IoT and big data. Before the emergence of IoT
usable to organizations, thereby helping them and cloud computing, massive amounts of data
expose variability and boost their performance. and computation power are unavailable for
Much of the data generated through IoT and certain applications, thereby preventing them
various analytics tools create a large num-
ber of opportunities for organizations. These
tools leverage predictive modeling, classifica-
USfrom using such technologies. Different data
analytics platforms [60], business intelligence
platforms [61], visualization applications [62],
AN
tion, and clustering techniques to offer various and analytics applications [63] have recently
data mining solutions. Mining IoT can also im- emerged and helped industries and organiza-
prove the decision-making habits of individuals tions transform their operations, improve their
using big data. productivity and diagnostics, and increase their
M
IoT. Big data technologies, such as Hadoop and problems, but numerous challenges remain un-
cloud-based mining tools, offer substantial ad- addressed. The solutions to some of these chal-
vantages in terms of cost reduction compared lenges are yet to be provided by big data
and analytics solutions themselves, while oth-
CE
ACCEPTED MANUSCRIPT
14
occupation data to offer incentives to their cus- different domains and businesses. Another op-
tomers or manage their inventory in a proactive tion is to use non-ontology vocabularies, such
manner on a daily or seasonal basis. In typical as the Haystack project [67], which focuses on
IoT solutions, the insights from the IoT data are defining metadata tags for annotation in the
often either time consuming or not put into use building automation domain.
immediately. This trend changes into a proac- However, this option lacks integration with
tive one to make correlations, derive insights, other similar vocabularies. One may also en-
and find seasonal, emerging, and diminishing counter several disjoint vocabularies unless
patterns using IoT data [64]. In many critical they evolve into ontologies that can be linked
industrial applications, these correlations, in- and shared across domains. Another option is
sights, and patterns can help increase opera- to use open standards, such as the one from
T
tional efficiency and achieve effective control Hypercat consortium [68] that uses a standard
in real time. Therefore, we must implement
IP
catalogue format to encode metadata as RDF
solutions that can handle data at the device triples and link them together by using URLs.
or gateway level where the IoT data from de- However, such efforts are yet to be extended to
CR
vices, sensors, and processes are initially re- the global level.
ceived. Exploiting semantically annotated data
[65] or using a rules engine to locally process
8.3 Diversity Issues
information are potential avenues to explore in
future research. Applying semantics is particu-
larly useful because of its capability to provide
the required abstractions, whereas annotated
US The IoT paradigm has heterogeneous proto-
cols, standards, and platforms. The industrial
world also faces IT and OT integration issues
AN
data still retain their semantics when pushed that demonstrate much technological fragmen-
to IoT/cloud platforms for analytics. tation. The current protocols have several ini-
tiatives, including CoAP, MQTT, XMPP, DDS,
M
hanced by adding metadata to their contexts the different requirements and their intended
and meanings. This practice is particularly im- uses. Therefore, IoT systems may be unable
portant in IoT by helping users process and to support multiple protocols in an extensi-
utilize heterogeneous IoT data at the device, ble way. Intelligent gateway solutions, such as
PT
gateway, and cloud levels with different scopes that proposed in [69], must provide seamless
and granularities. One option is to base the integration and interoperability between vari-
solutions on their ontology, which is a formal ous protocols. In terms of standards, several
CE
representation of concepts and the relationships organizations, such as ITU-T, IETF, ISO/IEC,
among these concepts. Therefore, ontology can IEEE, ETSI, oneM2M, and 3GPP, have shown
be used to create vocabularies of metadata for some efforts. While we may assume that all
AC
annotating IoT data at the source or near the these standardization activities will provide in-
source. Given that ontologies are very easy teroperability (or some form of it), they may
to share and link, they can provide the right lead to a higher ambiguity because instead of
context and meanings of IoT data in an open having a broad scope, they all provide specific
manner. Ontologies are also useful for inte- and isolated solutions that only cover their own
grating IoT data from multiple domains [66]. domains [70].
Although several efforts have been made to In terms of IoT platforms, several initiatives
create general and domain-specific ontologies, have been launched to generate profit from
more efforts are required in some areas, espe- IoT by providing connectivity, data storage, big
cially in the industrial world, to create specific data analysis, predictions, and machine learn-
ontologies for linking and sharing data across ing. The big industry players have achieved
Downloaded from http://iranpaper.ir
http://www.itrans24.com/landing1.html
ACCEPTED MANUSCRIPT
15
much progress in offering diverse IoT plat- approach does not have apply scheme map-
forms with a rich feature set. IBM Watson, ping or query languages and can store any
Microsoft Azure, GE Predix, Cisco Jasper, and data without restrictions. However, Data Lakes
PTC ThingWorx are examples of enterprise- introduces few problems. First, given that any
grade platforms that face a vendor lockdown. data can be inserted, data swaps may occur
Open source IoT platform initiatives, such as in the future [76]. To avoid such problem, we
thingsboard.io, Kaa, and DeviceHive, are few must have oversights for data quality, impose
good examples in this regard. metadata inclusion, and ensure data prove-
nance. Second, using Data Lakes may lead to
a loss of agility, which is especially true for
8.4 Security Challenges large organizations that intend to use a large
T
A major hindrance in the broad integration of pool of data for quick analysis and decision
IoT in industries lies in its security. Several making yet are unable to do so efficiently be-
IP
challenges, such as the recent Dyn attack [71], cause they must go through several steps be-
underscore the importance of having secure IoT fore extracting something meaningful from the
CR
devices, platforms, and applications which oth- data. These organizations must instead make a
erwise can lead to major catastrophes, such as clear distinction between those data that can be
the successful execution of a massive DDOS at- used for decision making in near real time and
US
tack. These attacks can have devastating effects those data that can be used to derive business
on the businesses of many critical industries, strategies. The latter data type is more suitable
threaten national security, and even directly or for storage in Data Lake because these data will
indirectly affect human lives. The IT profession- not be used immediately.
AN
als in these industries have their hands full with
the security issues of BYOD [72], [73] and the
implementation of on-site cloud infrastructures
M
and is still largely treated as a compulsory ity and integrity of the data as well to their
yet secondary subject. Such disregard can be traceability to determine the owners and mod-
attributed to the lack of organizational policies ifiers of the data at each step [77]. However,
and the ambiguities in government laws [74]. given that big data provides deep insights and
PT
To guarantee a successful implementation of analytics that may lead to some form of au-
IoT, solving these security issues must be given tonomous actuation in the real world, we must
priority in the IoT realm. These issues not only ensure that the data used for making such
CE
require technical solutions but also the appro- actuation are coming from a legitimate source.
priate enforcement of policies and guidelines. Several large-scale initiatives, including smart
The views of all stakeholders in IoT must also cities and smart health, plan to make use of
AC
ACCEPTED MANUSCRIPT
16
T
and tools to specify their preferences and prior- [2] F. J. Riggins and S. F. Wamba, “Research directions on
itize/limit the use of data from their devices the adoption, usage, and impact of the internet of things
IP
[82]–[84]. Future studies must also focus on through the use of big data analytics,” in Proceedings
of 48th Hawaii International Conference on System Sciences
developing policy frameworks to identify the (HICSS’15). IEEE, 2015, pp. 1531–1540.
CR
stakes and concerns of data owners, data con- [3] M. R. Bashir and A. Q. Gill, “Towards an iot big data an-
sumers, and all the other actors between these alytics framework: Smart buildings systems,” in High Per-
formance Computing and Communications; IEEE 14th Interna-
two. The input from regulatory authorities or tional Conference on Smart City; IEEE 2nd International Con-
governments will be necessary, but care must ference on Data Science and Systems (HPCC/SmartCity/DSS),
be taken to not have centralized control over
the data. Data owners must be given more
power to allow them to make decisions within
US 2016 IEEE 18th International Conference on. IEEE, 2016, pp.
1325–1332.
[4] C. Lee, C. Yeung, and M. Cheng, “Research on iot based
cyber physical system for industrial big data analytics,” in
AN
Industrial Engineering and Engineering Management (IEEM),
the scope of the overall policy framework. The 2015 IEEE International Conference on. IEEE, 2015, pp.
general public must be made aware of their role 1855–1859.
and must be given easy-to-use tools for sharing [5] P. Rizwan, K. Suresh, and M. R. Babu, “Real-time smart
traffic management system for smart cities by using in-
their data with other parties. ternet of things and big data,” in Emerging Technological
M
big data context. First, we investigate the recent IEEE Internet Computing, vol. 20, no. 6, pp. 52–56, 2016.
[9] O. B. Sezer, E. Dogdu, M. Ozbayoglu, and A. Onal, “An
literature on big data processing and analytics extended iot framework with semantics, big data, and
solutions for IoT. Second, we identify the nu- analytics,” in Big Data (Big Data), 2016 IEEE International
AC
merous requirements for big data and analytics Conference on. IEEE, 2016, pp. 1849–1856.
[10] B. Cheng, A. Papageorgiou, F. Cirillo, and E. Kovacs,
in IoT. Third, we taxonomized the literature. “Geelytics: Geo-distributed edge analytics for large scale
Fourth, we determine the various opportunities iot systems based on dynamic topology,” in Internet of
that are brought about by big data. Fifth, we Things (WF-IoT), 2015 IEEE 2nd World Forum on. IEEE,
2015, pp. 565–570.
highlight the role of data analytics in IoT ap- [11] H. Wang, O. L. Osen, G. Li, W. Li, H.-N. Dai, and W. Zeng,
plications. Sixth, we present the open research “Big data and industrial internet of things for the maritime
industry in northwestern norway,” in TENCON 2015-2015
challenges that must be addressed in the fu- IEEE Region 10 Conference. IEEE, 2015, pp. 1–5.
ture. Seventh, we conclude that the existing big [12] J. L. Pérez and D. Carrera, “Performance characterization
data solutions in the IoT paradigm are still in of the servioticy api: an iot-as-a-service data management
platform,” in Big Data Computing Service and Applications
their infancy and the challenges associated with (BigDataService), 2015 IEEE First International Conference on.
them must be solved in the future. IEEE, 2015, pp. 62–71.
Downloaded from http://iranpaper.ir
http://www.itrans24.com/landing1.html
ACCEPTED MANUSCRIPT
17
[13] M. Villari, A. Celesti, M. Fazio, and A. Puliafito, “Alljoyn things (iot),” Procedia Computer Science, vol. 98, pp. 437–
lambda: An architecture for the management of smart 442, 2016.
environments in iot,” in Smart Computing Workshops [27] M. H. Berlian, T. E. R. Sahputra, B. J. W. Ardi, L. W.
(SMARTCOMP Workshops), 2014 International Conference Dzatmika, A. R. A. Besari, R. W. Sudibyo, and S. Sukarid-
on. IEEE, 2014, pp. 9–14. hoto, “Design and implementation of smart environment
[14] A. J. Jara, D. Genoud, and Y. Bocchi, “Big data for cyber monitoring and analytics in real-time system framework
physical systems: an analysis of challenges, solutions and based on internet of underwater things and big data,” in
opportunities,” in Innovative Mobile and Internet Services Electronics Symposium (IES), 2016 International. IEEE, 2016,
in Ubiquitous Computing (IMIS), 2014 Eighth International pp. 403–408.
Conference on. IEEE, 2014, pp. 376–380. [28] D. Mourtzis, E. Vlachou, and N. Milas, “Industrial big
[15] Z. Ding, X. Gao, J. Xu, and H. Wu, “Iot-statisticdb: a data as a result of iot adoption in manufacturing,” Procedia
general statistical database cluster mechanism for big data CIRP, vol. 55, pp. 290–295, 2016.
analysis in the internet of things,” in Green Computing [29] R. Ramakrishnan and L. Gaur, “Smart electricity distri-
and Communications (GreenCom), 2013 IEEE and Internet of bution in residential areas: Internet of things (iot) based
T
Things (iThings/CPSCom), IEEE International Conference on advanced metering infrastructure and cloud analytics,”
and IEEE Cyber, Physical and Social Computing. IEEE, 2013, in Internet of Things and Applications (IOTA), International
Conference on. IEEE, 2016, pp. 46–51.
IP
pp. 535–543.
[16] C. Vuppalapati, A. Ilapakurti, and S. Kedari, “The role [30] E. Ahmed and M. H. Rehmani, “Mobile edge computing:
of big data in creating sense ehr, an integrated approach Opportunities, solutions, and challenges,” pp. 59–63.
[31] A. Ahmed and E. Ahmed, “A survey on mobile edge
CR
to create next generation mobile sensor and wearable
data driven electronic health record (ehr),” in Big Data computing,” in Intelligent Systems and Control (ISCO), 2016
Computing Service and Applications (BigDataService), 2016 10th International Conference on. IEEE, 2016, pp. 1–8.
IEEE Second International Conference on. IEEE, 2016, pp. [32] U. Shaukat, E. Ahmed, Z. Anwar, and F. Xia, “Cloudlet
293–296. deployment in local wireless networks: Motivation, ar-
[17] A. Ahmad, M. M. Rathore, A. Paul, and S. Rho, “Defin-
ing human behaviors using big data analytics in social
internet of things,” in Advanced Information Networking andUS
Applications (AINA), 2016 IEEE 30th International Conference
on. IEEE, 2016, pp. 1101–1107.
[33]
chitectures, applications, and open challenges,” Journal of
Network and Computer Applications, vol. 62, pp. 18–40, 2016.
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog com-
puting and its role in the internet of things,” in Proceedings
of the first edition of the MCC workshop on Mobile cloud
AN
[18] E. Ahmed and M. H. Rehmani, “Introduction to the spe- computing. ACM, 2012, pp. 13–16.
cial section on social collaborative internet of things,” p. [34] J. Nandimath, E. Banerjee, A. Patil, P. Kakade, S. Vaidya,
382384, 2017. and D. Chaturvedi, “Big data analysis using apache
hadoop,” in Information Reuse and Integration (IRI), 2013
[19] D. Arora, K. F. Li, and A. Loffler, “Big data analytics for
IEEE 14th International Conference on. IEEE, 2013, pp. 700–
classification of network enabled devices,” in Advanced In-
M
703.
formation Networking and Applications Workshops (WAINA),
2016 30th International Conference on. IEEE, 2016, pp. 708– [35] I. A. T. Hashem, N. B. Anuar, A. Gani, I. Yaqoob, F. Xia,
713. and S. U. Khan, “Mapreduce: Review and open chal-
lenges,” Scientometrics, pp. 1–34, 2016.
[20] I.-L. Yen, G. Zhou, W. Zhu, F. Bastani, and S.-Y. Hwang,
ED
[21] R. P. Minch, “Location privacy in the era of the internet of “Datahub: Collaborative data science & dataset version
things and big data analytics,” in System Sciences (HICSS), management at scale,” arXiv preprint arXiv:1409.0798,
2015 48th Hawaii International Conference on. IEEE, 2015, 2014.
pp. 1521–1530.
[38] F. Färber, S. K. Cha, J. Primsch, C. Bornhövd, S. Sigg,
CE
[22] A. Mukherjee, H. S. Paul, S. Dey, and A. Banerjee, “Angels and W. Lehner, “Sap hana database: data management
for distributed analytics in iot,” in Internet of Things (WF- for modern business applications,” ACM Sigmod Record,
IoT), 2014 IEEE World Forum On. IEEE, 2014, pp. 565–570. vol. 40, no. 4, pp. 45–51, 2012.
[23] A. Mukherjee, S. Dey, H. S. Paul, and B. Das, “Utilis- [39] S. Burke, “Hp haven big data platform is gain-
ing condor for data parallel analytics in an iot contex-
AC
ACCEPTED MANUSCRIPT
18
[44] E. Al Nuaimi, H. Al Neyadi, N. Mohamed, and J. Al- [60] V. O. Safonov, “Example of a trustworthy cloud comput-
Jaroodi, “Applications of big data to smart cities,” Journal ing platform in detail: Microsoft azure,” Trustworthy Cloud
of Internet Services and Applications, vol. 6, no. 1, p. 1, 2015. Computing, pp. 147–270, 2016.
[45] E. Ahmed, M. Imran, M. Guizani, A. Rayes, J. Lloret, [61] J. Vidal-Garcı́a, M. Vidal, and R. H. Barros, “Computa-
G. Han, and W. Guibene, “Enabling mobile and wireless tional business intelligence, big data, and their role in
technologies for smart cities: Part 2,” IEEE Communications business decisions in the age of the internet of things,” in
Magazine, vol. 55, no. 3, pp. 12–13, 2017. The Internet of Things in the Modern Business Environment.
[46] G. Suciu, V. Suciu, A. Martian, R. Craciunescu, A. Vulpe, IGI Global, 2017, pp. 249–268.
I. Marcu, S. Halunga, and O. Fratu, “Big data, internet of [62] Y. Jeong, H. Joo, G. Hong, D. Shin, and S. Lee, “Aviot:
things and cloud convergence–an architecture for secure Web-based interactive authoring and visualization of in-
e-health applications,” Journal of medical systems, vol. 39, door internet of things,” IEEE Transactions on Consumer
no. 11, pp. 1–8, 2015. Electronics, vol. 61, no. 3, pp. 295–301, 2015.
[47] J. Jin, J. Gubbi, T. Luo, and M. Palaniswami, “Network [63] M. Strohbach, H. Ziekow, V. Gazis, and N. Akiva, “To-
architecture and qos issues in the internet of things for a wards a big data analytics framework for iot and smart
T
smart city,” in Communications and Information Technologies city applications,” in Modeling and processing for next-
(ISCIT), 2012 International Symposium on. IEEE, 2012, pp. generation big-data technologies. Springer, 2015, pp. 257–
956–961.
IP
282.
[48] R. Tönjes, P. Barnaghi, M. Ali, A. Mileo, M. Hauswirth, [64] S. Aljawarneh, V. Radhakrishna, P. V. Kumar, and
F. Ganz, S. Ganea, B. Kjærgaard, D. Kuemper, S. Nechifor V. Janaki, “A similarity measure for temporal pattern dis-
et al., “Real time iot stream processing and large-scale
CR
covery in time series data generated by iot,” in Engineering
data analytics for smart city applications,” in poster session, & MIS (ICEMIS), International Conference on. IEEE, 2016,
European Conference on Networks and Communications, 2014. pp. 1–4.
[49] E. Ahmed, S. Ali, A. Akheenzada, and I. Yaqoob, “Cogni- [65] C. El Kaed, I. Khan, H. Hossayni, and P. Nappey, “Sqeniot:
tive radio sensor networks: Bridging the gap for network,” Semantic query engine for industrial internet-of-things
Cognitive Radio Sensor Networks: Applications, Architectures,
and Challenges: Applications, Architectures, and Challenges.
IGI Global, p. 160, 2014.
[50] S. A. A. Shah, E. Ahmed, F. Xia, A. Karim, M. A. Qureshi,
I. Ali, and R. M. Noor, “Coverage differentiation based
US gateways,” Submitted IEEE GLOBECOM, 2016.
[66] T. Banerjee and A. Sheth, “Iot quality control for data and
application needs,” IEEE Intelligent Systems, vol. 32, no. 2,
pp. 68–73, 2017.
AN
[67] A. A. Bhattacharya, D. Hong, D. Culler, J. Ortiz, K. White-
adaptive tx-power for congestion and awareness control
house, and E. Wu, “Automated metadata construction to
in vanets,” Mobile Networks and Applications, pp. 1–12.
support portable building applications,” in Proceedings of
[51] I. Yaqoob, I. Ahmad, E. Ahmed, A. Gani, M. Imran, and the 2nd ACM International Conference on Embedded Systems
N. Guizani, “Overcoming the key challenges to establish- for Energy-Efficient Built Environments. ACM, 2015, pp.
ing vehicular communication: Is sdn the answer?” IEEE 3–12.
M
challenges,” IEEE Wireless Communications, 2017. as a service architecture for iot interoperability,” in Mobile
Services (MS), 2015 IEEE International Conference on. IEEE,
[53] Y. Jararweh, A. Doulat, O. AlQudah, E. Ahmed, M. Al-
2015, pp. 313–319.
Ayyoub, and E. Benkhelifa, “The future of mobile cloud
computing: integrating cloudlets and mobile edge com- [70] A. Meddeb, “Internet of things standards: who stands out
puting,” in Telecommunications (ICT), 2016 23rd Interna- from the crowd?” IEEE Communications Magazine, vol. 54,
PT
tional Conference on. IEEE, 2016, pp. 1–5. no. 7, pp. 40–47, 2016.
[54] N. Bessis and C. Dobre, Big data and internet of things: a [71] C. Chris Mishler and C. CIA, “The future of the internet
roadmap for smart environments. Springer, 2014. of things,” Strategic Finance, vol. 97, no. 5, p. 62, 2015.
[55] I. A. T. Hashem, V. Chang, N. B. Anuar, K. Adewole, [72] S. Tanimoto, S. Yamada, M. Iwashita, T. Kobayashi,
CE
I. Yaqoob, A. Gani, E. Ahmed, and H. Chiroma, “The role H. Sato, and A. Kanai, “Risk assessment of byod: Bring
of big data in smart city,” International Journal of Information your own device,” in Consumer Electronics, 2016 IEEE 5th
Management, vol. 36, no. 5, pp. 748–758, 2016. Global Conference on. IEEE, 2016, pp. 1–4.
[56] A. Brring, S. Schmid, C. K. Schindhelm, A. Khelil, [73] K. Hajdarevic, P. Allen, and M. Spremic, “Proactive se-
curity metrics for bring your own device (byod) in iso
AC
ACCEPTED MANUSCRIPT
19
[77] W. She, I.-L. Yen, F. Bastani, B. Tran, and B. Thurais- is associate editor of IEEE Communication Mag-
ingham, “Role-based integrated access control and data azine, IEEE Access, and Wiley Wireless Commu-
provenance for soa based net-centric systems,” in Service
Oriented System Engineering (SOSE), 2011 IEEE 6th Interna- nications and Mobile Computing, Elsevier Journal
tional Symposium on. IEEE, 2011, pp. 225–234. of Network and Computer Applications, and KSII
[78] B. Glavic, “Big data provenance: Challenges and implica-
tions for benchmarking,” in Specifying big data benchmarks.
TIIS. He has also served as a Lead Guest Edi-
Springer, 2014, pp. 72–80. tor/Guest Editor and Chair/Co-chair in inter-
[79] Y. Zhang and J. Wen, “An iot electric business model based national journals and international conferences,
on the protocol of bitcoin,” in Intelligence in Next Genera-
tion Networks (ICIN), 2015 18th International Conference on. respectively. His areas of interest include Mo-
IEEE, 2015, pp. 184–191. bile Cloud Computing, Mobile Edge Comput-
[80] Q. H. Cao, I. Khan, R. Farahbakhsh, G. Madhusudan, ing, Internet of Things, Cognitive Radio Net-
G. M. Lee, and N. Crespi, “A trust model for data shar-
ing in smart cities,” in Communications (ICC), 2016 IEEE works, and Smart Cities. He has successfully
T
International Conference on. IEEE, 2016, pp. 1–7. published his research work in more than fifty
[81] I. Khan, F. Belqasmi, R. Glitho, N. Crespi, M. Morrow, and
international journals and conferences.
IP
P. Polakos, “Wireless sensor network virtualization: Early
architecture and research perspectives,” IEEE Network,
vol. 29, no. 3, pp. 104–112, 2015.
CR
[82] E. D. Ragan, A. Endert, J. Sanyal, and J. Chen, “Charac-
terizing provenance in visualization and data analysis:
an organizational framework of provenance types and
purposes,” IEEE transactions on visualization and computer
graphics, vol. 22, no. 1, pp. 31–40, 2016.
US
Ibrar Yaqoob received his Ph.D. degree
[83] C. H. Suen, R. K. Ko, Y. S. Tan, P. Jagadpramana, and B. S.
Lee, “S2logger: End-to-end data tracking mechanism for
in Computer Science from the University of
cloud data provenance,” in Trust, Security and Privacy in
Malaya, Malaysia, in 2017. He earned 550 plus
Computing and Communications (TrustCom), 2013 12th IEEE
AN
citations, and 50 plus impact factor during his
International Conference on. IEEE, 2013, pp. 594–602.
[84] M. B. Jones, B. Ludäscher, T. McPhillips, P. Missier,
Ph.D. candidature. He worked as a researcher
C. Schwalm, P. Slaughter, D. Vieglais, L. Walker, and
at Centre for Mobile Cloud Computing Re-
Y. Wei, “Dataone: A data federation with provenance sup-
search (C4MCCR), University of Malaya. His
port,” in Provenance and Annotation of Data and Processes:
M
ACCEPTED MANUSCRIPT
20
T
Tlcom, Tlcom SudParis jointly with UPMC
Paris VI, France, M.S. degree in Multimedia
IP
and Communication from M.A. Jinnah Univer-
sity, Pakistan and B.S. degree in Computer Sci-
CR
ence from COMSATS Institute of IT, Pakistan.
During his Ph.D. he worked as collaborating
researcher at Concordia University, Montreal,
Canada to lead a 3 year Cisco funded project.
He was also involved in several European re-
US Muhammad Imran (cimran@ksu.edu.sa) is
search projects funded by ITEA2 and H2020. an assistant professor in the College of Com-
During M.S. Imran was member of Center of puter and Information Science, King Saud Uni-
AN
Research in Networks and Telecom (CoReNeT) versity. His research interests include mobile ad
and worked on projects funded by the French hoc and sensor networks, WBANs, IoT, M2M,
Ministry of Foreign Affairs and the Internet multihop wireless networks, and fault-tolerant
Society (ISOC). He has number of publications computing. He has published a number of re-
M
in peer reviewed conferences and journals, and search papers in peer reviewed international
has also contributed to the IETF standardiza- journals and conferences. His research is fi-
ED
tion activities. His current research interests are nancially supported by several grants. He is
Internet of Things (IoT), data and information serving as a Co-Editor-in-Chief for EAI Transac-
management using semantic web technologies, tions on Pervasive Health and Technology. He
cloud and edge computing, software defined also serves as an Associate Editor for the Wire-
PT
automation and wireless sensor networks. less Communication and Mobile Computing
Journal (Wiley), the Inderscience International
Journal of Autonomous and Adaptive Com-
CE
ACCEPTED MANUSCRIPT
21
awards such as an Asia Pacific Advanced Net- bile/Wireless Networks, IoT, Sensor Networks.
work fellowship. He has authored or coauthored over 250 tech-
nical papers in major international journals and
conferences. Moreover, he is author/co-author
of five books and more than 20 book chapters.
He served or is serving as an Editor or/and
Guest Editor for many technical journals, such
as the IEEE Transactions on Network and Ser-
vice Management, IEEE Transactions on Cloud
Athanasios V. Vasilakos currently Profes- Computing, IEEE Transactions on Cybernet-
sor at Lulea University of Technology, Sweden. ics, IEEE Transactions on Information Forensics
T
He is also General Chair of the European Al- and Security. Moreover, he has served as Gen-
liances for Innovation. His research interests eral Chair, Technical Program Committee Chair
IP
include Cloud Computing, Smart Grid, Energy for many international conferences.
Security and Harvesting, Social Networks, Mo-
CR
US
AN
M
ED
PT
CE
AC