Un peu de recherche…. 2 LIRIS/DCS/DRIM 3 Nostalgia: an overview of the past 10 years Some contributions to the management of data in grids Some contributions.

Slides:



Advertisements
Similar presentations
Research Issues in Web Services CS 4244 Lecture Zaki Malik Department of Computer Science Virginia Tech
Advertisements

Sharing Content and Experience in Smart Environments Johan Plomp, Juhani Heinila, Veikko Ikonen, Eija Kaasinen, Pasi Valkkynen 1.
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
Seminar Grid Computing ‘05 Hui Li Sep 19, Overview Brief Introduction Presentations Projects Remarks.
MobiShare: Sharing Context-Dependent Data & Services from Mobile Sources Efstratios Valavanis, Christopher Ververidis, Michalis Vazirgianis, George C.
0 General information Rate of acceptance 37% Papers from 15 Countries and 5 Geographical Areas –North America 5 –South America 2 –Europe 20 –Asia 2 –Australia.
Some contributions to the management of data in grids Lionel Brunie National Institute of Applied Science (INSA) LIRIS Laboratory/DRIM Team – UMR CNRS.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
PhD course - Milan, March /06/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Master Course /06/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
© DSRG 2001www.cs.agh.edu.pl Cross Grid Workshop - Kraków Krzysztof Zieliński, Sławomir Zieliński University of Mining and Metallurgy {kz,
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
Semantic Web and Web Mining: Networking with Industry and Academia İsmail Hakkı Toroslu IST EVENT 2006.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández.
On P2P Collaboration Infrastructures Manfred Hauswirth, Ivana Podnar, Stefan Decker Infrastructure for Collaborative Enterprise, th IEEE International.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
A Lightweight Platform for Integration of Resource Limited Devices into Pervasive Grids Stavros Isaiadis and Vladimir Getov University of Westminster
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
1 School of Computer, National University of Defense Technology A Profile on the Grid Data Engine (GridDaEn) Xiao Nong
UMR 5205 An Introduction to Ubiquitous and Pervasive Computing Lionel Brunie National Institute of Applied Sciences (INSA) LIRIS Laboratory/DRIM Team –
Evaluation of a Publish/Subscribe System for Collaboration and Mobile Working Collaborative Advertising over Internet with Agents Independent Study: Wireless.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
1 4/23/2007 Introduction to Grid computing Sunil Avutu Graduate Student Dept.of Computer Science.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
A Peer-to-Peer Approach to Resource Discovery in Grid Environments (in HPDC’02, by U of Chicago) Gisik Kwon Nov. 18, 2002.
1- Distributed Systems Principles and Paradigms Operating Systems: Concurrent and Distributed Software Design Jean Bacon, Tim Harris 2003.
Peer-to-Peer Computing Mrs. Tugba Taskaya-Temizel 13/February/2006.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
NGCWE Expert Group EU-ESA Experts Group's vision Prof. Juan Quemada NGCWE Expert Group IST Call 5 Preparatory Workshop on CWEs 13th.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Web Caching and Replication Presented by Bhushan Sonawane.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Mobile Computing and Wireless Communication Pisa 26 November 2002 Roberto Baldoni University of Roma “La Sapienza”
Globus and PlanetLab Resource Management Solutions Compared M. Ripeanu, M. Bowman, J. Chase, I. Foster, M. Milenkovic Presented by Dionysis Logothetis.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
Security of the Internet of Things: perspectives and challenges
SmartGRID Decentralized, dynamic grid scheduling framework on swarm agent-based intelligence Seminar in HUST, Wuhan, China. Oct. 22, 2008 Ye HUANG, Amos.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 Multimedia services over networks Service provider Service client Service registry Publish Discovery Bind Multimedia system Review/background Framework/
Grid Services for Digital Archive Tao-Sheng Chen Academia Sinica Computing Centre
Presented by Edith Ngai MPhil Term 3 Presentation
High Performance Computing Lab.
Security Requirements for ChinaGrid Applications - What the current grid security solutions cannot do Hai Jin Huazhong University of Science and Technology.
Pervasive Data Access (PDA) Research Group
Dipanjan Chakraborty Anupam Joshi CSEE University of Maryland Baltimore County Anamika: Distributed Service Discovery and Composition Architecture for.
Goals Introduce the Windows Server 2003 family of operating systems
Trends and developments in eGOVwork – a resesearch perspective
Presentation transcript:

Un peu de recherche…

2 LIRIS/DCS/DRIM

3 Nostalgia: an overview of the past 10 years Some contributions to the management of data in grids Some contributions to Pervasive/Ubiquitous Systems… and other distributed systems (incl. security and privacy)

Some contributions to the management of data in grids

5 Computing/Data Grid (1) “ coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organisations” (I. Foster)

6 Computing/Data Grids (2) Large scale Unpredictability, dynamicity Security, privacy Resource heterogeneity and usage diversity Decentralized administration

7 Monitoring de grilles Where to place instances (replicas) of a service? What resource (set of resources) (what service) use? Condition: monitor the grid state: CPU load, network load… Design and implementation of a grid service that processes high- level information requests that represent the user’s specific needs in terms of resources

8 NDS : Network Distance Service

9 Grid access control: Sygn Mechanisms for delegation of rights File group operations Permission = Authorization Certificate (AC) : – Issuer – Owner – Capability (access control object + authorized action) – Validity – Signature

10 Encrypted Storage for Data Grids: Crypstore

11 Management of a Cooperative Cache in Grids cache organization GRID data organization data Collective Coordinator Monitoring operations data description processed requests transfers replacements used storage resource Etc. Management operations Set replacement method Set default time to live Set cache group Set cache coordinator Set collective work mode Etc.

12 Data Integration

13 Some Contributions to Pervasive/Ubiquitous Systems… and Other Distributed Systems (incl. Security and Privacy)

14 Pervasive, Ubiquitous, Mobile, Ambient, Ad Hoc ? Introduction to pervasive systems Hansel and Gretel are lost in the forest of PC definitions… Basics (1) – Mobility (wireless) / autonomy – User (or device)-centric – Context-awareness (user prefs, environment) Basics (2) – Lightweight appliances and devices – Proactivity  Make the digital world/information omnipresent but invisible

15 PerSE Adaptation context Models Context-Awareness Proactivity Service Composition

16 Architecture of a PerSE Base

17 PerSE Layers

18 Context Modeling and Context-Aware Pervasive Applications Context = ? User/Application centric context Context-aware application platform

19 Access Control of Mobile Users Chains of trust certificates: if A trusts B and B trusts C then A trusts C… to some level Multi-layered adaptive certificates Trust computing and reputation

20 Privacy-Preserving Reputation Systems Reputation: aggregation of feedbacks Query agent, target agent, source agents Goal: computing the reputation while not revealing the individual feedbacks Approach: use trust relations in the reputation protocol for enforce the privacy + “cut” feedbacks into pieces (“shares”) + use cryptographic tools

21 Authentication and Trust in Pervasive Systems

22 Mobile Requests Information exchange between mobile peers (MANETs, VANETs) Trajectory aware geocast request routing Construction for each query of an ad hoc overlay of the peers that may participate to the delivery of the requested data

23 Data Replication in Small Worlds Server Original content

24 Replication in Ad Hoc Networks Issues: instability, dynamicity, faults/disconnections Basic idea: adapt the replication heuristics to the actual usage of the data, e.g.: –Data highly accessed => replicate –Rare data and planned disconnection => replicate –Overloaded peer => replicate most accessed data –Etc. Pre-requisite: access logging + exchange of access data Assumption: no central coordination – local decisions Question : can local decisions lead to an acceptable (good ?) situation ?

25 Interface Adaptation and Context-Aware Browsing of a Patient Medical Record

26 Multimedia Content Adaptation + Adaptation of the interface wrt the end-user device Ongoing : Content Adaptation in MANETs

27 Semantic Protection of Multimedia Data Multimedia => access control is not a binary decision Access control content adaptation Coherence/Consistence of an adaptation Legality of an adaptation => Access control = semantic adaptation decision

28 Semantic Clustering of Multimedia Queries: From Query Logging to Database Content and User Profile Discovery Large number of data stores disseminated Lack of indexes Issues : –What are the pertinent/interesting data ? –What are the users interest ? –How to process a query ? Logging of the users’ queries + clustering + communication of clustering info => identification of the community of users’ interests Logging of a the queries issued by a specific user + matching to the community clustering => identification of the user’s profile Usage: query optimization, data store management, recommendation, social computing, etc.

29 BAR-Tolerant Publish-subscribe P2P Systems Collaboration Modeling and Enhancing: a Game Theoretical Approach Byzantine-Altruistic-Rational Publish an information; disseminate the information to subscribers Systems benchmarking tool GT modeling of collaborative systems

30 Ambient Social Networks and Message Routing in DTN Ambient social networks Delay Tolerant Networks (DTN) and Opportunistic Networks Mobility traces/model Message routing

31 Ongoing work: User-centric Ubiquitous Multi-Scale Digital Ecosystems Information retrieval in P2P systems Privacy-preserving personal data mining (EEXCESS project) Privacy-preserving recommendation systems (EEXCESS project) Privacy-preserving multimedia data routing Open data and user-as-sensor based ambient social services Game-theory-based cooperation modeling and enhancing in distributed systems Trust and reputation in B2B networks (AttestationLegale) Information protection in clouds Social-aware event driven architectures Mobile Crowd Sourcing, Sensing, and Computing: Intelligence, Aggregation, Resilience (if opportunity) Adaptive and information value-based protection of business processes (if opportunity) Security of the social web of things ???

32 Faites de la recherche (au moins un peu) !