Next Issue
Volume 14, February
Previous Issue
Volume 13, December
 
 

Future Internet, Volume 14, Issue 1 (January 2022) – 29 articles

Cover Story (view full-size image): Low latency is required in order to achieve great service quality in ambient assisted living facilities, the so-called Internet of People (IoP). Assessing the performance of such systems in a real-world setting is difficult. This paper presents a performance evaluation of aged care monitoring systems using an M/M/c/K queuing network. The model enables resource capacity, communication, and service delays to be calibrated. The proposed model was shown to be capable of predicting the system’s mean response time (MRT) and calculating the quantity of resources required to satisfy certain user requirements. To analyze data from IoT solutions, the examined architecture incorporates cloud and fog resources. Simulations have tested various routing algorithms with the goal of improving performance metrics. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
22 pages, 551 KiB  
Review
Experimentation Environments for Data Center Routing Protocols: A Comprehensive Review
by Leonardo Alberro, Alberto Castro and Eduardo Grampin
Future Internet 2022, 14(1), 29; https://doi.org/10.3390/fi14010029 - 17 Jan 2022
Cited by 5 | Viewed by 5633
Abstract
The Internet architecture has been undergoing a significant refactoring, where the past preeminence of transit providers has been replaced by content providers, which have a ubiquitous presence throughout the world, seeking to improve the user experience, bringing content closer to its final recipients. [...] Read more.
The Internet architecture has been undergoing a significant refactoring, where the past preeminence of transit providers has been replaced by content providers, which have a ubiquitous presence throughout the world, seeking to improve the user experience, bringing content closer to its final recipients. This restructuring is materialized in the emergence of Massive Scale Data Centers (MSDC) worldwide, which allows the implementation of the Cloud Computing concept. MSDC usually deploy Fat-Tree topologies, with constant bisection bandwidth among servers and multi-path routing. To take full advantage of such characteristics, specific routing protocols are needed. Multi-path routing also calls for revision of transport protocols and forwarding policies, also affected by specific MSDC applications’ traffic characteristics. Experimenting over these infrastructures is prohibitively expensive, and therefore, scalable and realistic experimentation environments are needed to research and test solutions for MSDC. In this paper, we review several environments, both single-host and distributed, which permit analyzing the pros and cons of different solutions. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

20 pages, 2023 KiB  
Article
Enhancing Reactive Ad Hoc Routing Protocols with Trust
by Yelena Trofimova and Pavel Tvrdík
Future Internet 2022, 14(1), 28; https://doi.org/10.3390/fi14010028 - 15 Jan 2022
Cited by 6 | Viewed by 2604
Abstract
In wireless ad hoc networks, security and communication challenges are frequently addressed by deploying a trust mechanism. A number of approaches for evaluating trust of ad hoc network nodes have been proposed, including the one that uses neural networks. We proposed to use [...] Read more.
In wireless ad hoc networks, security and communication challenges are frequently addressed by deploying a trust mechanism. A number of approaches for evaluating trust of ad hoc network nodes have been proposed, including the one that uses neural networks. We proposed to use packet delivery ratios as input to the neural network. In this article, we present a new method, called TARA (Trust-Aware Reactive Ad Hoc routing), to incorporate node trusts into reactive ad hoc routing protocols. The novelty of the TARA method is that it does not require changes to the routing protocol itself. Instead, it influences the routing choice from outside by delaying the route request messages of untrusted nodes. The performance of the method was evaluated on the use case of sensor nodes sending data to a sink node. The experiments showed that the method improves the packet delivery ratio in the network by about 70%. Performance analysis of the TARA method provided recommendations for its application in a particular ad hoc network. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

10 pages, 667 KiB  
Article
Global Contextual Dependency Network for Object Detection
by Junda Li, Chunxu Zhang and Bo Yang
Future Internet 2022, 14(1), 27; https://doi.org/10.3390/fi14010027 - 13 Jan 2022
Cited by 1 | Viewed by 2400
Abstract
Current two-stage object detectors extract the local visual features of Regions of Interest (RoIs) for object recognition and bounding-box regression. However, only using local visual features will lose global contextual dependencies, which are helpful to recognize objects with featureless appearances and restrain false [...] Read more.
Current two-stage object detectors extract the local visual features of Regions of Interest (RoIs) for object recognition and bounding-box regression. However, only using local visual features will lose global contextual dependencies, which are helpful to recognize objects with featureless appearances and restrain false detections. To tackle the problem, a simple framework, named Global Contextual Dependency Network (GCDN), is presented to enhance the classification ability of two-stage detectors. Our GCDN mainly consists of two components, Context Representation Module (CRM) and Context Dependency Module (CDM). Specifically, a CRM is proposed to construct multi-scale context representations. With CRM, contextual information can be fully explored at different scales. Moreover, the CDM is designed to capture global contextual dependencies. Our GCDN includes multiple CDMs. Each CDM utilizes local Region of Interest (RoI) features and single-scale context representation to generate single-scale contextual RoI features via the attention mechanism. Finally, the contextual RoI features generated by parallel CDMs independently are combined with the original RoI features to help classification. Experiments on MS-COCO 2017 benchmark dataset show that our approach brings continuous improvements for two-stage detectors. Full article
(This article belongs to the Special Issue Knowledge Graph Mining and Its Applications)
Show Figures

Figure 1

19 pages, 2662 KiB  
Article
A Semantic Preprocessing Framework for Breaking News Detection to Support Future Drone Journalism Services
by Michail Niarchos, Marina Eirini Stamatiadou, Charalampos Dimoulas, Andreas Veglis and Andreas Symeonidis
Future Internet 2022, 14(1), 26; https://doi.org/10.3390/fi14010026 - 10 Jan 2022
Cited by 4 | Viewed by 3089
Abstract
Nowadays, news coverage implies the existence of video footage and sound, from which arises the need for fast reflexes by media organizations. Social media and mobile journalists assist in fulfilling this requirement, but quick on-site presence is not always feasible. In the past [...] Read more.
Nowadays, news coverage implies the existence of video footage and sound, from which arises the need for fast reflexes by media organizations. Social media and mobile journalists assist in fulfilling this requirement, but quick on-site presence is not always feasible. In the past few years, Unmanned Aerial Vehicles (UAVs), and specifically drones, have evolved to accessible recreational and business tools. Drones could help journalists and news organizations capture and share breaking news stories. Media corporations and individual professionals are waiting for the appropriate flight regulation and data handling framework to enable their usage to become widespread. Drone journalism services upgrade the usage of drones in day-to-day news reporting operations, offering multiple benefits. This paper proposes a system for operating an individual drone or a set of drones, aiming to mediate real-time breaking news coverage. Apart from the definition of the system requirements and the architecture design of the whole system, the current work focuses on data retrieval and the semantics preprocessing framework that will be the basis of the final implementation. The ultimate goal of this project is to implement a whole system that will utilize data retrieved from news media organizations, social media, and mobile journalists to provide alerts, geolocation inference, and flight planning. Full article
(This article belongs to the Special Issue Theory and Applications of Web 3.0 in the Media Sector)
Show Figures

Figure 1

21 pages, 1532 KiB  
Article
Mobility in Unsupervised Word Embeddings for Knowledge Extraction—The Scholars’ Trajectories across Research Topics
by Gianfranco Lombardo, Michele Tomaiuolo, Monica Mordonini, Gaia Codeluppi and Agostino Poggi
Future Internet 2022, 14(1), 25; https://doi.org/10.3390/fi14010025 - 9 Jan 2022
Cited by 3 | Viewed by 2819
Abstract
In the knowledge discovery field of the Big Data domain the analysis of geographic positioning and mobility information plays a key role. At the same time, in the Natural Language Processing (NLP) domain pre-trained models such as BERT and word embedding algorithms such [...] Read more.
In the knowledge discovery field of the Big Data domain the analysis of geographic positioning and mobility information plays a key role. At the same time, in the Natural Language Processing (NLP) domain pre-trained models such as BERT and word embedding algorithms such as Word2Vec enabled a rich encoding of words that allows mapping textual data into points of an arbitrary multi-dimensional space, in which the notion of proximity reflects an association among terms or topics. The main contribution of this paper is to show how analytical tools, traditionally adopted to deal with geographic data to measure the mobility of an agent in a time interval, can also be effectively applied to extract knowledge in a semantic realm, such as a semantic space of words and topics, looking for latent trajectories that can benefit the properties of neural network latent representations. As a case study, the Scopus database was queried about works of highly cited researchers in recent years. On this basis, we performed a dynamic analysis, for measuring the Radius of Gyration as an index of the mobility of researchers across scientific topics. The semantic space is built from the automatic analysis of the paper abstracts of each author. In particular, we evaluated two different methodologies to build the semantic space and we found that Word2Vec embeddings perform better than the BERT ones for this task. Finally, The scholars’ trajectories show some latent properties of this model, which also represent new scientific contributions of this work. These properties include (i) the correlation between the scientific mobility and the achievement of scientific results, measured through the H-index; (ii) differences in the behavior of researchers working in different countries and subjects; and (iii) some interesting similarities between mobility patterns in this semantic realm and those typically observed in the case of human mobility. Full article
(This article belongs to the Special Issue Big Data Analytics, Privacy and Visualization)
Show Figures

Figure 1

12 pages, 2318 KiB  
Article
CacheHawkeye: Detecting Cache Side Channel Attacks Based on Memory Events
by Hui Yan and Chaoyuan Cui
Future Internet 2022, 14(1), 24; https://doi.org/10.3390/fi14010024 - 8 Jan 2022
Viewed by 2730
Abstract
Cache side channel attacks, as a type of cryptanalysis, seriously threaten the security of the cryptosystem. These attacks continuously monitor the memory addresses associated with the victim’s secret information, which cause frequent memory access on these addresses. This paper proposes CacheHawkeye, which [...] Read more.
Cache side channel attacks, as a type of cryptanalysis, seriously threaten the security of the cryptosystem. These attacks continuously monitor the memory addresses associated with the victim’s secret information, which cause frequent memory access on these addresses. This paper proposes CacheHawkeye, which uses the frequent memory access characteristic of the attacker to detect attacks. CacheHawkeye monitors memory events by CPU hardware performance counters. We proved the effectiveness of CacheHawkeye on Flush+Reload and Flush+Flush attacks. In addition, we evaluated the accuracy of CacheHawkeye under different system loads. Experiments demonstrate that CacheHawkeye not only has good accuracy but can also adapt to various system loads. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

18 pages, 930 KiB  
Article
A Queueing-Based Model Performance Evaluation for Internet of People Supported by Fog Computing
by Laécio Rodrigues, Joel J. P. C. Rodrigues, Antonio de Barros Serra and Francisco Airton Silva
Future Internet 2022, 14(1), 23; https://doi.org/10.3390/fi14010023 - 8 Jan 2022
Cited by 8 | Viewed by 3270
Abstract
Following the Internet of Things (IoT) and the Internet of Space (IoS), we are now approaching IoP (Internet of People), or the Internet of Individuals, with the integration of chips inside people that link to other chips and the Internet. Low latency is [...] Read more.
Following the Internet of Things (IoT) and the Internet of Space (IoS), we are now approaching IoP (Internet of People), or the Internet of Individuals, with the integration of chips inside people that link to other chips and the Internet. Low latency is required in order to achieve great service quality in these ambient assisted living facilities. Failures, on the other hand, are not tolerated, and assessing the performance of such systems in a real-world setting is difficult. Analytical models may be used to examine these types of systems even in the early phases of design. The performance of aged care monitoring systems is evaluated using an M/M/c/K queuing network. The model enables resource capacity, communication, and service delays to be calibrated. The proposed model was shown to be capable of predicting the system’s MRT (mean response time) and calculating the quantity of resources required to satisfy certain user requirements. To analyze data from IoT solutions, the examined architecture incorporates cloud and fog resources. Different circumstances were analyzed as case studies, with four main characteristics taken into consideration. These case studies look into how cloud and fog resources differ. Simulations were also run to test various routing algorithms with the goal of improving performance metrics. As a result, our study can assist in the development of more sophisticated health monitoring systems without incurring additional costs. Full article
(This article belongs to the Special Issue Advances in High Performance Cloud Computing)
Show Figures

Figure 1

22 pages, 118274 KiB  
Article
S4 Features and Artificial Intelligence for Designing a Robot against COVID-19—Robocov
by Pedro Ponce, Omar Mata, Esteban Perez, Juan Roberto Lopez, Arturo Molina and Troy McDaniel
Future Internet 2022, 14(1), 22; https://doi.org/10.3390/fi14010022 - 6 Jan 2022
Cited by 9 | Viewed by 3472
Abstract
Since the COVID-19 Pandemic began, there have been several efforts to create new technology to mitigate the impact of the COVID-19 Pandemic around the world. One of those efforts is to design a new task force, robots, to deal with fundamental goals such [...] Read more.
Since the COVID-19 Pandemic began, there have been several efforts to create new technology to mitigate the impact of the COVID-19 Pandemic around the world. One of those efforts is to design a new task force, robots, to deal with fundamental goals such as public safety, clinical care, and continuity of work. However, those characteristics need new products based on features that create them more innovatively and creatively. Those products could be designed using the S4 concept (sensing, smart, sustainable, and social features) presented as a concept able to create a new generation of products. This paper presents a low-cost robot, Robocov, designed as a rapid response against the COVID-19 Pandemic at Tecnologico de Monterrey, Mexico, with implementations of artificial intelligence and the S4 concept for the design. Robocov can achieve numerous tasks using the S4 concept that provides flexibility in hardware and software. Thus, Robocov can impact positivity public safety, clinical care, continuity of work, quality of life, laboratory and supply chain automation, and non-hospital care. The mechanical structure and software development allow Robocov to complete support tasks effectively so Robocov can be integrated as a technological tool for achieving the new normality’s required conditions according to government regulations. Besides, the reconfiguration of the robot for moving from one task (robot for disinfecting) to another one (robot for detecting face masks) is an easy endeavor that only one operator could do. Robocov is a teleoperated system that transmits information by cameras and an ultrasonic sensor to the operator. In addition, pre-recorded paths can be executed autonomously. In terms of communication channels, Robocov includes a speaker and microphone. Moreover, a machine learning algorithm for detecting face masks and social distance is incorporated using a pre-trained model for the classification process. One of the most important contributions of this paper is to show how a reconfigurable robot can be designed under the S3 concept and integrate AI methodologies. Besides, it is important that this paper does not show specific details about each subsystem in the robot. Full article
(This article belongs to the Special Issue Smart Objects and Technologies for Social Good)
Show Figures

Figure 1

14 pages, 18811 KiB  
Article
SMYOLO: Lightweight Pedestrian Target Detection Algorithm in Low-Altitude Scenarios
by Weiwei Zhang, Xin Ma, Yuzhao Zhang, Ming Ji and Chenghui Zhen
Future Internet 2022, 14(1), 21; https://doi.org/10.3390/fi14010021 - 4 Jan 2022
Cited by 3 | Viewed by 2282
Abstract
Due to the arbitrariness of the drone’s shooting angle of view and camera movement and the limited computing power of the drone platform, pedestrian detection in the drone scene poses a greater challenge. This paper proposes a new convolutional neural network structure, SMYOLO, [...] Read more.
Due to the arbitrariness of the drone’s shooting angle of view and camera movement and the limited computing power of the drone platform, pedestrian detection in the drone scene poses a greater challenge. This paper proposes a new convolutional neural network structure, SMYOLO, which achieves the balance of accuracy and speed from three aspects: (1) By combining deep separable convolution and point convolution and replacing the activation function, the calculation amount and parameters of the original network are reduced; (2) by adding a batch normalization (BN) layer, SMYOLO accelerates the convergence and improves the generalization ability; and (3) through scale matching, reduces the feature loss of the original network. Compared with the original network model, SMYOLO reduces the accuracy of the model by only 4.36%, the model size is reduced by 76.90%, the inference speed is increased by 43.29%, and the detection target is accelerated by 33.33%, achieving minimization of the network model volume while ensuring the detection accuracy of the model. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

19 pages, 4437 KiB  
Article
Utilizing Half Convolutional Autoencoder to Generate User and Item Vectors for Initialization in Matrix Factorization
by Tan Nghia Duong, Nguyen Nam Doan, Truong Giang Do, Manh Hoang Tran, Duc Minh Nguyen and Quang Hieu Dang
Future Internet 2022, 14(1), 20; https://doi.org/10.3390/fi14010020 - 4 Jan 2022
Cited by 10 | Viewed by 2934
Abstract
Recommendation systems based on convolutional neural network (CNN) have attracted great attention due to their effectiveness in processing unstructured data such as images or audio. However, a huge amount of raw data produced by data crawling and digital transformation is structured, which makes [...] Read more.
Recommendation systems based on convolutional neural network (CNN) have attracted great attention due to their effectiveness in processing unstructured data such as images or audio. However, a huge amount of raw data produced by data crawling and digital transformation is structured, which makes it difficult to utilize the advantages of CNN. This paper introduces a novel autoencoder, named Half Convolutional Autoencoder, which adopts convolutional layers to discover the high-order correlation between structured features in the form of Tag Genome, the side information associated with each movie in the MovieLens 20 M dataset, in order to generate a robust feature vector. Subsequently, these new movie representations, along with the introduction of users’ characteristics generated via Tag Genome and their past transactions, are applied into well-known matrix factorization models to resolve the initialization problem and enhance the predicting results. This method not only outperforms traditional matrix factorization techniques by at least 5.35% in terms of accuracy but also stabilizes the training process and guarantees faster convergence. Full article
(This article belongs to the Topic Big Data and Artificial Intelligence)
Show Figures

Figure 1

44 pages, 1990 KiB  
Review
A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues
by Zineddine Kouahla, Ala-Eddine Benrazek, Mohamed Amine Ferrag, Brahim Farou, Hamid Seridi, Muhammet Kurulay, Adeel Anjum and Alia Asheralieva
Future Internet 2022, 14(1), 19; https://doi.org/10.3390/fi14010019 - 31 Dec 2021
Cited by 5 | Viewed by 6589
Abstract
The past decade has been characterized by the growing volumes of data due to the widespread use of the Internet of Things (IoT) applications, which introduced many challenges for efficient data storage and management. Thus, the efficient indexing and searching of large data [...] Read more.
The past decade has been characterized by the growing volumes of data due to the widespread use of the Internet of Things (IoT) applications, which introduced many challenges for efficient data storage and management. Thus, the efficient indexing and searching of large data collections is a very topical and urgent issue. Such solutions can provide users with valuable information about IoT data. However, efficient retrieval and management of such information in terms of index size and search time require optimization of indexing schemes which is rather difficult to implement. The purpose of this paper is to examine and review existing indexing techniques for large-scale data. A taxonomy of indexing techniques is proposed to enable researchers to understand and select the techniques that will serve as a basis for designing a new indexing scheme. The real-world applications of the existing indexing techniques in different areas, such as health, business, scientific experiments, and social networks, are presented. Open problems and research challenges, e.g., privacy and large-scale data mining, are also discussed. Full article
Show Figures

Figure 1

19 pages, 20268 KiB  
Article
An In-Network Cooperative Storage Schema Based on Neighbor Offloading in a Programmable Data Plane
by Shoujiang Dang and Rui Han
Future Internet 2022, 14(1), 18; https://doi.org/10.3390/fi14010018 - 30 Dec 2021
Cited by 5 | Viewed by 2724
Abstract
In scientific domains such as high-energy particle physics and genomics, the quantity of high-speed data traffic generated may far exceed the storage throughput and be unable to be in time stored in the current node. Cooperating and utilizing multiple storage nodes on the [...] Read more.
In scientific domains such as high-energy particle physics and genomics, the quantity of high-speed data traffic generated may far exceed the storage throughput and be unable to be in time stored in the current node. Cooperating and utilizing multiple storage nodes on the forwarding path provides an opportunity for high-speed data storage. This paper proposes the use of flow entries to dynamically split traffic among selected neighbor nodes to sequentially amortize excess traffic. We propose a neighbor selection mechanism based on the Local Name Mapping and Resolution System, in which the node weights are computed by combing the link bandwidth and node storage capability, and determining whether to split traffic by comparing normalized weight values with thresholds. To dynamically offload traffic among multiple targets, the cooperative storage strategy implemented in a programmable data plane is presented using the relative weights and ID suffix matching. Evaluation shows that our proposed schema is more efficient compared with end-to-end transmission and ECMP in terms of bandwidth usage and transfer time, and is beneficial in big science. Full article
(This article belongs to the Special Issue Recent Advances in Information-Centric Networks (ICNs))
Show Figures

Figure 1

9 pages, 2235 KiB  
Article
The Important Role of Global State for Multi-Agent Reinforcement Learning
by Shuailong Li, Wei Zhang, Yuquan Leng and Xiaohui Wang
Future Internet 2022, 14(1), 17; https://doi.org/10.3390/fi14010017 - 30 Dec 2021
Cited by 1 | Viewed by 2152
Abstract
Environmental information plays an important role in deep reinforcement learning (DRL). However, many algorithms do not pay much attention to environmental information. In multi-agent reinforcement learning decision-making, because agents need to make decisions combined with the information of other agents in the environment, [...] Read more.
Environmental information plays an important role in deep reinforcement learning (DRL). However, many algorithms do not pay much attention to environmental information. In multi-agent reinforcement learning decision-making, because agents need to make decisions combined with the information of other agents in the environment, this makes the environmental information more important. To prove the importance of environmental information, we added environmental information to the algorithm. We evaluated many algorithms on a challenging set of StarCraft II micromanagement tasks. Compared with the original algorithm, the standard deviation (except for the VDN algorithm) was smaller than that of the original algorithm, which shows that our algorithm has better stability. The average score of our algorithm was higher than that of the original algorithm (except for VDN and COMA), which shows that our work significantly outperforms existing multi-agent RL methods. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

12 pages, 303 KiB  
Article
Improved Classification of Blockchain Transactions Using Feature Engineering and Ensemble Learning
by Chandrashekar Jatoth, Rishabh Jain, Ugo Fiore and Subrahmanyam Chatharasupalli
Future Internet 2022, 14(1), 16; https://doi.org/10.3390/fi14010016 - 28 Dec 2021
Cited by 4 | Viewed by 3434
Abstract
Although the blockchain technology is gaining a widespread adoption across multiple sectors, its most popular application is in cryptocurrency. The decentralized and anonymous nature of transactions in a cryptocurrency blockchain has attracted a multitude of participants, and now significant amounts of money are [...] Read more.
Although the blockchain technology is gaining a widespread adoption across multiple sectors, its most popular application is in cryptocurrency. The decentralized and anonymous nature of transactions in a cryptocurrency blockchain has attracted a multitude of participants, and now significant amounts of money are being exchanged by the day. This raises the need of analyzing the blockchain to discover information related to the nature of participants in transactions. This study focuses on the identification for risky and non-risky blocks in a blockchain. In this paper, the proposed approach is to use ensemble learning with or without feature selection using correlation-based feature selection. Ensemble learning yielded good results in the experiments, but class-wise analysis reveals that ensemble learning with feature selection improves even further. After training Machine Learning classifiers on the dataset, we observe an improvement in accuracy of 2–3% and in F-score of 7–8%. Full article
Show Figures

Figure 1

14 pages, 4172 KiB  
Article
Key Points’ Location in Infrared Images of the Human Body Based on Mscf-ResNet
by Shengguo Ge and Siti Nurulain Mohd Rum
Future Internet 2022, 14(1), 15; https://doi.org/10.3390/fi14010015 - 27 Dec 2021
Cited by 3 | Viewed by 3548
Abstract
The human body generates infrared radiation through the thermal movement of molecules. Based on this phenomenon, infrared images of the human body are often used for monitoring and tracking. Among them, key point location on infrared images of the human body is an [...] Read more.
The human body generates infrared radiation through the thermal movement of molecules. Based on this phenomenon, infrared images of the human body are often used for monitoring and tracking. Among them, key point location on infrared images of the human body is an important technology in medical infrared image processing. However, the fuzzy edges, poor detail resolution, and uneven brightness distribution of the infrared image of the human body cause great difficulties in positioning. Therefore, how to improve the positioning accuracy of key points in human infrared images has become the main research direction. In this study, a multi-scale convolution fusion deep residual network (Mscf-ResNet) model is proposed for human body infrared image positioning. This model is based on the traditional ResNet, changing the single-scale convolution to multi-scale and fusing the information of different receptive fields, so that the extracted features are more abundant and the degradation problem, caused by the excessively deep network, is avoided. The experiments show that our proposed method has higher key point positioning accuracy than other methods. At the same time, because the network structure of this paper is too deep, there are too many parameters and a large volume of calculations. Therefore, a more lightweight network model is the direction of future research. Full article
Show Figures

Figure 1

34 pages, 904 KiB  
Review
The Car-Following Model and Its Applications in the V2X Environment: A Historical Review
by Junyan Han, Huili Shi, Longfei Chen, Hao Li and Xiaoyuan Wang
Future Internet 2022, 14(1), 14; https://doi.org/10.3390/fi14010014 - 27 Dec 2021
Cited by 17 | Viewed by 3826
Abstract
The application of vehicle-to-everything (V2X) technology has resulted in the traffic environment being different from how it was in the past. In the V2X environment, the information perception ability of the driver–vehicle unit is greatly enhanced. With V2X technology, the driver–vehicle unit can [...] Read more.
The application of vehicle-to-everything (V2X) technology has resulted in the traffic environment being different from how it was in the past. In the V2X environment, the information perception ability of the driver–vehicle unit is greatly enhanced. With V2X technology, the driver–vehicle unit can obtain a massive amount of traffic information and is able to form a connection and interaction relationship between multiple vehicles and themselves. In the traditional car-following models, only the dual-vehicle interaction relationship between the object vehicle and its preceding vehicle was considered, making these models unable to be employed to describe the car-following behavior in the V2X environment. As one of the core components of traffic flow theory, research on car-following behavior needs to be further developed. First, the development process of the traditional car-following models is briefly reviewed. Second, previous research on the impacts of V2X technology, car-following models in the V2X environment, and the applications of these models, such as the calibration of the model parameters, the analysis of traffic flow characteristics, and the methods that are used to estimate a vehicle’s energy consumption and emissions, are comprehensively reviewed. Finally, the achievements and shortcomings of these studies along with trends that require further exploration are discussed. The results that were determined here can provide a reference for the further development of traffic flow theory, personalized advanced driving assistance systems, and anthropopathic autonomous-driving vehicles. Full article
(This article belongs to the Special Issue Future Intelligent Vehicular Networks toward 6G)
Show Figures

Figure 1

19 pages, 1391 KiB  
Article
DD-FoG: Intelligent Distributed Dynamic FoG Computing Framework
by Volkov Artem, Kovalenko Vadim, Ibrahim A. Elgendy, Ammar Muthanna and Andrey Koucheryavy
Future Internet 2022, 14(1), 13; https://doi.org/10.3390/fi14010013 - 27 Dec 2021
Cited by 1 | Viewed by 2837
Abstract
Nowadays, 5G networks are emerged and designed to integrate all the achievements of mobile and fixed communication networks, in which it can provide ultra-high data speeds and enable a broad range of new services with new cloud computing structures such as fog and [...] Read more.
Nowadays, 5G networks are emerged and designed to integrate all the achievements of mobile and fixed communication networks, in which it can provide ultra-high data speeds and enable a broad range of new services with new cloud computing structures such as fog and edge. In spite of this, the complex nature of the system, especially with the varying network conditions, variety of possible mechanisms, hardware, and protocols, makes communication between these technologies challenging. To this end, in this paper, we proposed a new distributed and fog (DD-fog) framework for software development, in which fog and mobile edge computing (MEC) technologies and microservices approach are jointly considered. More specifically, based on the computational and network capabilities, this framework provides a microservices migration between fog structures and elements, in which user query statistics in each of the fog structures are considered. In addition, a new modern solution was proposed for IoT-based application development and deployment, which provides new time constraint services like a tactile internet, autonomous vehicles, etc. Moreover, to maintain quality service delivery services, two different algorithms have been developed to pick load points in the search mechanism for congestion of users and find the fog migration node. Finally, simulation results proved that the proposed framework could reduce the execution time of the microservice function by up to 70% by deploying the rational allocation of resources reasonably. Full article
(This article belongs to the Special Issue Multi-Clouds and Edge Computing)
Show Figures

Figure 1

29 pages, 3667 KiB  
Article
Three Layered Architecture for Driver Behavior Analysis and Personalized Assistance with Alert Message Dissemination in 5G Envisioned Fog-IoCV
by Mazen Alowish, Yoshiaki Shiraishi, Masami Mohri and Masakatu Morii
Future Internet 2022, 14(1), 12; https://doi.org/10.3390/fi14010012 - 27 Dec 2021
Cited by 1 | Viewed by 2980
Abstract
The Internet of connected vehicles (IoCV) has made people more comfortable and safer while driving vehicles. This technology has made it possible to reduce road casualties; however, increased traffic and uncertainties in environments seem to be limitations to improving the safety of environments. [...] Read more.
The Internet of connected vehicles (IoCV) has made people more comfortable and safer while driving vehicles. This technology has made it possible to reduce road casualties; however, increased traffic and uncertainties in environments seem to be limitations to improving the safety of environments. In this paper, driver behavior is analyzed to provide personalized assistance and to alert surrounding vehicles in case of emergencies. The processes involved in this research are as follows. (i) Initially, the vehicles in an environment are clustered to reduce the complexity in analyzing a large number of vehicles. Multi-criterion-based hierarchical correlation clustering (MCB-HCC) is performed to dynamically cluster vehicles. Vehicular motion is detected by edge-assisted road side units (E-RSUs) by using an attention-based residual neural network (AttResNet). (ii) Driver behavior is analyzed based on the physiological parameters of drivers, vehicle on-board parameters, and environmental parameters, and driver behavior is classified into different classes by implementing a refined asynchronous advantage actor critic (RA3C) algorithm for assistance generation. (iii) If the driver’s current state is found to be an emergency state, an alert message is disseminated to the surrounding vehicles in that area and to the neighboring areas based on traffic flow by using jelly fish search optimization (JSO). If a neighboring area does not have a fog node, a virtual fog node is deployed by executing a constraint-based quantum entropy function to disseminate alert messages at ultra-low latency. (iv) Personalized assistance is provided to the driver based on behavior analysis to assist the driver by using a multi-attribute utility model, thereby preventing road accidents. The proposed driver behavior analysis and personalized assistance model are experimented on with the Network Simulator 3.26 tool, and performance was evaluated in terms of prediction error, number of alerts, number of risk maneuvers, accuracy, latency, energy consumption, false alarm rate, safety score, and alert-message dissemination efficiency. Full article
(This article belongs to the Special Issue Advances on Cloud Computing and Internet of Things)
Show Figures

Figure 1

27 pages, 379 KiB  
Review
Security and Privacy in Cloud Computing: Technical Review
by Yunusa Simpa Abdulsalam and Mustapha Hedabou
Future Internet 2022, 14(1), 11; https://doi.org/10.3390/fi14010011 - 27 Dec 2021
Cited by 38 | Viewed by 21508
Abstract
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model. However, outsourcing [...] Read more.
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model. However, outsourcing information and business applications to the cloud or a third party raises security and privacy concerns, which have become critical in adopting cloud implementation and services. Researchers and affected organisations have proposed different security approaches in the literature to tackle the present security flaws. The literature also provides an extensive review of security and privacy issues in cloud computing. Unfortunately, the works provided in the literature lack the flexibility in mitigating multiple threats without conflicting with cloud security objectives. The literature has further focused on only highlighting security and privacy issues without providing adequate technical approaches to mitigate such security and privacy threats. Conversely, studies that offer technical solutions to security threats have failed to explain how such security threats exist. This paper aims to introduce security and privacy issues that demand an adaptive solution approach without conflicting with existing or future cloud security. This paper reviews different works in the literature, taking into account its adaptiveness in mitigating against future reoccurring threats and showing how cloud security conflicts have invalidated their proposed models. The article further presents the security threats surrounding cloud computing from a user perspective using the STRIDE approach. Additionally, it provides an analysis of different inefficient solutions in the literature and offers recommendations in terms of implementing a secure, adaptive cloud environment. Full article
(This article belongs to the Section Network Virtualization and Edge/Fog Computing)
12 pages, 2773 KiB  
Article
Real-Time Nanoscopic Rider Safety System for Smart and Green Mobility Based upon Varied Infrastructure Parameters
by Faheem Ahmed Malik, Laurent Dala and Krishna Busawon
Future Internet 2022, 14(1), 9; https://doi.org/10.3390/fi14010009 - 25 Dec 2021
Viewed by 2819
Abstract
To create a safe bicycle infrastructure system, this article develops an intelligent embedded learning system using a combination of deep neural networks. The learning system is used as a case study in the Northumbria region in England’s northeast. It is made up of [...] Read more.
To create a safe bicycle infrastructure system, this article develops an intelligent embedded learning system using a combination of deep neural networks. The learning system is used as a case study in the Northumbria region in England’s northeast. It is made up of three components: (a) input data unit, (b) knowledge processing unit, and (c) output unit. It is demonstrated that various infrastructure characteristics influence bikers’ safe interactions, which is used to estimate the riskiest age and gender rider groups. Two accurate prediction models are built, with a male accuracy of 88 per cent and a female accuracy of 95 per cent. The findings concluded that different infrastructures pose varying levels of risk to users of different ages and genders. Certain aspects of the infrastructure are hazardous to all bikers. However, the cyclist’s characteristics determine the level of risk that any infrastructure feature presents. Following validation, the built learning system is interoperable under various scenarios, including current heterogeneous and future semi-autonomous and autonomous transportation systems. The results contribute towards understanding the risk variation of various infrastructure types. The study’s findings will help to improve safety and lead to the construction of a sustainable integrated cycling transportation system. Full article
(This article belongs to the Special Issue Deep Neural Networks on Reconfigurable Embedded Systems)
Show Figures

Figure 1

15 pages, 661 KiB  
Article
Dis-Cover AI Minds to Preserve Human Knowledge
by Leonardo Ranaldi, Francesca Fallucchi and Fabio Massimo Zanzotto
Future Internet 2022, 14(1), 10; https://doi.org/10.3390/fi14010010 - 24 Dec 2021
Cited by 18 | Viewed by 2976
Abstract
Modern AI technologies make use of statistical learners that lead to self-empiricist logic, which, unlike human minds, use learned non-symbolic representations. Nevertheless, it seems that it is not the right way to progress in AI. The structure of symbols—the operations by which the [...] Read more.
Modern AI technologies make use of statistical learners that lead to self-empiricist logic, which, unlike human minds, use learned non-symbolic representations. Nevertheless, it seems that it is not the right way to progress in AI. The structure of symbols—the operations by which the intellectual solution is realized—and the search for strategic reference points evoke important issues in the analysis of AI. Studying how knowledge can be represented through methods of theoretical generalization and empirical observation is only the latest step in a long process of evolution. For many years, humans, seeing language as innate, have carried out symbolic theories. Everything seems to have skipped ahead with the advent of Machine Learning. In this paper, after a long analysis of history, the rule-based and the learning-based vision, we would investigate the syntax as possible meeting point between the different learning theories. Finally, we propose a new vision of knowledge in AI models based on a combination of rules, learning, and human knowledge. Full article
(This article belongs to the Special Issue Computational Social Science and Natural Language Processing (NLP))
Show Figures

Figure 1

17 pages, 3091 KiB  
Article
The Impact of a Number of Samples on Unsupervised Feature Extraction, Based on Deep Learning for Detection Defects in Printed Circuit Boards
by Ihar Volkau, Abdul Mujeeb, Wenting Dai, Marius Erdt and Alexei Sourin
Future Internet 2022, 14(1), 8; https://doi.org/10.3390/fi14010008 - 23 Dec 2021
Cited by 6 | Viewed by 2753
Abstract
Deep learning provides new ways for defect detection in automatic optical inspections (AOI). However, the existing deep learning methods require thousands of images of defects to be used for training the algorithms. It limits the usability of these approaches in manufacturing, due to [...] Read more.
Deep learning provides new ways for defect detection in automatic optical inspections (AOI). However, the existing deep learning methods require thousands of images of defects to be used for training the algorithms. It limits the usability of these approaches in manufacturing, due to lack of images of defects before the actual manufacturing starts. In contrast, we propose to train a defect detection unsupervised deep learning model, using a much smaller number of images without defects. We propose an unsupervised deep learning model, based on transfer learning, that extracts typical semantic patterns from defect-free samples (one-class training). The model is built upon a pre-trained VGG16 model. It is further trained on custom datasets with different sizes of possible defects (printed circuit boards and soldered joints) using only small number of normal samples. We have found that the defect detection can be performed very well on a smooth background; however, in cases where the defect manifests as a change of texture, the detection can be less accurate. The proposed study uses deep learning self-supervised approach to identify if the sample under analysis contains any deviations (with types not defined in advance) from normal design. The method would improve the robustness of the AOI process to detect defects. Full article
Show Figures

Figure 1

19 pages, 4494 KiB  
Article
No Perfect Outdoors: Towards a Deep Profiling of GNSS-Based Location Contexts
by Jin Wang and Jun Luo
Future Internet 2022, 14(1), 7; https://doi.org/10.3390/fi14010007 - 23 Dec 2021
Cited by 1 | Viewed by 2285
Abstract
While both outdoor and indoor localization methods are flourishing, how to properly marry them to offer pervasive localizability in urban areas remains open. Recently, proposals on indoor–outdoor detection have made the first step towards such an integration, yet complicated urban environments render such [...] Read more.
While both outdoor and indoor localization methods are flourishing, how to properly marry them to offer pervasive localizability in urban areas remains open. Recently, proposals on indoor–outdoor detection have made the first step towards such an integration, yet complicated urban environments render such a binary classification incompetent. Fortunately, the latest developments in Android have granted us access to raw GNSS measurements, which contain far more information than commonly derived GPS location indicators. In this paper, we explore these newly available measurements in order to better characterize diversified urban environments. Essentially, we tackle the challenges introduced by the complex GNSS data and apply a deep learning model to identify representations for respective location contexts. We further develop two preliminary applications of our deep profiling: one, we offer a more fine-grained semantic classification than binary indoor–outdoor detection; and two, we derive a GPS error indicator that is more meaningful than that provided by Google Maps. These results are all corroborated by our extensive data collection and trace-driven evaluations. Full article
(This article belongs to the Special Issue Wireless Technology for Indoor Localization System)
Show Figures

Figure 1

17 pages, 399 KiB  
Article
An Automated Behaviour-Based Clustering of IoT Botnets
by Tolijan Trajanovski and Ning Zhang
Future Internet 2022, 14(1), 6; https://doi.org/10.3390/fi14010006 - 23 Dec 2021
Cited by 4 | Viewed by 2737
Abstract
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet variants, some of which are equipped with new capabilities and may be difficult to detect. Despite the availability of solutions for automated analysis of IoT botnet samples, the identification of [...] Read more.
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet variants, some of which are equipped with new capabilities and may be difficult to detect. Despite the availability of solutions for automated analysis of IoT botnet samples, the identification of new variants is still very challenging because the analysis results must be manually interpreted by malware analysts. To overcome this challenge, we propose an approach for automated behaviour-based clustering of IoT botnet samples, aimed to enable automatic identification of IoT botnet variants equipped with new capabilities. In the proposed approach, the behaviour of the IoT botnet samples is captured using a sandbox and represented as behaviour profiles describing the actions performed by the samples. The behaviour profiles are vectorised using TF-IDF and clustered using the DBSCAN algorithm. The proposed approach was evaluated using a collection of samples captured from IoT botnets propagating on the Internet. The evaluation shows that the proposed approach enables accurate automatic identification of IoT botnet variants equipped with new capabilities, which will help security researchers to investigate the new capabilities, and to apply the investigation findings for improving the solutions for detecting and preventing IoT botnet infections. Full article
(This article belongs to the Special Issue Data Science for Cyber Security)
Show Figures

Graphical abstract

18 pages, 9677 KiB  
Article
Your Face Mirrors Your Deepest Beliefs—Predicting Personality and Morals through Facial Emotion Recognition
by Peter A. Gloor, Andrea Fronzetti Colladon, Erkin Altuntas, Cengiz Cetinkaya, Maximilian F. Kaiser, Lukas Ripperger and Tim Schaefer
Future Internet 2022, 14(1), 5; https://doi.org/10.3390/fi14010005 - 22 Dec 2021
Cited by 7 | Viewed by 4946
Abstract
Can we really “read the mind in the eyes”? Moreover, can AI assist us in this task? This paper answers these two questions by introducing a machine learning system that predicts personality characteristics of individuals on the basis of their face. It does [...] Read more.
Can we really “read the mind in the eyes”? Moreover, can AI assist us in this task? This paper answers these two questions by introducing a machine learning system that predicts personality characteristics of individuals on the basis of their face. It does so by tracking the emotional response of the individual’s face through facial emotion recognition (FER) while watching a series of 15 short videos of different genres. To calibrate the system, we invited 85 people to watch the videos, while their emotional responses were analyzed through their facial expression. At the same time, these individuals also took four well-validated surveys of personality characteristics and moral values: the revised NEO FFI personality inventory, the Haidt moral foundations test, the Schwartz personal value system, and the domain-specific risk-taking scale (DOSPERT). We found that personality characteristics and moral values of an individual can be predicted through their emotional response to the videos as shown in their face, with an accuracy of up to 86% using gradient-boosted trees. We also found that different personality characteristics are better predicted by different videos, in other words, there is no single video that will provide accurate predictions for all personality characteristics, but it is the response to the mix of different videos that allows for accurate prediction. Full article
(This article belongs to the Collection Machine Learning Approaches for User Identity)
Show Figures

Figure 1

24 pages, 1470 KiB  
Article
Authorship Attribution of Social Media and Literary Russian-Language Texts Using Machine Learning Methods and Feature Selection
by Anastasia Fedotova, Aleksandr Romanov, Anna Kurtukova and Alexander Shelupanov
Future Internet 2022, 14(1), 4; https://doi.org/10.3390/fi14010004 - 22 Dec 2021
Cited by 8 | Viewed by 4019
Abstract
Authorship attribution is one of the important fields of natural language processing (NLP). Its popularity is due to the relevance of implementing solutions for information security, as well as copyright protection, various linguistic studies, in particular, researches of social networks. The article is [...] Read more.
Authorship attribution is one of the important fields of natural language processing (NLP). Its popularity is due to the relevance of implementing solutions for information security, as well as copyright protection, various linguistic studies, in particular, researches of social networks. The article is a continuation of the series of studies aimed at the identification of the Russian-language text’s author and reducing the required text volume. The focus of the study was aimed at the attribution of textual data created as a product of human online activity. The effectiveness of the models was evaluated on the two Russian-language datasets: literary texts and short comments from users of social networks. Classical machine learning (ML) algorithms, popular neural networks (NN) architectures, and their hybrids, including convolutional neural network (CNN), networks with long short-term memory (LSTM), Bidirectional Encoder Representations from Transformers (BERT), and fastText, that have not been used in previous studies, were applied to solve the problem. A particular experiment was devoted to the selection of informative features using genetic algorithms (GA) and evaluation of the classifier trained on the optimal feature space. Using fastText or a combination of support vector machine (SVM) with GA reduced the time costs by half in comparison with deep NNs with comparable accuracy. The average accuracy for literary texts was 80.4% using SVM combined with GA, 82.3% using deep NNs, and 82.1% using fastText. For social media comments, results were 66.3%, 73.2%, and 68.1%, respectively. Full article
(This article belongs to the Special Issue Computational Social Science and Natural Language Processing (NLP))
Show Figures

Figure 1

21 pages, 1215 KiB  
Article
Application of Machine Learning Techniques to Predict a Patient’s No-Show in the Healthcare Sector
by Luiz Henrique A. Salazar, Valderi R. Q. Leithardt, Wemerson Delcio Parreira, Anita M. da Rocha Fernandes, Jorge Luis Victória Barbosa and Sérgio Duarte Correia
Future Internet 2022, 14(1), 3; https://doi.org/10.3390/fi14010003 - 22 Dec 2021
Cited by 23 | Viewed by 4599
Abstract
The health sector faces a series of problems generated by patients who miss their scheduled appointments. The main challenge to this problem is to understand the patient’s profile and predict potential absences. The goal of this work is to explore the main causes [...] Read more.
The health sector faces a series of problems generated by patients who miss their scheduled appointments. The main challenge to this problem is to understand the patient’s profile and predict potential absences. The goal of this work is to explore the main causes that contribute to a patient’s no-show and develop a prediction model able to identify whether the patient will attend their scheduled appointment or not. The study was based on data from clinics that serve the Unified Health System (SUS) at the University of Vale do Itajaí in southern Brazil. The model obtained was tested on a real collected dataset with about 5000 samples. The best model result was performed by the Random Forest classifier. It had the best Recall Rate (0.91) and achieved an ROC curve rate of 0.969. This research was approved and authorized by the Ethics Committee of the University of Vale do Itajaí, under opinion 4270,234, contemplating the General Data Protection Law. Full article
(This article belongs to the Special Issue Smart Objects and Technologies for Social Good)
Show Figures

Figure 1

18 pages, 8194 KiB  
Article
Machine Learning-Based Lie Detector Applied to a Novel Annotated Game Dataset
by Nuria Rodriguez-Diaz, Decky Aspandi, Federico M. Sukno and Xavier Binefa
Future Internet 2022, 14(1), 2; https://doi.org/10.3390/fi14010002 - 21 Dec 2021
Cited by 3 | Viewed by 5615
Abstract
Lie detection is considered a concern for everyone in their day-to-day life, given its impact on human interactions. Thus, people normally pay attention to both what their interlocutors are saying and to their visual appearance, including the face, to find any signs that [...] Read more.
Lie detection is considered a concern for everyone in their day-to-day life, given its impact on human interactions. Thus, people normally pay attention to both what their interlocutors are saying and to their visual appearance, including the face, to find any signs that indicate whether or not the person is telling the truth. While automatic lie detection may help us to understand these lying characteristics, current systems are still fairly limited, partly due to lack of adequate datasets to evaluate their performance in realistic scenarios. In this work, we collect an annotated dataset of facial images, comprising both 2D and 3D information of several participants during a card game that encourages players to lie. Using our collected dataset, we evaluate several types of machine learning-based lie detectors in terms of their generalization, in person-specific and cross-application experiments. We first extract both handcrafted and deep learning-based features as relevant visual inputs, then pass them into multiple types of classifier to predict respective lie/non-lie labels. Subsequently, we use several metrics to judge the models’ accuracy based on the models predictions and ground truth. In our experiment, we show that models based on deep learning achieve the highest accuracy, reaching up to 57% for the generalization task and 63% when applied to detect the lie to a single participant. We further highlight the limitation of the deep learning-based lie detector when dealing with cross-application lie detection tasks. Finally, this analysis along the proposed datasets would potentially be useful not only from the perspective of computational systems perspective (e.g., improving current automatic lie prediction accuracy), but also for other relevant application fields, such as health practitioners in general medical counselings, education in academic settings or finance in the banking sector, where close inspections and understandings of the actual intentions of individuals can be very important. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

31 pages, 575 KiB  
Article
Query Processing in Blockchain Systems: Current State and Future Challenges
by Dennis Przytarski, Christoph Stach, Clémentine Gritti and Bernhard Mitschang
Future Internet 2022, 14(1), 1; https://doi.org/10.3390/fi14010001 - 21 Dec 2021
Cited by 17 | Viewed by 5426
Abstract
When, in 2008, Satoshi Nakamoto envisioned the first distributed database management system that relied on cryptographically secured chain of blocks to store data in an immutable and tamper-resistant manner, his primary use case was the introduction of a digital currency. Owing to this [...] Read more.
When, in 2008, Satoshi Nakamoto envisioned the first distributed database management system that relied on cryptographically secured chain of blocks to store data in an immutable and tamper-resistant manner, his primary use case was the introduction of a digital currency. Owing to this use case, the blockchain system was geared towards efficient storage of data, whereas the processing of complex queries, such as provenance analyses of data history, is out of focus. The increasing use of Internet of Things technologies and the resulting digitization in many domains, however, have led to a plethora of novel use cases for a secure digital ledger. For instance, in the healthcare sector, blockchain systems are used for the secure storage and sharing of electronic health records, while the food industry applies such systems to enable a reliable food-chain traceability, e.g., to prove compliance with cold chains. In these application domains, however, querying the current state is not sufficient—comprehensive history queries are required instead. Due to these altered usage modes involving more complex query types, it is questionable whether today’s blockchain systems are prepared for this type of usage and whether such queries can be processed efficiently by them. In our paper, we therefore investigate novel use cases for blockchain systems and elicit their requirements towards a data store in terms of query capabilities. We reflect the state of the art in terms of query support in blockchain systems and assess whether it is capable of meeting the requirements of such more sophisticated use cases. As a result, we identify future research challenges with regard to query processing in blockchain systems. Full article
(This article belongs to the Special Issue Security and Privacy in Blockchains and the IoT)
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop