Cloud Computing and Internet of Things

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (31 May 2019) | Viewed by 69757

Special Issue Editors


E-Mail Website1 Website2
Guest Editor
Department of Management, University of Tilburg, 5041 Tilburg, The Netherlands
Interests: business process integration; service-oriented architecture
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Departamento de Arquitectura de Computadores y Automática, Facultad de Informática, Universidad Complutense de Madrid, 28040 Madrid, Spain
Interests: cloud computing; grid computing; SLA; applications; high performance computing
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Nowadays cost efficient distributed sensing and actuation devices are driving new economically relevant application scenarios and the notion of internet of things. These heterogeneous devices connect and interact with the cloud for massive data storage and scalable computation.

This special issue, intends to put together efforts done in both cloud computing and internet of things with the aim of adding value to practical applications for any institutions. In this respect we welcome contributions that are willing to share technologies, policies or heuristic from either a theoretical or a practical point of view.

Future Internet solicits original, high impact research papers on all topics related to the combination of Cloud Computing and Internet of Things – topics of interest include, but are not limited to:

  • Cloud Computing
  • Internet of Things
  • Industry 4.0
  • Block-chain for Cloud computing and IoT
  • Architectures and Models
  • Integration and Collaborations
  • Network Protocols, Network Design and Architectures
  • Software systems
  • Data processing and management
  • Context-aware service provisioning
  • Security, trust and privacy
  • Fault tolerance and reliability
  • Performance evaluation and modelling
  • Policies, Business models and standard
  • Service Level Agreements

Dr. Francesco Lelli
Dr. José Luis Vazquez-Poletti
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Cloud Computing
  • Internet of Things
  • Industry 4.0
  • Block-chain for Cloud computing and IoT
  • Architectures and Models
  • Integration and Collaborations
  • Network Protocols, Network Design and Architectures
  • Software systems
  • Data processing and management
  • Context-aware service provisioning
  • Security, trust and privacy
  • Fault tolerance and reliability
  • Performance evaluation and modelling
  • Policies, Business models and standard
  • Service Level Agreements

Published Papers (6 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

22 pages, 602 KiB  
Article
Leveraging the Internet of Things and Blockchain Technology in Supply Chain Management
by Abderahman Rejeb, John G. Keogh and Horst Treiblmaier
Future Internet 2019, 11(7), 161; https://doi.org/10.3390/fi11070161 - 20 Jul 2019
Cited by 230 | Viewed by 32582
Abstract
Modern supply chains have evolved into highly complex value networks and turned into a vital source of competitive advantage. However, it has become increasingly challenging to verify the source of raw materials and maintain visibility of products and merchandise while they are moving [...] Read more.
Modern supply chains have evolved into highly complex value networks and turned into a vital source of competitive advantage. However, it has become increasingly challenging to verify the source of raw materials and maintain visibility of products and merchandise while they are moving through the value chain network. The application of the Internet of Things (IoT) can help companies to observe, track, and monitor products, activities, and processes within their respective value chain networks. Other applications of IoT include product monitoring to optimize operations in warehousing‚ manufacturing, and transportation. In combination with IoT, Blockchain technology can enable a broad range of different application scenarios to enhance value chain transparency and to increase B2B trust. When combined, IoT and Blockchain technology have the potential to increase the effectiveness and efficiency of modern supply chains. The contribution of this paper is twofold. First, we illustrate how the deployment of Blockchain technology in combination with IoT infrastructure can streamline and benefit modern supply chains and enhance value chain networks. Second, we derive six research propositions outlining how Blockchain technology can impact key features of the IoT (i.e., scalability, security, immutability and auditing, information flows, traceability and interoperability, quality) and thus lay the foundation for future research projects. Full article
(This article belongs to the Special Issue Cloud Computing and Internet of Things)
Show Figures

Figure 1

20 pages, 4471 KiB  
Article
A Sidecar Object for the Optimized Communication Between Edge and Cloud in Internet of Things Applications
by Stefano Busanelli, Simone Cirani, Lorenzo Melegari, Marco Picone, Mirco Rosa and Luca Veltri
Future Internet 2019, 11(7), 145; https://doi.org/10.3390/fi11070145 - 05 Jul 2019
Cited by 6 | Viewed by 4533
Abstract
The internet of things (IoT) is one of the most disrupting revolutions that is characterizing the technology ecosystem. In the near future, the IoT will have a significant impact on people’s lives and on the design and developments of new paradigms and architectures [...] Read more.
The internet of things (IoT) is one of the most disrupting revolutions that is characterizing the technology ecosystem. In the near future, the IoT will have a significant impact on people’s lives and on the design and developments of new paradigms and architectures coping with a completely new set of challenges and service categories. The IoT can be described as an ecosystem where a massive number of constrained devices (denoted as smart objects) will be deployed and connected to cooperate for multiple purposes, such a data collection, actuation, and interaction with people. In order to meet the specific requirements, IoT services may be deployed leveraging a hybrid architecture that will involve services deployed on the edge and the cloud. In this context, one of the challenges is to create an infrastructure of objects and microservices operating between both the edge and in the cloud that can be easily updated and extended with new features and functionalities without the need of updating or re-deploying smart objects. This work introduces a new concept for extending smart objects’ support for cloud services, denoted as a sidecar object. A sidecar object serves the purpose of being deployed as additional component of a preexisting object without interfering with the mechanisms and behaviors that have already been implemented. In particular, the sidecar object implementation developed in this work focuses on the communication with existing IoT cloud services (namely, AWS IoT and Google Cloud IoT) to provide a transparent and seamless synchronization of data, states, and commands between the object on the edge and the cloud. The proposed sidecar object implementation has been extensively evaluated through a detailed set of tests, in order to analyze the performances and behaviors in real- world scenarios. Full article
(This article belongs to the Special Issue Cloud Computing and Internet of Things)
Show Figures

Figure 1

27 pages, 35040 KiB  
Article
The Design and Deployment of an End-To-End IoT Infrastructure for the Natural Environment
by Vatsala Nundloll, Barry Porter, Gordon S. Blair, Bridget Emmett, Jack Cosby, Davey L. Jones, Dave Chadwick, Ben Winterbourn, Philip Beattie, Graham Dean, Rory Shaw, Wayne Shelley, Mike Brown and Izhar Ullah
Future Internet 2019, 11(6), 129; https://doi.org/10.3390/fi11060129 - 07 Jun 2019
Cited by 17 | Viewed by 5822
Abstract
Internet of Things (IoT) systems have seen recent growth in popularity for city and home environments. We report on the design, deployment, and use of the IoT infrastructure for environmental monitoring and management. Working closely with hydrologists, soil scientists, and animal behaviour scientists, [...] Read more.
Internet of Things (IoT) systems have seen recent growth in popularity for city and home environments. We report on the design, deployment, and use of the IoT infrastructure for environmental monitoring and management. Working closely with hydrologists, soil scientists, and animal behaviour scientists, we successfully deployed and utilised a system to deliver integrated information across these two fields in the first such example of real-time multidimensional environmental science. We describe the design of this system; its requirements and operational effectiveness for hydrological, soil, and ethological scientists; and our experiences from building, maintaining, and using the deployment at a remote site in difficult conditions. Based on this experience, we discuss key future work for the IoT community when working in these kinds of environmental deployments. Full article
(This article belongs to the Special Issue Cloud Computing and Internet of Things)
Show Figures

Figure 1

30 pages, 790 KiB  
Article
Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era
by Michele De Donno, Alberto Giaretta, Nicola Dragoni, Antonio Bucchiarone and Manuel Mazzara
Future Internet 2019, 11(6), 127; https://doi.org/10.3390/fi11060127 - 04 Jun 2019
Cited by 35 | Viewed by 8231
Abstract
The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data [...] Read more.
The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds. Full article
(This article belongs to the Special Issue Cloud Computing and Internet of Things)
Show Figures

Figure 1

15 pages, 1988 KiB  
Article
Novel Approach to Task Scheduling and Load Balancing Using the Dominant Sequence Clustering and Mean Shift Clustering Algorithms
by Amer Al-Rahayfeh, Saleh Atiewi, Abdullah Abuhussein and Muder Almiani
Future Internet 2019, 11(5), 109; https://doi.org/10.3390/fi11050109 - 08 May 2019
Cited by 30 | Viewed by 5073
Abstract
Cloud computing (CC) is fast-growing and frequently adopted in information technology (IT) environments due to the benefits it offers. Task scheduling and load balancing are amongst the hot topics in the realm of CC. To overcome the shortcomings of the existing task scheduling [...] Read more.
Cloud computing (CC) is fast-growing and frequently adopted in information technology (IT) environments due to the benefits it offers. Task scheduling and load balancing are amongst the hot topics in the realm of CC. To overcome the shortcomings of the existing task scheduling and load balancing approaches, we propose a novel approach that uses dominant sequence clustering (DSC) for task scheduling and a weighted least connection (WLC) algorithm for load balancing. First, users’ tasks are clustered using the DSC algorithm, which represents user tasks as graph of one or more clusters. After task clustering, each task is ranked using Modified Heterogeneous Earliest Finish Time (MHEFT) algorithm. where the highest priority task is scheduled first. Afterwards, virtual machines (VM) are clustered using a mean shift clustering (MSC) algorithm using kernel functions. Load balancing is subsequently performed using a WLC algorithm, which distributes the load based on server weight and capacity as well as client connectivity to server. A highly weighted or least connected server is selected for task allocation, which in turn increases the response time. Finally, we evaluate the proposed architecture using metrics such as response time, makespan, resource utilization, and service reliability. Full article
(This article belongs to the Special Issue Cloud Computing and Internet of Things)
Show Figures

Figure 1

Review

Jump to: Research

15 pages, 1331 KiB  
Review
Simulating Fog and Edge Computing Scenarios: An Overview and Research Challenges
by Sergej Svorobej, Patricia Takako Endo, Malika Bendechache, Christos Filelis-Papadopoulos, Konstantinos M. Giannoutakis, George A. Gravvanis, Dimitrios Tzovaras, James Byrne and Theo Lynn
Future Internet 2019, 11(3), 55; https://doi.org/10.3390/fi11030055 - 26 Feb 2019
Cited by 96 | Viewed by 11924
Abstract
The fourth industrial revolution heralds a paradigm shift in how people, processes, things, data and networks communicate and connect with each other. Conventional computing infrastructures are struggling to satisfy dramatic growth in demand from a deluge of connected heterogeneous end points located at [...] Read more.
The fourth industrial revolution heralds a paradigm shift in how people, processes, things, data and networks communicate and connect with each other. Conventional computing infrastructures are struggling to satisfy dramatic growth in demand from a deluge of connected heterogeneous end points located at the edge of networks while, at the same time, meeting quality of service levels. The complexity of computing at the edge makes it increasingly difficult for infrastructure providers to plan for and provision resources to meet this demand. While simulation frameworks are used extensively in the modelling of cloud computing environments in order to test and validate technical solutions, they are at a nascent stage of development and adoption for fog and edge computing. This paper provides an overview of challenges posed by fog and edge computing in relation to simulation. Full article
(This article belongs to the Special Issue Cloud Computing and Internet of Things)
Show Figures

Figure 1

Back to TopTop