From Mechatronics to the Cloud

Conventionally, the engineering design process has assumed that the design team is able to exercise control over all elements of the design, either directly or indirectly in the case of sub-systems through their specifications. The introduction of Cyber-Physical Systems (CPS) and the Internet of Things (IoT) means that a design team’s ability to have control over all elements of a system is no longer the case, particularly as the actual system configuration may well be being dynamically reconfigured in real-time according to user (and vendor) context and need. Additionally, the integration of the Internet of Things with elements of Big Data means that information becomes a commodity to be autonomously traded by and between systems, again according to context and need, all of which has implications for the privacy of system users. The paper therefore considers the relationship between mechatronics and cloud-based technologies in relation to issues such as the distribution of functionality and user privacy.

[1]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[2]  Arslan Munir,et al.  IFCIoT: Integrated Fog Cloud IoT: A novel architectural paradigm for the future Internet of Things. , 2017, IEEE Consumer Electronics Magazine.

[3]  Fabien Cardinaux,et al.  Developing a Systems and Informatics Based Approach to Lifestyle Monitoring within eHealth: Part I - Technology and Data Management , 2011, 2011 IEEE First International Conference on Healthcare Informatics, Imaging and Systems Biology.

[4]  Peter Hehenberger,et al.  Privacy Matters – Issues within Mechatronics , 2016 .

[5]  BottaAlessio,et al.  Integration of Cloud computing and Internet of Things , 2016 .

[6]  Saša Radomirović,et al.  Towards a Model for Security and Privacy in the Internet of Things , 2010 .

[7]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[8]  Noah J. Goodall,et al.  Can you program ethics into a self-driving car? , 2016, IEEE Spectrum.

[9]  Alexander Tuzhilin,et al.  Comparing context-aware recommender systems in terms of accuracy and diversity , 2012, User Modeling and User-Adapted Interaction.

[10]  Manus P. Henry,et al.  The self-validating sensor: rationale, definitions and examples , 1993 .

[11]  Xun Xu,et al.  From cloud computing to cloud manufacturing , 2012 .

[12]  Seth Flaxman,et al.  EU regulations on algorithmic decision-making and a "right to explanation" , 2016, ArXiv.

[13]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[14]  Mark E. Howard,et al.  When human beings are like drunk robots: Driverless vehicles, ethics, and the future of transport , 2017 .

[15]  S. N. Dorogovtsev,et al.  Evolution of networks , 2001, cond-mat/0106144.

[16]  Luciano Floridi,et al.  The Ethics of Cloud Computing , 2016, Sci. Eng. Ethics.

[17]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[18]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[19]  Ashraf Darwish,et al.  Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring , 2011, Sensors.

[20]  S. Landau Control use of data to protect privacy , 2015, Science.

[21]  Roger White,et al.  The Internet of Things – The future or the end of mechatronics , 2015 .

[22]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[23]  Iyad Rahwan,et al.  The social dilemma of autonomous vehicles , 2015, Science.

[24]  Arslan Munir,et al.  IFCIoT: Integrated Fog Cloud IoT Architectural Paradigm for Future Internet of Things , 2017, ArXiv.

[25]  Yu Yang,et al.  Study and application on the architecture and key technologies for IOT , 2011, 2011 International Conference on Multimedia Technology.

[26]  Amogh Dhamdhere,et al.  Twelve Years in the Evolution of the Internet Ecosystem , 2011, IEEE/ACM Transactions on Networking.

[27]  Corinne Rogers,et al.  Ethics in the Cloud , 2017 .

[28]  Alessandro Vespignani,et al.  Supplementary Materials for The Parable of Google Flu: Traps in Big Data Analysis , 2014 .

[29]  Dazhong Wu,et al.  Cloud-Based Manufacturing: Old Wine in New Bottles? , 2014 .

[30]  Larry Feldman,et al.  The NIST Definition of Fog Computing , 2017 .

[31]  Michael Weyrich,et al.  Reference Architectures for the Internet of Things , 2016, IEEE Software.

[32]  John W. Rittinghouse,et al.  Cloud Computing: Implementation, Management, and Security , 2009 .

[33]  Peter Hehenberger,et al.  Multidisciplinary design methodology for mechatronic systems based on interface model , 2017 .

[34]  Vipin Kumar,et al.  Trends in big data analytics , 2014, J. Parallel Distributed Comput..

[35]  Thomas S. Woodson Weapons of math destruction , 2018, Journal of Responsible Innovation.

[36]  Niall Twomey,et al.  Bridging e-Health and the Internet of Things: The SPHERE Project , 2015, IEEE Intelligent Systems.

[37]  Christian Bonnet,et al.  Fog Computing architecture to enable consumer centric Internet of Things services , 2015, 2015 International Symposium on Consumer Electronics (ISCE).

[38]  D. Lazer,et al.  The Parable of Google Flu: Traps in Big Data Analysis , 2014, Science.

[39]  Viju Raghupathi,et al.  Big data analytics in healthcare: promise and potential , 2014, Health Information Science and Systems.

[40]  Rajkumar Buyya,et al.  iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments , 2016, Softw. Pract. Exp..

[41]  Rob H. Bracewell,et al.  Engineering design and mechatronics: The schemebuilder project , 1992 .

[42]  Veda C. Storey,et al.  Business Intelligence and Analytics: From Big Data to Big Impact , 2012, MIS Q..

[43]  Robert X. Gao,et al.  Cloud Computing for Cloud Manufacturing: Benefits and Limitations , 2015 .

[44]  A. Cavoukian,et al.  Privacy by Design: essential for organizational accountability and strong business practices , 2010 .

[45]  J. Gausemeier,et al.  NEW GUIDELINE VDI 2206 - A FLEXIBLE PROCEDURE MODEL FOR THE DESIGN OF MECHATRONIC SYSTEMS , 2003 .

[46]  David Danks,et al.  Algorithmic Bias in Autonomous Systems , 2017, IJCAI.

[47]  Verena Tiefenbeck,et al.  Mechatronics to drive environmental sustainability: Measuring, visualizing and transforming consumer patterns on a large scale , 2013, IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society.

[48]  Qun Li,et al.  A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.

[49]  Rodney A. Brooks,et al.  A Robust Layered Control Syste For A Mobile Robot , 2022 .

[50]  Pauline T. Kim,et al.  Auditing Algorithms for Discrimination , 2017 .

[51]  Peter Schaar,et al.  Privacy by Design , 2010 .

[52]  Edward A. Lee,et al.  Introduction to Embedded Systems - A Cyber-Physical Systems Approach , 2013 .

[53]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[54]  David A. Bradley,et al.  Mechatronics – More questions than answers , 2010 .

[55]  Nadjib Badache,et al.  Fast authentication in wireless sensor networks , 2016, Future Gener. Comput. Syst..