A Case Study of CPNS Intelligence: Provenance Reasoning over Tracing Cross Contamination in Food Supply Chain

A Cyber-Physical System (CPS) is a system featuring a tight combination and coordination of the system's computational and physical elements. CPS integrates the executive ability of the physical world and the intelligence of the cyber world to add new capabilities to real-world physical systems. Recent years has witnessed the thriving of various applications in Cyber-Physical Networked System (CPNS), one of which is food distribution industry. Food supply chain is a typical case of model of networked systems. As food safety is becoming an increasing concern over the world, assurance in the quality and trace ability in food supply chain is essential. While data collection of food is available with CPNS, intelligent sensing and process in CPNS is insufficient, e.g., though it is easy to trace the origin of food, finding the source of cross contamination is an unsolved critical issue. In this paper, a case study of CPNS intelligence is presented to provide solutions for ceasing outbreaks of food borne disease. As the case of provenance reasoning, a heuristic approach to tracing cross contamination is studied, which is comprised of dynamic partition sampling strategy and heuristic tracing algorithm. With satisfactory performance and accuracy results for our approach in our simulation, we further suggest strategies regarding provenance reasoning to address the challenges of provenance as an open issue in cloud computing and domain specific intelligence (D.S.I) in Internet of Things (IoT) and CPS.

[1]  Douwe-Frits Broens,et al.  Food safety and transparency in food chains and networks Relationships and challenges , 2004 .

[2]  Benyuan Liu,et al.  Predicting Flu Trends using Twitter data , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[3]  James M. MacDonald,et al.  Bacterial Foodborne Disease: Medical Costs and Productivity Losses , 2012 .

[4]  Madeleine E. Pullman,et al.  UNRAVELING THE FOOD SUPPLY CHAIN: STRATEGIC INSIGHTS FROM CHINA AND THE 2007 RECALLS* , 2008 .

[5]  Paul T. Groth,et al.  PrIMe: A methodology for developing provenance-aware applications , 2011, TSEM.

[6]  Zhiwei Xu,et al.  Routing schemes for switch-based in-vehicle networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[7]  Lawrence M Wein,et al.  Analyzing a bioterror attack on the food supply: the case of botulinum toxin in milk. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[8]  Mark Harman,et al.  FlagRemover: A testability transformation for transforming loop-assigned flags , 2011, TSEM.

[9]  Wenbo He,et al.  A Reservation-based Smart Parking System , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[10]  C. Hedberg,et al.  Food-related illness and death in the United States. , 1999, Emerging infectious diseases.

[11]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[12]  Marianne Winslett,et al.  The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance , 2009, FAST.

[13]  Margo I. Seltzer,et al.  Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.

[14]  L. McCaig,et al.  Food-related illness and death in the United States. , 1999, Emerging infectious diseases.

[15]  Paul van Beek,et al.  A state-transition simulation model for the spread of Salmonella in the pork supply chain , 2004, Eur. J. Oper. Res..