On using provenance data to increase the reliability of ubiquitous computing environments

Ubiquitous computing aims at providing computing functionalities embedded into everyday life. Technologies such as networked sensors, actuators, mobile devices, appliances, and stationary computing infrastructures are intended to support smart services by making use of context information. This information may be only of interest for the moment the service is provided, like location-based services, or collected for later use, e.g., to optimize logistic workflows. In particular in case of spontaneous interactions of components, it becomes difficult to keep track about the provenance of sensor data or even services that are provided in a particular situation. If problems occur, like privacy and security attacks or service failures, this lack of traceable information may decrease the trustworthiness of systems and legal requirements might not be fulfilled properly. In this position paper, we introduce provenance data to increase reliability in ubiquitous computing systems. Hereby, provenance is a summary of the historical information about gathering, collecting, and aggregating data. We demonstrate and motivate the usefulness of the approach and discuss open issues and further research directions by presenting a health-care emergency use case.

[1]  Ivan Janciak,et al.  Mobility Extensions for Knowledge Discovery Workflows in Data Mining Grids , 2006, 17th International Workshop on Database and Expert Systems Applications (DEXA'06).

[2]  Qi Han,et al.  Journal of Network and Systems Management ( c ○ 2007) DOI: 10.1007/s10922-007-9062-0 A Survey of Fault Management in Wireless Sensor Networks , 2022 .

[3]  Yogesh L. Simmhan,et al.  A survey of data provenance techniques , 2005 .

[4]  Chaki Ng,et al.  Provenance-Aware Sensor Data Storage , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).

[5]  Karin Anna Hummel,et al.  A Robust Decentralized Job Scheduling Approach for Mobile Peers in Ad-hoc Grids , 2007, Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid '07).

[6]  Sanjeev Khanna,et al.  Data Provenance: Some Basic Issues , 2000, FSTTCS.

[7]  Jonathan Grudin,et al.  Human Computer Interaction: The Year 2000 and Beyond , 1995, HCI.

[8]  Ami Marowka,et al.  What is the GRID? , 2002, Scalable Comput. Pract. Exp..

[9]  Xue Li,et al.  RFID Data Management: Challenges and Opportunities , 2007, 2007 IEEE International Conference on RFID.

[10]  Luc Moreau,et al.  Recording and Reasoning over Data Provenance in Web and Grid Services , 2003, OTM.

[11]  Yogesh L. Simmhan,et al.  Performance Evaluation of the Karma Provenance Framework for Scientific Workflows , 2006, IPAW.

[12]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.