The explosion of IoT devices and sensors in recent years has led to a demand for efficiently storing, processing and analyzing time-series data. Geoscience researchers use time-series data stores such as Hydroserver, VOEIS and CHORDS. Many of these tools require a great deal of infrastructure to deploy and expertise to manage and scale. Tapis's (formerly known as Agave) platform as a service provides a way to support researchers in a way that they are not responsible for the infrastructure and can focus on the science. The University of Hawaii (UH) and Texas Advanced Computing Center (TACC) have collaborated to develop a new API integration that combines Tapis with the CHORDS time series data service to support projects at both institutions for storing, annotating and querying time-series data. This new Streams API leverages the strengths of both the Tapis platform and CHORDS service to enable capabilities for supporting time-series data streams not available in either tool alone. These new capabilities may be leveraged by Tapis powered science gateways with needs for handling spatially indexed time-series data-sets for their researchers as they have been at UH and TACC.
more »
« less
Operations, IT, and Construction Time Orientations and the Challenges of Implementing IOT
The adoption of Internet of Things is growing significantly in recent years both to address sustainability in campus operations and as part of digital twin systems. This study looks at in-depth cases of large university campus owners and the challenges that this IOT introduces for the maintenance and management of these systems and the data they collect. In this ethnography there are three main time orientations related to Campus Infrastructure, Information Technology, and Campus Projects. First, a university campus is like a small city, with buildings, utilities, and transportation systems - taken together we call this campus infrastructure (buildings 50-100, roads and utilities 20-50 years). Second, IT employees think on 2–3-month scale, working through implementing software and hardware upgrades, configurations and patches, at times needing agile operations to deal with emerging cybersecurity threats. Third, in capital projects the design phase can last 9 months, and the construction from 1 - 2 years for a typical project, and this is where IOT technologies are often first introduced into campus. However, while the project teams reflect on the user experience, these teams are often removed from the realities of facilities management and do not understand the time scales or the scope of the work that is required to manage a portfolio of campus infrastructure and IT systems. In this paper, we explore how these time orientations lead to tensions and clashes in the types of technologies owners select to implement, integrating new technologies into existing systems, and the challenges of keeping existing systems up and running for the longer time scales of campus infrastructure life spans. Furthermore, this paper presents a paradox: If they speed up, they lose things, if they slow down, they lose other things, and presents ways that owner organizations manage this paradox.
more »
« less
- Award ID(s):
- 1932769
- PAR ID:
- 10408000
- Editor(s):
- Park, C.
- Date Published:
- Journal Name:
- The Future of Construction in the Context of Digitalization and Decarbonization: Proceedings of the 22nd International Conference on Construction Applications of Virtual Reality
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
The importance to our society of emergency network communications cannot be underestimated. The loss of communication and network systems in a state of emergency denies victims of disaster and city emergency response teams critical information about the crisis. It is essential to restore communication systems and service in order to ensure continuous and efficient emergency operations. This paper presents a cloud-based cost-effective emergency network management system to provide dynamic network services. We have developed a network application to enable users to access the Internet during an emergency. The application is ready to immediately restore lost connectivity through economical embedded systems and UAVs. We implement our prototypes based on Resin.io, a framework that utilizes Linux containers on IoT(Internet of Things) devices to deploy applications. We evaluate our systems on Raspberry Pi, a popular embedded system. We demonstrate the feasibility of our proposed system, showing that it is an economical infrastructure that it can successfully be used for an emergency network to replace a demolished network infrastructure.more » « less
-
Web decentralization has the potential to radically change the way we produce, store, and manage data. Much of the focus of decentralization has been on blockchain tech-nologies which have high energy requirements. An alternative and potentially complementary decentralization technology exists in the form of the Solid project. Solid primarily exists for the decentralization of online social data that is prevalent in social media. However, many of the key challenges to realizing a decentralized social web exist in the current Internet of Things (IoT). IoT-especially industrial IoT-is currently a collection of many intranets of things rather than an interconnected network of machines. Those devices that are public facing produce data and consume commands often devoid of context. Devices at the edge are resource constrained and the overhead of many decentralization technologies may be technologically infeasible or would result in performance degradation. It is our hypothesis that a mechanism to overcome some of these challenges can exist in the form of a client bridge to integrate IoT devices with the Solid infrastructure, which would in turn enable finer access control and improved context that are necessary to realize a more interconnected Internet of Things. This work demonstrates the feasibility of this paradigm, and plots future directions to bring this technology to fruition.more » « less
-
As Internet-of-Things (IoT) devices rapidly gain popularity, they raise significant privacy concerns given the breadth of sensitive data they can capture. These concerns are amplified by the fact that in many situations, IoT devices collect data about people other than their owner or administrator, and these stakeholders have no say in how that data is managed, used, or shared. To address this, we propose a new model of ownership, IoT Ephemeral Ownership (TEO). TEO allows stakeholders to quickly register with an IoT device for a limited period, and thus claim co-ownership over the sensitive data that the device generates. Device admins retain the ability to decide who may become an ephemeral owner, but no longer have access or control to the private data generated by the device. The encrypted data in TEO is accessible only by entities after seeking explicit permission from the different co-owners of that data. We verify the key security properties of our protocol underpinning TEO in the symbolic model using ProVerif. We also implement a cross-platform prototype of TEO for mobile phones and embedded devices, and integrate it into three real-world application case studies. Our evaluation shows that the latency and battery impact of TEO is typically small, adding ≤ 187 ms onto one-time operations, and introducing limited (<25%) overhead on recurring operations like private data storage.more » « less
-
As Internet-of-Things (IoT) devices rapidly gain popularity, they raise significant privacy concerns given the breadth of sensitive data they can capture. These concerns are amplified by the fact that in many situations, IoT devices collect data about people other than their owner or administrator, and these stakeholders have no say in how that data is managed, used, or shared. To address this, we propose a new model of ownership, IoT Ephemeral Ownership (TEO). TEO allows stakeholders to quickly register with an IoT device for a limited period, and thus claim co-ownership over the sensitive data that the device generates. Device admins retain the ability to decide who may become an ephemeral owner, but no longer have access or control to the private data generated by the device. The encrypted data in TEO is accessible only by entities after seeking explicit permission from the different co-owners of that data. We verify the key security properties of our protocol underpinning TEO in the symbolic model using ProVerif. We also implement a cross-platform prototype of TEO for mobile phones and embedded devices, and integrate it into three real-world application case studies. Our evaluation shows that the latency and battery impact of TEO is typically small, adding ≤187 ms onto one-time operations, and introducing limited (<25%) overhead on recurring operations like private data storage.more » « less
An official website of the United States government

