General Information
Home
Organizing Committee
Program Committee
Important Dates
Submission Guidelines
Registration
Past IC2E
 
Calls
Call for Contributions
Call for Research Papers
Call for Workshops
Call for Tutorials
 
Program
Keynotes and Invited Talk
Conference Program
Accepted Papers
Panel
Tutorials
Workshops
Social Events
Doctoral Symposium
 
Travel Information
Conference Venue
Visa Information
Accommodation
Transportation
About Berlin

IC2E 2016 Tutorial Program


Tutorial 1 (Monday morning):
Cloud Engineering in Education

David Bermbach (TU Berlin, Germany), Dominik Ernst (TU Berlin, Germany)

Room: MAR 0.001
Time: 9:00-12:00

As cloud engineering researchers and lecturers, we are frequently confronted with the challenge of teaching advanced concepts to students that are absolute beginners in that area. We believe that teaching complex engineering concepts, e.g., tradeoffs in distributed storage systems, has the highest probability of learning success if done through hands-on coding, systems development, and experiments with actual systems.

In this tutorial, we will start with a brief overview of our strategies in teaching cloud engineering concepts to bachelor’s and master’s students. Afterwards, we will introduce an assignment where students are asked to develop a simple distributed storage system based on a communication middleware. In our tutorial, we will then have a hands-on part where our tutorial participants work on that assignment. In a third phase, if time permits, we will work on part two of that assignment where students are asked to run a few experiments on geo-distributed cloud servers to analyze consistency-latency tradeoffs for different replication strategies

Prerequisites

  • Attendees should have intermediate-level experience of deploying and managing software in the cloud. The material will be well-suited to university lecturers.
  • Participants need to bring laptops and have a basic knowledge of Java.
  • If time permits, the tutorial will include a live experiment phase. In that case, participants will need access to 3–4 virtual machines, e.g., through Amazon Web Services (< 2 USD).

Biographies of presenters

Dr. David Bermbach is a senior researcher within the Information Systems Engineering research group at TU Berlin in Berlin, Germany. At TU Berlin, he is working on novel cloud benchmarking solutions and cloud data management techniques. Prior to his current position, he worked as a researcher at KIT and as a lecturer at DHBW both in Karlsruhe, Germany. David has a Diploma in business engineering (2010) and a Ph.D. with distinction in computer science (2014) both from KIT. He received a best paper runner up award at IC2E 2014 and a best paper award at the 2nd International Conference on Cloud Computing, GRIDs, and Virtualization.

Dominik Ernst has been a PhD student in the Information Systems Engineering research group at TU Berlin since 2015. Before joining the group, he worked as a software engineer for a consulting company. Dominik has a master’s degree in business engineering from KIT and is interested in modern container technology and its impact on software architectures as well as cloud and service platforms.


Tutorial 2 (Monday afternoon):
The Internet of Things moves into the Cloud

Antonio Iera (University of Reggio Calabria, Italy), Giacomo Morabito (University of Catania, Italy), Luigi Atzori (University of Cagliari, Italy)

Room: MAR 0.001
Time: 13:30-17:00

This tutorial has three main objectives:

  1. Providing insights into the evolution that the IoT has gone through since its introduction.

    The idea of IoT has evolved over time and has undergone successive transformations that will predictably still continue over the coming years with the advent of new enabling technologies. New concepts, such as cloud computing, information centric networking, big data, and social networking, have already partially impacted and still are impacting on this paradigm. This trend will surely continue, given the importance of the relevant applications. In this tutorial we will illustrate the evolution of the IoT classifying different generations and give a modern definition of the phenomenon. In this way the audience will become aware of the differences between IoT and the technologies often confused with it (such as sensor networks, RFID systems, M2M, etc.).

  2. Presenting the role that Cloud computing technology can play in the support of the IoT.

    In the IoT most objects (even the smartest) do not have the (energy, processing, and communication) capabilities to run the services that users expect. Accordingly several solutions have been proposed to offload processing to the cloud. Several possibilities can be considered in this context depending on whether the cloud will just be the responsible for the storage, management, and retrieval of the data generated by smart objects or will provide the environment where virtualized digital instances of the objects and/or the service they offer will run. In this tutorial we will provide a critical overview of the most important solutions proposed so far in the literature.

  3. Showing a practical example of cloud support for IoT objects and service virtualization in the cloud.

    Finally, we will present a specific solution for supporting IoT in the cloud. More specifically we will show the architecture, the tools utilized to virtualize objects, and the APIs offered to application developers. In this way most of the concepts depicted throughout the tutorial will be illustrated from a practical point of view.

Session details

Part 1: IoT context and history (1 hour)

  • Introduction
  • The first generation of the IoT: tagged things
    • Major innovations
    • Major architectural solutions: EPCglobal Network, Machine-to-Machine communication architecture, Architectures for integration of RFID systems and WSNs in the IoT
    • Main related projects, main research results, main industrial experimentations
  • The second generation of the IoT: full interconnection of things and the (social) web of things
    • Major innovations
    • Major architectural solutions: CoRe Architecture, Web of Things, Social Web of Things
    • Main related projects, main research results, main industrial experimentations
  • The third generation of the IoT: the age of “social objects”, “cloud computing”, and “future internet”
    • Major innovations
    • Major architectural solutions: IoT and Cloud computing, IoT and ICN, Social-IoT
    • Main related projects, main research results, main industrial experimentations

Part 2: Emerging solutions (1 hour)

  • Solutions for the storage and management of IoT data and the APIs offered to application developers
    • Basic concepts and architectures proposed
    • Implementations available
    • Comparison
  • Solutions for the virtualization of IoT objects and services
    • Basic concepts and architectures proposed
    • Implementations available
    • Comparison
  • Solutions to run IoT services at the edge of the cloud
    • Motivations and basic concepts
    • Optimizaton techniques

Part 3: Practical example (1 hour)

  • General Description of the IoT solution
  • Architecture and modules
  • Implementation and development tools and environments adopted
  • APIs offered to application developers
  • Example applications

Prerequisites

  • No specific prerequisites or required knowledge.
  • This tutorial is intended to be of interest to academic and industrial researchers across a wide range of topics.

Biographies of presenters

Antonio Iera graduated in Computer Engineering at the University of Calabria, Italy, in 1991 and received a Master Diploma in Information Technology from CEFRIEL/Politecnico di Milano, Italy, in 1992 and a Ph.D. degree from the University of Calabria, Italy, in 1996. From 1994 to 1995 he has been with the Mobile Network Division Research Center, Siemens AG—Munich, Germany and since 1997 with the University Mediterranea, Reggio Calabria, where he currently holds the positions of full professor of Telecommunications and Director of the ARTS (www.arts.unirc.it)—Laboratory for Advanced Research into Telecommunication Systems. He served as TPC member of several IEEE International Conferences and has been co-Guest Editor for different special issues in the IEEE Wireless Communications Magazine. Elevated to the IEEE Senior Member status in 2007. His research interests include: Next generation mobile systems, Advanced Systems for Personal Communications, RFID systems and Internet of Things.

Giacomo Morabito received the laurea degree in Electrical Engineering and the PhD in Electrical, Computer and Telecommunications Engineering from the Istituto di Informatica e Telecomunicazioni, University of Catania, Catania (Italy), in 1996 and 2000, respectively. From November 1999 to April 2001, he was with the Broadband and Wireless Networking Laboratory of the Georgia Institute of Technology as a Research Engineer. Since April 2001 he is with the Dipartimento di Ingegneria Informatica e delle Telecomunicazioni of the University of Catania where he is currently Associate Professor. He serves (or has served) on the Editorial Boards of Wireless Networks, Computer Networks and IEEE Wireless Communications. Furthermore, he has been editor or co-guest editor of special issues of IEEE Transactions on Multimedia, IEEE Wireless Communication Magazine, Computer Networks and MONET. His research interests focus on analysis and solutions for broadband and wireless networks.

Luigi Atzori is associate professor at the University of Cagliari (Italy). His main research topics of interest are in service management in next generation networks, with particular attention to architectural solutions for the Internet of Things, QoS, service-oriented networking, bandwidth management and multimedia networking. He has published more than 100 journal articles and refereed conference papers. Dr. Atzori has received the Telecom Italia award for an outstanding MSc thesis in Telecommunication and has been awarded a Fulbright Scholarship (11/2003-05/2004) to work on video streaming at the Department of Electrical and Computer Engineering, University of Arizona. He is senior member of IEEE, steering committee chair of the IEEE Multimedia Communications Committee (MMTC). He has been the editor for the ACM/Springer Wireless Networks Journal and guest editor for the IEEE Communications Magazine, Monet and Signal Processing: Image Communications journals. He is currently editor of the IEEE IoT Journal, Ad Hoc Networks Journal and Advances on Multimedia.



Tutorial 3 (Friday morning):
Sensor Cloud: A Cloud of Sensor Networks

Sanjay K Madria (Missouri University of Science and Technology, USA)

Room: MAR 0.003
Time: 9:00-12:00

Traditional model of computing with wireless sensors imposes restrictions on how efficiently wireless sensors can be used due to resource constraints. Newer models for interacting with wireless sensors such as Internet of Things and Sensor Cloud aim to overcome these restrictions. This tutorial will discuss a sensor cloud architecture which enables different wireless sensor networks, spread in a huge geographical area to connect together and be used by multiple users at the same time on demand basis. Virtual sensors will be shown to assist in creating a multi-user environment on top of resource constrained physical wireless sensors, and can help in supporting multiple applications on-demand basis. Security issues will be presented, along with an overview of some potential solutions to these problems such as: energy efficient privacy and data integrity preserving data aggregation algorithms, risk assessment in sensor clouds, and attribute-based access control for sensor cloud applications.

Session details

Part 1. Cloud of Sensors — different architectures
Part 2. Virtualization in Sensor Cloud
Part 3. Scheduling in Sensor Cloud
Part 4. Data Aggregation in Sensor Cloud
Part 5. Security, Privacy and Risk Issues in Sensor Cloud

Prerequisites

  • No specific prerequisites or required knowledge.
  • This tutorial is suitable for academics, researchers and postgraduate students working in the area of sensor networks, cloud computing, and security and privacy.

Biography of presenter

Sanjay Kumar Madria is a full professor in the Department of Computer Science at the Missouri University of Science and Technology (formerly, University of Missouri-Rolla, USA) and site director, NSF I/UCRC center on Net-Centric Software Systems. He has published over 200 Journal and conference papers in the areas of mobile data management, sensor computing, and cyber security and trust management. He won three best papers awards from conferences such as IEEE MDM 2011 and IEEE MDM 2012. His research is supported by several grants from federal sources such as NSF, DOE, AFRL, ARL, ARO, NIST and industries such as Boeing and Unique*Soft. He has also been awarded the JSPS (Japanese Society for Promotion of Science) visiting scientist fellowship in 2006 and the ASEE (American Society of Engineering Education) fellowship at AFRL from 2008 to 2012. In 2012–13, he was awarded a NRC Fellowship by National Academies. He has received faculty awards in 2007, 2009, 2011 and 2013 from his university for excellence in research. He served as an IEEE Distinguished Speaker, and currently, he is an ACM Distinguished Speaker, an IEEE Senior Member, and a Golden Core awardee.


Tutorial 4 (Friday afternoon):
Apache Flink: Stream Analytics at Scale

Asterios Katsifodimos (TU Berlin, Germany), Sebastian Schelter (TU Berlin, Germany)

Room: MAR 0.003
Time: 13:30-17:00

Apache Flink is an open source system for expressive, declarative, fast, and efficient data analysis on both historical (batch) and real-time (streaming) data. Flink combines the scalability and programming flexibility of distributed MapReduce-like platforms with the efficiency, out-of-core execution, and query optimization capabilities found in parallel databases. At its core, Flink builds on a distributed dataflow runtime that unifies batch and incremental computations over a true-streaming pipelined execution. Its programming model allows for stateful, fault tolerant computations, flexible user-defined windowing semantics for streaming and unique support for iterations. Flink is converging into a use-case complete system for parallel data processing with a wide range of top level libraries ranging from machine learning and graph processing. Apache Flink originates from the Stratosphere project led by TU Berlin and has led to various scientific papers (e.g., in VLDBJ, SIGMOD, (P)VLDB, ICDE, and HPDC). In this half-day tutorial we will introduce Apache Flink, and give a tutorial on its streaming capabilities using concrete examples of application scenarios, focusing on concepts such as stream windowing, and stateful operators.

Prerequisites

No specific prerequisites or required knowledge.

Biographies of presenters

Dr. Asterios Katsifodimos is a postdoctoral researcher co-leading the Stratosphere research project at the Technische Universität Berlin. He received his PhD in 2013 from INRIA Saclay and Université Paris-Sud under the supervision of Ioana Manolescu. His thesis focused on materialized view-based techniques for the management of Web Data. Asterios has been a member of the High Performance Computing Lab at the University of Cyprus, where he obtained his BSc and MSc degrees in 2009. His research interests include query optimization, large-scale distributed data management and Big Data analytics.

Dr. Sebastian Schelter is a machine learning scientist at Amazon, as well as a senior researcher at the Database Systems and Information Management Group of TU Berlin. Furthermore, he is engaged in open source as a member of the Apache Software Foundation. His research focuses on scalable data mining on parallel processing platforms. During his PhD, he was an intern at IBM Research Almaden, and at Twitter in California.


Tutorial 5 (Friday full day): Building Secure Cloud Architectures Using Patterns

Cancelled due to unavailability of the speaker

Room: MAR 0.009
Time: 9:00-17:00

Eduardo B. Fernandez (Florida Atlantic University, USA)

Patterns abstract good practices to define basic models that can be used to build new systems and evaluate existing systems. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for secure system requirements, design, and evaluation. We have built a catalog of over 100 security patterns, which is still growing. We complement these patterns with misuse patterns, which describe how an attack is performed from the point of view of the attacker and describe how it can be stopped. We integrate patterns in the form of security reference architectures (SRAs) and we extend them to their ecosystems. We show how to build a SRA for clouds and their ecosystems. The use of patterns can provide a holistic view of security, which is a fundamental principle to build secure systems. The patterns and reference architectures are shown using UML models and examples are taken from my two books on security patterns as well as from my recent publications.

Session details

Patterns combine experience and good practices to develop basic models that can be used to build new systems and to evaluate existing systems. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for secure system requirements, design, and evaluation. We consider the structure and purpose of security patterns, show a variety of security patterns, and illustrate their use in the construction of secure systems. These patterns include among others Authentication, Authorization/Access Control, Firewalls, Secure Broker, Web Services Security, and Cloud Security. We have built a catalog of over 100 security patterns. We introduce Abstract Security patterns (ASPs) which are used in the requirements and analysis stages. We complement these patterns with misuse patterns, which describe how an attack is performed from the point of view of the attacker and how it can be stopped. We integrate patterns in the form of security reference architectures. Reference architectures have not been used much in security and we explore their possibilities. We introduce patterns in a conceptual way, relating them to their purposes and to the functional parts of the architecture. Example architectures include a security cloud reference architecture (SRA) and a cloud ecosystem. The use of patterns can provide a holistic view of security, which is a fundamental principle to build secure systems. Patterns can be applied throughout the software lifecycle and provide a good communication tool for the builders of the system. The patterns and reference architectures are shown using UML models and examples are taken from my two books on security patterns as well as from my recent publications. The patterns are put in context; that is, we do not present a disjoint collection of patterns but instead present a logical architectural structuring where the patterns are added where needed. In fact, we present a complete methodology to apply the patterns along the system lifecycle to build secure systems and a process to build reference architectures.

Outline

  • Security concepts
  • Attacks/threats
  • The design of secure systems: relating threats to use cases.
  • A methodology to build secure architectures
  • Security patterns, abstract security patterns, misuse patterns, threat patterns
  • Security models and their patterns—policies, access matrix, multilevel models, RBAC
  • Enumerating threats from use cases
  • RBAC and security policies from use cases.
  • Security Logging/Auditing and Authentication.
  • Security reference architectures (SRAs)
  • A SRA for cloud systems
  • Misuse patterns for clouds
  • An architecture for cloud ecosystems
  • A pattern for Fog Computing
  • Conclusions — the future

Prerequisites

The tutorial has been tailored to fit the interests of the attendees of a cloud computing conference.

Biography of presenter

Eduardo B. Fernandez (Eduardo Fernandez-Buglioni) is a professor in the Department of Computer Science and Engineering at Florida Atlantic University in Boca Raton, Florida, USA. He has published numerous papers on authorization models, object-oriented analysis and design, and security patterns. He has written four books on these subjects, the most recent being a book on security patterns. He has lectured all over the world at both academic and industrial meetings. He has created and taught several graduate and undergraduate courses and industrial tutorials. His current interests include security patterns, cloud computing security, and software architecture. He holds a MS degree in Electrical Engineering from Purdue University and a Ph.D. in Computer Science from UCLA. He is a Senior Member of the IEEE, and a Member of the ACM. He is an active consultant for industry, including assignments with IBM, Allied Signal, Motorola, Lucent, Huawei, and others.


© 2014-2016 IEEE International Conference on Cloud Engineering (IC2E 2016). All rights reserved.