26.03.2015 Views

19SafQB

19SafQB

19SafQB

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.12 Recommendations on Research Topics 121<br />

aspects are critical. Different access levels, control policies, and mechanisms<br />

to guarantee that no identification of personal data is possible by unauthorised<br />

clients/operators must be carefully defined and applied. In addition, and<br />

depending on the use case or scenario, “opt-in” paradigms (in which users<br />

must voluntarily express and confirm their awareness and willingness to share<br />

personal data) should be incorporated as much as possible.<br />

Improved semantics and Data Mining<br />

Currently, the volume of data susceptible of being collected and automatically<br />

stored in information systems is huge. Often, the main problem is<br />

how to “understand” the information captured by the sensors or stored in<br />

the databases. The lack of “data interpretation” impedes the efficient processing<br />

of the information when searching for results or trying to extract useful<br />

information from the source data. A lot of effort must be devoted to the definition<br />

and implementation of semantics and rules making it easier to process<br />

the information. Data representation (within databases) and search/processing<br />

algorithms should be capable of handling higher levels of abstraction, closer<br />

to human interpretation and manipulation of information, and allowing the<br />

(automatic) generation or extraction of relationships among data components<br />

(making possible the definition of complex inference rules). In this sense, definition<br />

and processing of Complex Events (the whole CEP concept) is a field<br />

yet to be explored.<br />

Data sharing and optimization techniques<br />

Novel data sharing and optimization techniques for cloud-based IoT environments.<br />

Publishing techniques for sensor data and from interconnected objects<br />

Techniques for the publishing of data stemming from sensors and Internetconnected<br />

objects as Linked Data, including techniques for the integration of<br />

IoT with the Linked Open Data Cloud (LOD).<br />

2.12.7 Security<br />

Improved frameworks and mechanisms for trust relationships<br />

Further research is required to develop improved frameworks and mechanisms<br />

to enable trust relationships to be established, maintained and assessed.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!