loder

Use Cases

Three complementary real-world use cases demonstrate the applicability of FogProtect solutions to multiple contexts and the impact of the project’s novel solutions for data protection: smart cities, smart manufacturing and smart media.  FogProtect provides the essential building blocks to empower data protection, supporting resilience, trustworthiness and human centricity in the Next Generation Internet.

The use cases provide the opportunity to test the functional coverage of the technical contributions and also an initial indication of their marketability. In extending the scope of sensitive data to include all data which may be significant to the end-user and to the reputation of a given service provider, the use case validation activities contribute to the trustworthiness of the FogProtect technology and contribute to its adoption potential. 

The use cases include concerns of all citizens who wish to feel secure in their civic lives whilst confident that their own privacy is respected (UC1); unobtrusive monitoring of employees by employers not least to satisfy the latters’  responsibilities for the safety of their employees (UC2); and enabling citizen engagement as prosumers (UC3). 


Processing of video data captured by cameras in a city using fog nodes and the cloud to detect (crime)  incidents. Depending on their respective role, Data Processors are provided with either raw video data or an anonymised version of these videos.


Moving the production process from a factory building to a container which could for example be placed on a ship to continue the production process while the material is being transported.


Evaluation and processing of user-generated videos in order to integrate them into television shows.

Deliverables

WP1: Global Management and Coordination

WP2: Requirements, Use Cases and Validation 

WP3: End-to-End Data Protection Framework and Methodology

WP4: Secure Data Container

WP5: Service Management & Adaptation

WP6: Data Protection Policy Management

WP7: Dynamic Risk Management

WP8:  Impact (Dissemination, Communication, Exploitation)

Publications

Secure software placement and configuration

Future Generation Computer Systems, Elsevier, vol. 110, pp. 243-253, 2020
Publication
Z. Á. Mann.

Access

Comparison of simulators for fog computing

Proceedings of the 35th Annual ACM Symposium on Applied Computing (SAC’20) pp. 1792-1795, 2020
Paper – Conference
C. Kunde, Z. Á. Mann.

Access

Notions of architecture in fog computing

Computing, Springer, accepted, 2020
Publication
Z. Á. Mann.

Access

FogProtect: Protecting Sensitive Data in the Computing Continuum

EU Projects track of the 8th European Conference on Service-Oriented and Cloud Computing (ESOCC 2020)
Paper – Conference
Dhouha Ayed, Eva Jaho, Clemens Lachner, Zoltan Mann, Robert Seidl, Mike Surridge

Access

Feature-Model-Guided Online Reinforcement Learning for Self-Adaptive Services

18th International Conference on Service Oriented Computing (ICSOC 2020), Lecture Notes in Computer Science (LNCS, volume 12571), Springer, pp. 269-286, 2020
Paper – Conference
Metzger, Andreas; Quinton, Clément; Mann, Zoltan Adam; Baresi, Luciano; Pohl, Klaus

Access

A Privacy Preserving System for AI-assisted Video Analytics

5th IEEE International Conference on Fog and Edge Computing 2021
Paper – Conference
Clemens Lachner;  Thomas Rausch; Schahram Dustdar

Access

Advances in Service-Oriented and Cloud Computing – FogProtect: Protecting Sensitive Data in the Computing Continuum

Book – Conference
Clemens Lachner

Available soon

End-to-end data protection through the computing continuum in Smart Environments 

2021 Joint EuCNC & 6G Summit
Poster
Klaas Baert, Joao Garcia , Jens Kuhr, Robert Seidl, Ricardo Vitorino

Available soon

RADAR: Data Protection in Cloud-Based Computer Systems at Run Time

IEEE Access, vol. 9, pp. 70816-70842, 2021
Publication
Zoltán Ádám Mann, Florian Kunz, Jan Laufer, Julian Bellendorf, Andreas Metzger, Klaus Pohl

Access

DECA: A Dynamic Energy Cost and Carbon Emission-Efficient Application Placement Method for Edge Clouds

IEEE Access, vol. 9, pp. 70192-70213, 2021
Publication
Ehsan Ahvar, Shohreh Ahvar, Zoltán Ádám Mann, Noel Crespi, Roch Glitho, Joaquin Garcia-Alfaro

Access

Simulation-based analysis of threats to location privacy in fog computing

5th International Workshop on Security, Privacy and Trust in the Internet of Things (SPT-IoT), accepted, 2021
Paper – Conference
Theresa Wettig, Zoltán Ádám Mann

Available soon

Speeding up Industrial AI and Trustworthiness

Franco-German Position Paper
Publication
Zoltán Ádám Mann, Andreas Metzger

Access

Copyright 2021 FogProtect All Rights Reserved. Privacy Policy.