Cyber Physical Systems Opportunities and Challenges for Software, Services, Cloud and Data
نویسنده
چکیده
Executive Summary This white paper identifies relevant challenges and opportunities for Cyber-Physical Systems (CPS), focussing on the impact of CPS on the main areas of NESSI and vice versa. NESSI is the Horizon 2020 European Technology Platform (ETP) for software, services and data. This paper does not aim to look at CPS from all angles, but provides a complementary contribution from the NESSI point of view. In particular the paper assesses the impact of the increasing role of software in Cyber-Physical Systems. Pure hardware, mechanical or communication network concerns are not in the scope of this white paper. The paper is structured into the following main sections: Software engineering for CPS – The intelligence, dynamics and flexibility of future CPS lies in the ability to be context-aware and produce software that is both dependable and adapts to real time change, which goes beyond today's software engineering state of the art and practices. Cloud for CPS – Cloud computing is a key element to obtain ubiquitous system deployment, execution and interaction, and provides key principles (such as adaptation and multi-tenancy) that may be leveraged for all kinds of devices. CPS and Big Data – CPS with its computational power on the devices (including edge computing) will be a major source, collector, processor and distributer of data, not only in volume, but also in velocity, variety and veracity. Software-based services on top of CPS – Software-based services constitute a key enabler for leveraging, packaging and delivering the core capabilities of a CPS infrastructure, realizing the potential that lies in creating value to business applications. Note that the topics of security, privacy and trust are intentionally left out. These will be covered by a forthcoming NESSI white paper.
منابع مشابه
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملKey Enabler for Innovation
Economy and industry is experiencing a transformation towards software-and services-based businesses. Modern products and services increasingly embed software, or are cus-tomized, optimized or managed using software (examples include health, transportation, and utilities). Software engineering is thus playing an increasingly important key role in the responsiveness , quality and security of man...
متن کاملInformation-Acquisition-as-a-Service for Cyber-Physical Cloud Computing
Data center cloud computing distinguishes computational services such as database transactions and data storage from computational resources such as server farms and disk arrays. Cloud computing enables a software-as-a-service business model where clients may only pay for the service they really need and providers may fully utilize the resources they actually have. The key enabling technology f...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015