700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ ReadersThis Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)
|Transaction Software GmbH, Germany|
|Keynote: Int J Sens Netw Data Commun|
|The Internet of Things (IoT) will lead to various serious problems, two of which will be addressed: The enormous data volumes and the security problems. We will first identify the problems in three sample scenarios, namely: Management of charging stations for electrified cars, storing patient documentations securely and traffic management in smart cities. When only 50,000 devices in a city deliver 500 bytes of data per second, we have more than 2 terabyte of data per day. It is obvious that classical communication and database technology can hardly cope with the data volume and the data rates. We will then present an innovative, perfectly scaling architecture for storing and analyzing such huge data volumes. This architecture stores data in edge databases (on or near) the devices and integrates them into a hierarchy of virtual distributed databases reflecting e.g., buildings, cities, countries, continents and finally the entire globe. Data is stored efficiently and most scalably in the edge databases, data analysis queries are provided on all affected hierarchy levels. Those queries are sent and processed to all subordinate databases in parallel and their results are aggregated subsequently into a single result. This approach is heavily based on an IoT database system such as Transbase which runs on all hierarchy levels starting from Raspberry Pi based devices over smartphones upto large servers. As data is stored on the devices, also their privacy can be controlled by local policies based on SQL privileges for outside access. Stronger security requirements for cloud storage are covered by an integrated encryption platform that is based on end-to-end encryption. The key management as well as identity management is delegated to a central database. The key features of this approach are: Private keys are stored in the device only, they are never transferred into the database or to other devices, each document is encrypted by a specific random key which is stored nowhere. Instead the key is encrypted for all the owner's device keys and all entitled users separately, the documents itself can be stored somewhere in the cloud, application layers on end-user devices have access to the user's private key and are able to decrypt documents and,document meta data is stored and synchronized between devices automatically.|
Christian Roth born in 1956, is managing director and one of the founding members of Transaction Software GmbH. He has successfully led the company Transaction Software since it was founded in 1987. He is also responsible for the international business in the USA, Japan and Europe. Dr. Christian Roth studied Information Technology at the Technical university of Munich and obtained his doctorate in 1987. In addition Dr. Christian Roth studied Business Management at the Ludwig-Maximilian University in Munich.
Email: [email protected]
|PDF | HTML|