Development, Operation, and Quality Assurance of Trustworthy Smart IoT Systems
To unleash the full potential of IoT, realizing the digital society and flourishing innovations in application domains such as eHealth, smart city, intelligent transport systems, and smart manufacturing, it is critical to facilitate the creation and operation of trustworthy Smart IoT Systems. Since smart IoT systems typically operate in a changing and often unpredictable environment, the ability of these systems to continuously evolve and adapt to their new environment is decisive to ensure and increase their trustworthiness, quality and user experience. The DevOps movement advocates a set of software engineering best practices and tools, to ensure Quality of Service whilst continuously evolving complex systems and foster agility, rapid innovation cycles, and ease of use . Therefore, DevOps has been widely adopted in the software industry . However, there is no complete DevOps support for trustworthy smart IoT systems today.
The main technical goal of ENACT is to develop novel IoT platform enablers to:
i) Enable DevOps in the realm of trustworthy smart IoT systems, and enrich it with novel concepts for end-to-end security and privacy, resilience and robustness strengthening trustworthiness, taking into account the challenges related to “collaborative” actuation and actuation conflicts.
ii) Facilitate the smooth integration of these to leverage DevOps for existing and new IoT platforms and approaches (e.g. FIWARE, SOFIA, and TelluCloud).
This will be accomplished by evolving current DevOps methods and techniques to support the agile development and operation of smart IoT systems, and provide a set of novel mechanisms to ensure quality assurance and trustworthiness, such as actuation conflict handling, continuous testing and delivery across IoT, edge and cloud spaces and end to end security and privacy management. Through this ENACT will provide a DevOps framework for smart IoT Systems
Integrated Cybersecurity Solution for the Vulnerability Assessment, Monitoring and Protection of Critical Energy Infrastructures
Integrated Cybersecurity Solution for the Vulnerability Assessment, Monitoring and Protection of Critical Energy Infrastructures Coordinated bySOFTWARE IMAGINATION & VISION SRLObjectiveShielding the power grid from cyberattacks The Electrical Power and Energy...
Multi-layered Security technologies to ensure hyper connected smart cities with Blockchain, BigData, Cloud and IoT
Multi-layered Security technologies to ensure hyper connected smart cities with Blockchain, BigData, Cloud and IoT Coordinated byWORLDLINE IBERIA SAObjectiveIoT systems today tend to be built around the concept of IoT/cloud convergence, integrating heterogeneous data...
IOT- & Blockchain-Enabled Security Framework for New Generation Critical Cyber-Physical Systems In Finance Sector
IOT- & Blockchain-Enabled Security Framework for New Generation Critical Cyber-Physical Systems In Finance Sector Coordinated byTHE UNIVERSITY OF READINGObjectiveCyber-physical systems refer to systems requiring interaction between computers, communication...
Trusted Secure Data Sharing Space Coordinated byGOTTFRIED WILHELM LEIBNIZ UNIVERSITAET HANNOVERObjectiveIn recent years, the data market has been flourishing. A sharp downfall in trust towards platforms considered secure and privacy-aware, however, has hampered the...
Protection and privAcy of hospital and health iNfrastructures with smArt Cyber sEcurity and cyber threat toolkit for dAta and people
Protection and privAcy of hospital and health iNfrastructures with smArt Cyber sEcurity and cyber threat toolkit for dAta and people Coordinated byUNIVERSITA CATTOLICA DEL SACRO CUOREObjectiveThe EU-funded PANACEA project is producing people-centric cybersecurity...
Data Driven Computational Mechanics at EXascale Coordinated by NATIONAL TECHNICAL UNIVERSITY OF ATHENS - NTUAObjectiveDCoMEX aims to provide unprecedented advances to the field of Computational Mechanics by developing novel numerical methods enhanced by Artificial...