Professional Documents
Culture Documents
net/publication/324569418
CITATIONS READS
0 42
7 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Maurício L. Pilla on 17 April 2018.
Adenauer Yamin
Federal University of Pelotas
adenauer@inf.ufpel.edu.br
ABSTRACT 1 INTRODUCTION
Context awareness brings new challenges, and an important one is Ubiquitous computing or UbiComp is a concept in computer science
how applications can manipulate the contextual data stored in more where computers are made available to human needs, following
than one model. In this research, we propose HACCD, a context- the premise of having minimum involvement between the user and
aware architecture to process information based on hybrid models. the management of the computational infrastructure [7].
HACCD is designed to provide context awareness considering dif- Due to the fast grown of ubiquitous computing in our everyday
ferent stages: (i) acquisition of context; (ii) preprocessing stage; life an increasing number of contextual data is continuously gener-
(iii) context processing with a hybrid reasoning strategy; (iv) data ated from different sources, formats, or semantics (i.e. ontologies,
storage with the support of three database models; (v) repository relational data, rules,...) which is needed to be evaluated together
communication that enable access to contextual information; and, in order to identify situations of interest to the context-aware ap-
(vi) correlation approach based on compositional rules that allow plications [3].
the combination of data stored in distinct models. To validate our In this aspect, context awareness stands out as a resource to be
architecture we designed and tested within some scenarios based on used by ubiquitous computing, which needs to deal appropriately
information security. The obtained results showed that the possibil- with modeling, storage, and processing of the various context data
ity of correlating data from different natures could help to identify provided by the applications. Context-aware applications can adapt
richer situations, thus improving decision-making. their behaviors to the changing environment with minimal human
intervention, but they introduce new challenges for application
CCS CONCEPTS developers [2].
Recently, several context modeling and reasoning strategies have
• Human-centered computing → Ubiquitous and mobile com-
been developed, but these strategies can not, in their solution, deal
puting;
with the diversity of data acquired, and this adequate manipulation
can help on decision-making. Therefore, it is necessary to change
KEYWORDS the approach used to one that combines the different representa-
Context Awareness; Hybrid Reasoning; Context Correlation tion models and the context reasoning strategies, called hybrid
approaches [3].
ACM Reference Format: Context data stored in a single model may lead to problems
Roger Machado, Felipe Rosa, Ricardo Almeida, Tiago Primo, Mauricio Pilla, related to performance and disk usage [5]. Besides, it causes con-
Ana Pernas, and Adenauer Yamin. 2018. A Hybrid Architecture to Enrich cerns related to data processing, since it often becomes necessary to
Context Awareness through Data Correlation. In SAC 2018: SAC 2018: Sym- utilize data correlation between different storage models. The moti-
posium on Applied Computing , April 9–13, 2018, Pau, France. ACM, New vation of this paper emerges from the use of hybrid context models,
York, NY, USA, 3 pages. https://doi.org/10.1145/3167132.3167405 that is, the need to use different models to manage contextual data.
The main objective this work is treated these three research ques-
tions through of the conception of an architecture entitled “HACCD
Permission to make digital or hard copies of part or all of this work for personal or (Hybrid Architecture to Correlate Contextual Data)”, which aims
classroom use is granted without fee provided that copies are not made or distributed to supply the use of hybrid context modeling in a more integrated
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for third-party components of this work must be honored. and convenient way.
For all other uses, contact the owner/author(s). To accomplish this, HACCD provides: (i) a preprocessing stage
SAC 2018, April 9–13, 2018, Pau, France to perform the normalization and contextualization of the collected
© 2018 Copyright held by the owner/author(s).
ACM ISBN 978-1-4503-5191-1/18/04. data; (ii) a processing Layer that offers multiple reasoning strate-
https://doi.org/10.1145/3167132.3167405 gies, which can be used either individually or in a combined form
SAC 2018, April 9–13, 2018, Pau, France R. Machado et al.
to perform the context processing; (iii) a Storage Layer which pro- 2.2 Preprocessing Layer
vides persistence with three different database models; (iv) a repos- The Preprocessing Layer performs the separation of the event in
itory communication manager that enables access to contextual different fields, later adding contextual information to help the pro-
information from the context-aware applications; (v) a context com- cessing step. This component was designed due to normalization
positional correlation strategy, which allows the application to and contextualization of the collected events. For the use in Pre-
combine information from different models, integrating contextual processing Layer, grammars were developed based on predefined
information to offer a richer situation detection, thus improving context formats. As a consequence, the collected data is automati-
decision-making. cally separated into fields. Furthermore, new contextual data can
be added, such as data related to IP address geolocation.
2 ARCHITECTURE PROPOSAL
The conception of the HACCD stands out in the following points:
2.3 Processing Layer
(i) the creation of a preprocessing stage that uses a strategy for In the design of the Processing Layer, we propose the use of three
performing the normalization and contextualization of collected of the main strategies for context reasoning [6]: (i) rules - which
data; (ii) the conception of a hybrid context processing, offering perform the correlation of events in search of patterns described
multiple reasoning strategies, that can be used either individually in an easy to interpret syntax; (ii) ontology - can be used in two
or in a combined form; (iii) the design of a hybrid repository to store forms, in the first, internal axioms in the ontology are used to
contextual information, which provides the specific characteristics infer knowledge about the classes represented in the ontology, in
of each database model used; (iv) the proposal of a strategy for the second, external rules written in a language such as SWRL
context correlation based on compositional rules, that can combine (Semantic Web Rule Language) can be applied, allowing the system
the in a single rule information stored in different databases. to infer new context information about the ontology instances; (iii)
Figure 1 shows the proposed HACCD, demonstrating the dis- supervised learning - for this strategy, we decided to use decision
tinct components contained in its architecture. In the following trees, because they are one of the main techniques utilized to classify
subsections said components are briefly explained. events [1].
The strategies used in the Processing Layer can be selected ac-
cording to the demand, being able to be used individually or com-
bined, reinforcing the flexibility of the solution.
be replaced by the specified return of the query responsible for action represented by “a”. In this case, said action refers to sending
seeking this information in the Storage Layer. As for the return of an e-mail to security information analysts. This e-mail is composed
the auxiliary queries, one of the attributes that have been solicited of an incident notification message, along with controls established
can be used. Alternatively, the method that verifies if the query in the ISO 27002 that will serve as suggestions for improvements
found some result can be used, returning “true” if this occurs, and to be performed, the analysts are then responsible for evaluating
“false” otherwise. the need of taking actions to reinforce the password policy.