You are on page 1of 4

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/324569418

A Hybrid Architecture to Enrich Context Awareness through Data Correlation

Conference Paper · April 2018


DOI: 10.1145/3167132.3167405

CITATIONS READS

0 42

7 authors, including:

Roger Machado Tiago Thompsen Primo


Universidade Federal de Pelotas Universidade Federal de Pelotas
7 PUBLICATIONS   2 CITATIONS    71 PUBLICATIONS   153 CITATIONS   

SEE PROFILE SEE PROFILE

Maurício L. Pilla Ana Marilza Pernas


Universidade Federal de Pelotas Universidade Federal de Pelotas
80 PUBLICATIONS   118 CITATIONS    54 PUBLICATIONS   142 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Ecosystem for Digital Education View project

SCALE - Smart Context Aware Learning Environments View project

All content following this page was uploaded by Maurício L. Pilla on 17 April 2018.

The user has requested enhancement of the downloaded file.


A Hybrid Architecture to Enrich Context Awareness through
Data Correlation
Roger Machado Felipe Rosa Ricardo Almeida
Federal University of Pelotas Federal University of Pelotas Federal University of Pelotas
rdsmachado@inf.ufpel.edu.br fldrosa@inf.ufpel.edu.br rbalmeida@inf.ufpel.edu.br

Tiago Primo Mauricio Pilla Ana Pernas


Federal University of Pelotas Federal University of Pelotas Federal University of Pelotas
tiago.primo@inf.ufpel.edu.br pilla@inf.ufpel.edu.br marilza@inf.ufpel.edu.br

Adenauer Yamin
Federal University of Pelotas
adenauer@inf.ufpel.edu.br

ABSTRACT 1 INTRODUCTION
Context awareness brings new challenges, and an important one is Ubiquitous computing or UbiComp is a concept in computer science
how applications can manipulate the contextual data stored in more where computers are made available to human needs, following
than one model. In this research, we propose HACCD, a context- the premise of having minimum involvement between the user and
aware architecture to process information based on hybrid models. the management of the computational infrastructure [7].
HACCD is designed to provide context awareness considering dif- Due to the fast grown of ubiquitous computing in our everyday
ferent stages: (i) acquisition of context; (ii) preprocessing stage; life an increasing number of contextual data is continuously gener-
(iii) context processing with a hybrid reasoning strategy; (iv) data ated from different sources, formats, or semantics (i.e. ontologies,
storage with the support of three database models; (v) repository relational data, rules,...) which is needed to be evaluated together
communication that enable access to contextual information; and, in order to identify situations of interest to the context-aware ap-
(vi) correlation approach based on compositional rules that allow plications [3].
the combination of data stored in distinct models. To validate our In this aspect, context awareness stands out as a resource to be
architecture we designed and tested within some scenarios based on used by ubiquitous computing, which needs to deal appropriately
information security. The obtained results showed that the possibil- with modeling, storage, and processing of the various context data
ity of correlating data from different natures could help to identify provided by the applications. Context-aware applications can adapt
richer situations, thus improving decision-making. their behaviors to the changing environment with minimal human
intervention, but they introduce new challenges for application
CCS CONCEPTS developers [2].
Recently, several context modeling and reasoning strategies have
• Human-centered computing → Ubiquitous and mobile com-
been developed, but these strategies can not, in their solution, deal
puting;
with the diversity of data acquired, and this adequate manipulation
can help on decision-making. Therefore, it is necessary to change
KEYWORDS the approach used to one that combines the different representa-
Context Awareness; Hybrid Reasoning; Context Correlation tion models and the context reasoning strategies, called hybrid
approaches [3].
ACM Reference Format: Context data stored in a single model may lead to problems
Roger Machado, Felipe Rosa, Ricardo Almeida, Tiago Primo, Mauricio Pilla, related to performance and disk usage [5]. Besides, it causes con-
Ana Pernas, and Adenauer Yamin. 2018. A Hybrid Architecture to Enrich cerns related to data processing, since it often becomes necessary to
Context Awareness through Data Correlation. In SAC 2018: SAC 2018: Sym- utilize data correlation between different storage models. The moti-
posium on Applied Computing , April 9–13, 2018, Pau, France. ACM, New vation of this paper emerges from the use of hybrid context models,
York, NY, USA, 3 pages. https://doi.org/10.1145/3167132.3167405 that is, the need to use different models to manage contextual data.
The main objective this work is treated these three research ques-
tions through of the conception of an architecture entitled “HACCD
Permission to make digital or hard copies of part or all of this work for personal or (Hybrid Architecture to Correlate Contextual Data)”, which aims
classroom use is granted without fee provided that copies are not made or distributed to supply the use of hybrid context modeling in a more integrated
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for third-party components of this work must be honored. and convenient way.
For all other uses, contact the owner/author(s). To accomplish this, HACCD provides: (i) a preprocessing stage
SAC 2018, April 9–13, 2018, Pau, France to perform the normalization and contextualization of the collected
© 2018 Copyright held by the owner/author(s).
ACM ISBN 978-1-4503-5191-1/18/04. data; (ii) a processing Layer that offers multiple reasoning strate-
https://doi.org/10.1145/3167132.3167405 gies, which can be used either individually or in a combined form
SAC 2018, April 9–13, 2018, Pau, France R. Machado et al.

to perform the context processing; (iii) a Storage Layer which pro- 2.2 Preprocessing Layer
vides persistence with three different database models; (iv) a repos- The Preprocessing Layer performs the separation of the event in
itory communication manager that enables access to contextual different fields, later adding contextual information to help the pro-
information from the context-aware applications; (v) a context com- cessing step. This component was designed due to normalization
positional correlation strategy, which allows the application to and contextualization of the collected events. For the use in Pre-
combine information from different models, integrating contextual processing Layer, grammars were developed based on predefined
information to offer a richer situation detection, thus improving context formats. As a consequence, the collected data is automati-
decision-making. cally separated into fields. Furthermore, new contextual data can
be added, such as data related to IP address geolocation.
2 ARCHITECTURE PROPOSAL
The conception of the HACCD stands out in the following points:
2.3 Processing Layer
(i) the creation of a preprocessing stage that uses a strategy for In the design of the Processing Layer, we propose the use of three
performing the normalization and contextualization of collected of the main strategies for context reasoning [6]: (i) rules - which
data; (ii) the conception of a hybrid context processing, offering perform the correlation of events in search of patterns described
multiple reasoning strategies, that can be used either individually in an easy to interpret syntax; (ii) ontology - can be used in two
or in a combined form; (iii) the design of a hybrid repository to store forms, in the first, internal axioms in the ontology are used to
contextual information, which provides the specific characteristics infer knowledge about the classes represented in the ontology, in
of each database model used; (iv) the proposal of a strategy for the second, external rules written in a language such as SWRL
context correlation based on compositional rules, that can combine (Semantic Web Rule Language) can be applied, allowing the system
the in a single rule information stored in different databases. to infer new context information about the ontology instances; (iii)
Figure 1 shows the proposed HACCD, demonstrating the dis- supervised learning - for this strategy, we decided to use decision
tinct components contained in its architecture. In the following trees, because they are one of the main techniques utilized to classify
subsections said components are briefly explained. events [1].
The strategies used in the Processing Layer can be selected ac-
cording to the demand, being able to be used individually or com-
bined, reinforcing the flexibility of the solution.

2.4 Repository Communication Manager


The Repository Communication Manager is responsible for pro-
viding methods that enable the search, insertion, and deletion of
contextual information in the Storage Layer. For context-aware
applications using the Storage Layer, an interoperation interface
was designed to allow data manipulation, as well as to facilitate
this access regardless of the storage model used.

2.5 Storage Layer


With the conception of the Storage Layer with three storage mod-
els the HACCD can offer: (i) a relational model, which it has a
satisfactory behavior in many situations, being used to store the
relationship between application and the monitored sensor, provid-
ing easy access to the information and facilitating it’s modification
if necessary; (ii) a non-relational model, that makes better use of
disk space when storing semi-structured data in comparison to the
Figure 1: HACCD: Architecture Proposed relational model; (iii) a triple model, which allows the manipulation
of ontological data more efficiently compared to its manipulation
in memory or using a relational model, strategies commonly seen
in other works.
In the proposed approach, the responsibility to determine which
2.1 Medium Access Layer model should be used to store contextual data is delegated to the
The Medium Access Layer is responsible send and receive infor- application.
mation to the applications. This layer has two components: the
Collector and the Actuator. The Collector performs the acquisition 2.6 Correlation Layer
of events from different types of sensors, such as events about the The Correlation Layer performs the correlation of contextual infor-
use of operating system resources and log files internal to the sys- mation using a strategy based on compositional rules. To allow the
tem. Furthermore, this component can receive events from different use of data from different models in the same rule, it is necessary
devices. to use markup tags that start with the symbol “#”. The tags will
A Hybrid Architecture to Enrich Context Awareness through Data Correlation SAC 2018, April 9–13, 2018, Pau, France

be replaced by the specified return of the query responsible for action represented by “a”. In this case, said action refers to sending
seeking this information in the Storage Layer. As for the return of an e-mail to security information analysts. This e-mail is composed
the auxiliary queries, one of the attributes that have been solicited of an incident notification message, along with controls established
can be used. Alternatively, the method that verifies if the query in the ISO 27002 that will serve as suggestions for improvements
found some result can be used, returning “true” if this occurs, and to be performed, the analysts are then responsible for evaluating
“false” otherwise. the need of taking actions to reinforce the password policy.

3 PROPOSAL EVALUATION 4 CONCLUSION


This section describes a usage scenario that explores the proposed Considering the challenges faced by context-aware applications
HACCD. In this scenario, the use of rule-based reasoning and on- with the use of hybrid models, the following contributions have
tology is contemplated in the Processing Layer, an example of the been achieved with the development of this work: (i) the design
utilization of supervised learning can be seen in [4]. In the Stor- of an architecture that supports hybrid context modeling; (ii) the
age Layer, the non-relational and the triple model are used, the proposal of a Preprocessing Layer to perform the normalization
information contained in these two models is combined with the and contextualization of the collected data; (iii) the conception of a
application using the proposed Correlation Layer. Processing Layer that provides multiple reasoning strategies, which
This usage scenario explores the ISO 27002, which contains can be used individually or in a combined way; (iv) the proposal of a
a practice code for the management of information security, an Storage Layer which provides persistence in three different models;
ontology was used for mapping the structure of ISO 27002, including (v) the conception of a Repository Communication Manager that
its controls, assets, threats, and vulnerabilities. New classes were enable access to contextual information from the context-aware
added in the ontology, aiming to facilitate access to information of applications; and (vi) the design of a correlation strategy, which
interest. The ontology was stored in the Triple Store. has as its differential the possibility of combining data stored in
As a source for context acquisition, we explored the monitor- different database models.
ing of the ModSecurity Web Application Firewall logs, which has Among the issues raised for the continuation of this work, we
been correctly configured to identify breaks in the Web applica- can be mention the following: (i) develop interfaces that use data
tions password policy. After that, the collection is handled by the visualization techniques in order to facilitate the interpretation
Preprocessing Layer, which performs the division of the collected of the stored contextual information and identified situations; (ii)
log into fields. use the HACCD in different use cases, for example, in educational
Next, the identification of the situation of interest is performed environments, which often use models based on ontologies along
by the Processing Layer using rule-based reasoning. The rule used is with relational models.
responsible to detect the complexity requirements situation, which
is a situation related to password policy. Said rule verifies if any of 5 ACKNOWLEDGMENTS
the collected logs have the phrase “password does meet complexity This work was supported by CAPES/Brasil (Programa Nacional de
Requirements” as the value of the “message” field. After that, the Cooperação Acadêmica da Coordenação de Aperfeiçoamento de
records related to the password policy violation are sorted, as an Pessoal de Nível Superior - PROCAD)
example, "Password does meet complexity requirements" is clas-
sified as "category = security policy", "subcategory = passwords REFERENCES
policy" and "situation = ComplexityRequirements". The identified [1] A. Ammar. Apr. 2015. A Decision Tree Classifier for Intrusion Detection Priority
situations are stored in the non-relational model of the Storage Tagging. Journal of Computer and Communications, Riyadh 3 (Apr. 2015), 52–58.
[2] Asad Masood Khattak, Noman Akbar, Mohammad Aazam, Taqdir Ali,
Layer since the situations have a semi-structured format. Adil Mehmood Khan, Seokhee Jeon, Myunggwon Hwang, and Sungyoung Lee.
Following the identification of the situation and its storage in the 2014. Context Representation and Fusion: Advancements and Opportunities.
Sensors 14, 6 (2014), 9628–9668. https://doi.org/10.3390/s140609628
Storage Layer, the Correlation Layer can be used with the execution [3] Xin Li, Martina Eckert, José-Fernán Martinez, and Gregorio Rubio. 2015. Context
of the rule if(#1 && #2) “a”. The tag # 1 is replaced by the Aware Middleware Architectures: Survey and Challenges. Sensors 15, 8 (2015),
query responsible for seeking the situations where the attribute 20570. https://doi.org/10.3390/s150820570
[4] R. S. Machado, R. B. Almeida, A. C Yamin, and A. M. Pernas. 2015. LogA-DM: An
“subcategory” has the value equal to “ComplexityRequirements” in Approach of Dynamic Log Analysis. IEEE Latin America Transactions 13, 9 (Sept
the non-relational model. 2015), 3096–3102. https://doi.org/10.1109/TLA.2015.7350064
The tag #2 is replaced by the SPARQL query which searches the [5] J. Maowa, A. H. M.S. Hoque, R. Mustafa, and M. O. Rahman. 2017. A COMPAR-
ATIVE STUDY ON BIG DATA HANDLING USING RELATIONAL AND NON-
controls related to “ComplexityRequirements” according to the ISO RELATIONAL DATA MODEL. (IJDKP) 7, 3 (May 2017). https://doi.org/10.5121/
27002 ontology and the properties “controlStatement”, “implemen- ijdkp.2017.7302
[6] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos. 2014. Context
tationGuidance”, “otherInformation”. Aware Computing for The Internet of Things: A Survey. Communications Surveys
The method that verifies if the query has encountered some re- Tutorials, IEEE 16, 1 (First 2014), 414–454. https://doi.org/10.1109/SURV.2013.
sult was used as a condition in the compositional rule. When the 042313.00197
[7] M.A. Razzaque, M. Milojevic-Jevric, A. Palade, and S. Clarke. 2016. Middleware
situation is detected, the Medium Access Layer receives a requi- for Internet of Things: A Survey. Internet of Things Journal, IEEE 3, 1 (2016), 70–95.
sition and the Actuator component performs the pre-configured https://doi.org/10.1109/JIOT.2015.2498900

View publication stats

You might also like