2014 Fiscal Year Research-status Report
Research and Development of a Cyber-I Open Service Platform
Project/Area Number |
26330350
|
Research Institution | Hosei University |
Principal Investigator |
JIANHUA Ma 法政大学, 情報科学部, 教授 (70295426)
|
Co-Investigator(Kenkyū-buntansha) |
HUANG Runhe 法政大学, 情報科学部, 教授 (00254102)
|
Project Period (FY) |
2014-04-01 – 2017-03-31
|
Keywords | Web Computing / Ubiquitous Computing / Personal Big Data / User Modeling / Personalized Service / Privacy |
Outline of Annual Research Achievements |
In the last fiscal year, our main work was focused on developing a Cyber-I prototype system for Cyber-Is' life control, data management, and basic APIs. The system serves as a common place for Cyber-Is' residence, and is based on the Browser/Server architecture where Tomcat acts as the server. Mongo DB is selected as the database for the persistence of data since it usually gains higher performance in dealing with the big personal data than the conventional RDBMS. Furthermore, with the schema-less property, heterogeneous personal data could be managed in a scalable and flexible way. A Cyber-I will be able to gradually approximate to its Real-I by continuously collecting, processing and utilizing Real-I's personal data. We also made a preliminary study on the three mechanisms for Cyber-I modeling to enable the models growing bigger, higher and closer to its Real-I. To provide a generic and user-centric privacy protection mechanism, we proposed a Cyber-I privacy model (CIPM) that is a systematic description about a user's privacy preference, policy and rules, which are generated semi-automatically according to each user's characteristics. Moreover, a platform for CIPM initialization and update is developed, and the privacy protection of personal data is realized through not only control but also awareness based on the CIPM.
|
Current Status of Research Progress |
Current Status of Research Progress
2: Research has progressed on the whole more than it was originally planned.
Reason
The research in 2014 FY was carried out basically as we planned. The developed Cyber-I system were experimented for testing its feasibility, scalability, usability, etc. Our study on the CIPM based privacy control and awareness is very unique and with potentials to enhance the personal data protection. The three growing mechanisms have shown the fundamental direction to make Cyber-I growable. The details of these research outcomes were discussed in our three papers, respectively, which were presented in UIC-2014, ATC-2014 and ACCN-2015.
|
Strategy for Future Research Activity |
The research in FY 2015 is planned as the following. (1) Improvement of the Cyber-I system. In the current system implementation, all data collected is stored in Mongo DB which is based on a tree structure. A tool will be developed to re-structure the related personal data for effectively extracting a user's features, and further modeling. Personal data, models and apps will be put on the server/cloud so as to be accessible everywhere and from different machines/devices. (2) Development of a Cyber-I modeling management platform. The platform is important to study and implement the Cyber-I's growth, especially letting models' able to become bigger, higher and closer. Various tools will be added to the platform GUI for tests and experiments in a visualized way. Also, we are going to study how to compute the personality based on the personal data and models. (3) Access of Cyber-I's data from external applications. The Cyber-I is for personalized applications, which may be the internal ones developed by us or the external ones made by others. Such applications may request Cyber-I's raw data and/or model data. Thus, it is necessary to study access control mechanisms, standards and protocols between the Cyber-I system and the external applications. This is also related to efficient extractions and proper replies of requested data with personal privacy guarantee.
|
Causes of Carryover |
There are two main reasons. The first is that we just used once for attending a conference and presenting one paper, and used other budget for attending other conference and presenting our research achievement. The second one is that the devices we wanted, especially the newest wearables with good functions, were not be delivered to us on time.
|
Expenditure Plan for Carryover Budget |
It’s expected to have more research outcomes in the 2nd year of this project. So we should have more travels to exchange study with outside researchers and present our work in conferences. Some budget will be used to proofread of papers especially in journals. The devices needed for our research will be available in this year. The system development as well as its tests and experiments must be carried out by more people, so the man-power payment will be necessary.
|
-
[Journal Article] WaaS: Wisdom as a Service2014
Author(s)
Jianhui Chen, Jianhua Ma, Ning Zhong, Yiyu Yao, Jiming Liu, Runhe Huang, Wenbin Li, Zhisheng Huang, Yang Gao, Jianping Cao
-
Journal Title
IEEE Intelligent Systems
Volume: 29
Pages: 40-47
DOI
Peer Reviewed
-
-
-
-